Starting getty on tty2-tty6 if dbus and logind are not available... Starting OpenBSD Secure Shell server... Starting Permit User Sessions... [ OK ] Started Regular background program processing daemon. Starting System Logging Service... [ OK ] Started Permit User Sessions. [ OK ] Found device /dev/ttyS0. [ OK ] Started System Logging Service. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Started OpenBSD Secure Shell server. Warning: Permanently added '10.128.10.12' (ECDSA) to the list of known hosts. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 2020/09/16 18:43:18 fuzzer started 2020/09/16 18:43:19 dialing manager at 10.128.0.26:33079 2020/09/16 18:43:20 syscalls: 3317 2020/09/16 18:43:20 code coverage: enabled 2020/09/16 18:43:20 comparison tracing: enabled 2020/09/16 18:43:20 extra coverage: enabled 2020/09/16 18:43:20 setuid sandbox: enabled 2020/09/16 18:43:20 namespace sandbox: enabled 2020/09/16 18:43:20 Android sandbox: enabled 2020/09/16 18:43:20 fault injection: enabled 2020/09/16 18:43:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/09/16 18:43:20 net packet injection: enabled 2020/09/16 18:43:20 net device setup: enabled 2020/09/16 18:43:20 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/09/16 18:43:20 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/09/16 18:43:20 USB emulation: enabled 2020/09/16 18:43:20 hci packet injection: enabled 18:45:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x5, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syzkaller login: [ 319.686632][ T28] audit: type=1400 audit(1600281943.946:8): avc: denied { execmem } for pid=8481 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 321.302477][ T8482] IPVS: ftp: loaded support on port[0] = 21 [ 321.921797][ T8482] chnl_net:caif_netlink_parms(): no params data found [ 322.075434][ T8482] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.082934][ T8482] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.092853][ T8482] device bridge_slave_0 entered promiscuous mode [ 322.107563][ T8482] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.115069][ T8482] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.125116][ T8482] device bridge_slave_1 entered promiscuous mode [ 322.180137][ T8482] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 322.198137][ T8482] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 322.251838][ T8482] team0: Port device team_slave_0 added [ 322.267060][ T8482] team0: Port device team_slave_1 added [ 322.317759][ T8482] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 322.325363][ T8482] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 322.351590][ T8482] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 322.368874][ T8482] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 322.377547][ T8482] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 322.403740][ T8482] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 322.475150][ T8482] device hsr_slave_0 entered promiscuous mode [ 322.487292][ T8482] device hsr_slave_1 entered promiscuous mode [ 322.855967][ T8482] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 322.893979][ T8482] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 322.915341][ T8482] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 322.945826][ T8482] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 323.193040][ T27] Bluetooth: hci0: command 0x0409 tx timeout [ 323.307407][ T8482] 8021q: adding VLAN 0 to HW filter on device bond0 [ 323.344821][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 323.355056][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 323.384878][ T8482] 8021q: adding VLAN 0 to HW filter on device team0 [ 323.407438][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 323.417793][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 323.427635][ T3749] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.435092][ T3749] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.490933][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 323.500553][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 323.510913][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 323.521177][ T3749] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.528712][ T3749] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.538031][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 323.549454][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 323.592649][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 323.603813][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 323.653431][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 323.664014][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 323.674805][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 323.685348][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 323.695908][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 323.730672][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 323.740181][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 323.776444][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 323.841794][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 323.849820][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 323.889640][ T8482] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 323.963917][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 323.975200][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 324.045624][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 324.055557][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 324.081695][ T8482] device veth0_vlan entered promiscuous mode [ 324.092701][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 324.103093][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 324.142752][ T8482] device veth1_vlan entered promiscuous mode [ 324.234122][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 324.244017][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 324.253988][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 324.264348][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 324.289625][ T8482] device veth0_macvtap entered promiscuous mode [ 324.314042][ T8482] device veth1_macvtap entered promiscuous mode [ 324.382276][ T8482] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 324.391583][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 324.401487][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 324.411367][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 324.421796][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 324.454249][ T8482] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 324.475334][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 324.486208][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:45:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x5, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:45:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x5, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 325.275177][ T12] Bluetooth: hci0: command 0x041b tx timeout 18:45:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x5, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:45:50 executing program 0: r0 = creat(&(0x7f0000019200)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) r2 = open(&(0x7f0000000440)='./bus\x00', 0x4d00, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0x20) dup3(r2, r0, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 326.149596][ T28] audit: type=1804 audit(1600281950.404:9): pid=8718 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir147917578/syzkaller.2i0v7u/4/bus" dev="sda1" ino=15726 res=1 [ 326.175739][ T28] audit: type=1800 audit(1600281950.404:10): pid=8718 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=15726 res=0 [ 326.216969][ T28] audit: type=1804 audit(1600281950.454:11): pid=8718 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir147917578/syzkaller.2i0v7u/4/bus" dev="sda1" ino=15726 res=1 [ 327.355051][ T3749] Bluetooth: hci0: command 0x040f tx timeout [ 327.525460][ T28] audit: type=1804 audit(1600281951.784:12): pid=8722 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir147917578/syzkaller.2i0v7u/4/bus" dev="sda1" ino=15726 res=1 [ 327.558057][ T8718] syz-executor.0 (8718) used greatest stack depth: 4600 bytes left [ 327.563152][ T28] audit: type=1804 audit(1600281951.814:13): pid=8721 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir147917578/syzkaller.2i0v7u/4/bus" dev="sda1" ino=15726 res=1 18:45:52 executing program 0: r0 = creat(&(0x7f0000019200)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) r2 = open(&(0x7f0000000440)='./bus\x00', 0x4d00, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0x20) dup3(r2, r0, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 327.936652][ T28] audit: type=1804 audit(1600281952.194:14): pid=8725 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir147917578/syzkaller.2i0v7u/5/bus" dev="sda1" ino=15726 res=1 [ 327.961535][ T28] audit: type=1800 audit(1600281952.194:15): pid=8725 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=15726 res=0 [ 328.061280][ T28] audit: type=1804 audit(1600281952.254:16): pid=8726 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir147917578/syzkaller.2i0v7u/5/bus" dev="sda1" ino=15726 res=1 18:45:53 executing program 0: r0 = creat(&(0x7f0000019200)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) r2 = open(&(0x7f0000000440)='./bus\x00', 0x4d00, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0x20) dup3(r2, r0, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 329.434149][ T12] Bluetooth: hci0: command 0x0419 tx timeout [ 329.601803][ T28] audit: type=1804 audit(1600281953.854:17): pid=8731 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir147917578/syzkaller.2i0v7u/6/bus" dev="sda1" ino=15726 res=1 [ 329.626734][ T28] audit: type=1800 audit(1600281953.854:18): pid=8731 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=15726 res=0 18:45:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @private}}, 0x0, 0x0, 0x32, 0x0, "4e58c7307b21f3276031d844b5293a0e7cd3b71d9ab9f33f6edd25d717cd71947cda709d7fe2396b4e2abfd051ec61a2abe3a5075fe369d9d166110e24cdafe434532b280f7ad45513db272c9df648ce"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x48, 0x0, "9cb4aa39e1bd413767b251106a71d3a1dcf3eb07b3ecd4d781f55175b3de575b1269b01fc34e10024d64b0c95e9e86d37d57e8a63c94c9489afca5c76ac77e3e2297c70b0a0e0039fd5af5389f988c9d"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @private}}, 0x0, 0x9, 0x0, 0x0, "00003641ce48a9707ead00000000ff00000000000000000000000000000000000000000000000000000077b57cf70000000000000000000000000000000000fffffffa00"}, 0xd8) 18:45:55 executing program 0: r0 = creat(&(0x7f0000019200)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) r2 = open(&(0x7f0000000440)='./bus\x00', 0x4d00, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0x20) dup3(r2, r0, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 331.323205][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 331.323268][ T28] audit: type=1804 audit(1600281955.574:20): pid=8739 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir147917578/syzkaller.2i0v7u/7/bus" dev="sda1" ino=15726 res=1 [ 331.355257][ T28] audit: type=1800 audit(1600281955.574:21): pid=8739 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=15726 res=0 [ 331.447682][ T28] audit: type=1804 audit(1600281955.634:22): pid=8739 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir147917578/syzkaller.2i0v7u/7/bus" dev="sda1" ino=15726 res=1 [ 332.314336][ T8737] IPVS: ftp: loaded support on port[0] = 21 [ 333.125783][ T8737] chnl_net:caif_netlink_parms(): no params data found [ 333.389982][ T8737] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.397443][ T8737] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.407248][ T8737] device bridge_slave_0 entered promiscuous mode 18:45:57 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000440)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='size=7']) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ftruncate(r2, 0x48280) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) [ 333.508769][ T8737] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.516210][ T8737] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.526166][ T8737] device bridge_slave_1 entered promiscuous mode [ 333.692803][ T8737] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 18:45:58 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000440)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='size=7']) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ftruncate(r2, 0x48280) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) [ 333.739510][ T8737] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 333.862685][ T8737] team0: Port device team_slave_0 added [ 333.902697][ T8737] team0: Port device team_slave_1 added [ 333.979526][ T8737] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 333.987465][ T8737] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 334.014336][ T8737] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 18:45:58 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000440)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='size=7']) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ftruncate(r2, 0x48280) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) [ 334.140031][ T8737] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 334.147613][ T8737] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 334.179553][ T8737] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 334.186478][ T27] Bluetooth: hci1: command 0x0409 tx timeout 18:45:58 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000440)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='size=7']) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ftruncate(r2, 0x48280) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) [ 334.454216][ T8737] device hsr_slave_0 entered promiscuous mode [ 334.484310][ T8737] device hsr_slave_1 entered promiscuous mode [ 334.505978][ T8737] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 334.513640][ T8737] Cannot create hsr debugfs directory 18:45:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x536000) 18:45:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x536000) [ 335.190650][ T8737] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 335.227137][ T8737] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 335.287418][ T8737] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 335.338089][ T8737] netdevsim netdevsim1 netdevsim3: renamed from eth3 18:45:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x536000) 18:46:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x536000) [ 335.921167][ T8737] 8021q: adding VLAN 0 to HW filter on device bond0 [ 336.002931][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 336.012849][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.049758][ T8737] 8021q: adding VLAN 0 to HW filter on device team0 [ 336.110171][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 336.120531][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 336.130952][ T3749] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.138372][ T3749] bridge0: port 1(bridge_slave_0) entered forwarding state 18:46:00 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8011, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000272000)) [ 336.161508][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 336.208063][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 336.218814][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 336.228678][ T3749] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.236030][ T3749] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.248421][ T27] Bluetooth: hci1: command 0x041b tx timeout [ 336.330758][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 336.342023][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 336.353772][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 336.364809][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 336.375723][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 336.386675][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 336.469371][ T8737] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 336.480083][ T8737] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 336.506120][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 336.516268][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 336.526173][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 336.537661][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 336.547647][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 336.642986][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 336.653262][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 336.661305][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 336.693288][ T8737] 8021q: adding VLAN 0 to HW filter on device batadv0 18:46:01 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8011, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000272000)) [ 336.818409][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 336.829258][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 336.967590][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 336.977587][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 337.009190][ T8737] device veth0_vlan entered promiscuous mode [ 337.025810][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 337.035130][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 337.095030][ T8737] device veth1_vlan entered promiscuous mode [ 337.115717][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 337.228059][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 337.238295][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 337.263959][ T8737] device veth0_macvtap entered promiscuous mode [ 337.291814][ T8737] device veth1_macvtap entered promiscuous mode [ 337.389191][ T8737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 337.400343][ T8737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 337.414740][ T8737] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 337.423486][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 337.433809][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 337.443496][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 337.453782][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 337.501639][ T8737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 337.512405][ T8737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 337.528675][ T8737] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 337.536978][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 337.547219][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:46:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @private}}, 0x0, 0x0, 0x32, 0x0, "4e58c7307b21f3276031d844b5293a0e7cd3b71d9ab9f33f6edd25d717cd71947cda709d7fe2396b4e2abfd051ec61a2abe3a5075fe369d9d166110e24cdafe434532b280f7ad45513db272c9df648ce"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x48, 0x0, "9cb4aa39e1bd413767b251106a71d3a1dcf3eb07b3ecd4d781f55175b3de575b1269b01fc34e10024d64b0c95e9e86d37d57e8a63c94c9489afca5c76ac77e3e2297c70b0a0e0039fd5af5389f988c9d"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @private}}, 0x0, 0x9, 0x0, 0x0, "00003641ce48a9707ead00000000ff00000000000000000000000000000000000000000000000000000077b57cf70000000000000000000000000000000000fffffffa00"}, 0xd8) 18:46:02 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8011, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000272000)) [ 338.319445][ T8702] Bluetooth: hci1: command 0x040f tx timeout 18:46:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @private}}, 0x0, 0x0, 0x32, 0x0, "4e58c7307b21f3276031d844b5293a0e7cd3b71d9ab9f33f6edd25d717cd71947cda709d7fe2396b4e2abfd051ec61a2abe3a5075fe369d9d166110e24cdafe434532b280f7ad45513db272c9df648ce"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x48, 0x0, "9cb4aa39e1bd413767b251106a71d3a1dcf3eb07b3ecd4d781f55175b3de575b1269b01fc34e10024d64b0c95e9e86d37d57e8a63c94c9489afca5c76ac77e3e2297c70b0a0e0039fd5af5389f988c9d"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @private}}, 0x0, 0x9, 0x0, 0x0, "00003641ce48a9707ead00000000ff00000000000000000000000000000000000000000000000000000077b57cf70000000000000000000000000000000000fffffffa00"}, 0xd8) 18:46:02 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8011, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000272000)) 18:46:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @private}}, 0x0, 0x0, 0x32, 0x0, "4e58c7307b21f3276031d844b5293a0e7cd3b71d9ab9f33f6edd25d717cd71947cda709d7fe2396b4e2abfd051ec61a2abe3a5075fe369d9d166110e24cdafe434532b280f7ad45513db272c9df648ce"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x48, 0x0, "9cb4aa39e1bd413767b251106a71d3a1dcf3eb07b3ecd4d781f55175b3de575b1269b01fc34e10024d64b0c95e9e86d37d57e8a63c94c9489afca5c76ac77e3e2297c70b0a0e0039fd5af5389f988c9d"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @private}}, 0x0, 0x9, 0x0, 0x0, "00003641ce48a9707ead00000000ff00000000000000000000000000000000000000000000000000000077b57cf70000000000000000000000000000000000fffffffa00"}, 0xd8) 18:46:03 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='\vem5\xc1\x03*\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\xbf\xb1\x00\xf0\x97zR\xe2r\x04\x15b\xd0\b\x00\x00\x00\x00\x00\x00\x00k\xdc\x80\xab\xe9[>)6;\xabi\xf0\xee\xaa\xa8$\x15O', 0x0) syz_genetlink_get_family_id$wireguard(0x0) write(r0, &(0x7f0000000300)="06366837d176fbfde3d88ce841ed465ad0f5071abfe35054e8b7", 0x1a) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x1, @remote, 0x0, 0x0, 'dh\x00'}, 0x2c) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)=0x0) sendmsg$AUDIT_SET(r3, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x38, 0x3e9, 0x400, 0x70bd27, 0x25dfdbfb, {0x80, 0x1, 0x0, r4, 0xffff8000, 0x6, 0x81, 0x1400000, 0x0, 0x2}, ["", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x40008d0}, 0x40080) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r5, 0x0, 0x48f, &(0x7f0000000080)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) ioctl$SNDCTL_DSP_SETFRAGMENT(r2, 0xc004500a, &(0x7f00000000c0)=0x76a8) r6 = openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) fcntl$getownex(r6, 0x10, &(0x7f00000002c0)) [ 339.192111][ T9014] IPVS: set_ctl: invalid protocol: 13830 209.118.251.253:58328 18:46:03 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) r0 = openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r1 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r2, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x70, &(0x7f0000000000)={r6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000180)={r6, 0x1b7, 0x1ff}, 0x8) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc04c5611, &(0x7f0000000080)={0x400, 0x1, 0x4, 0x10000, 0xa11, {0x77359400}, {0x3, 0x2, 0x5, 0x8e, 0x3, 0x9, "14227fc6"}, 0x1ff, 0x2, @fd=r1, 0x7}) [ 339.303760][ T9015] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:0 18:46:03 executing program 0: r0 = socket(0x1e, 0x4, 0x0) recvmsg$can_bcm(r0, &(0x7f0000001a40)={&(0x7f0000001840)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001900)=[{&(0x7f00000018c0)=""/61, 0x3d}], 0x1, &(0x7f0000001940)=""/221, 0xdd}, 0x20) r1 = socket(0x80000000000000a, 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f0000003100)={{r1}, 0x0, 0x1a, @inherit={0x68, &(0x7f00000017c0)={0x0, 0x4, 0x8, 0x1000, {0x2, 0x3e, 0x6, 0x8d, 0x1000}, [0x75803339, 0x94b, 0x6, 0x7ff]}}, @subvolid=0x6257}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @private1={0xfc, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x104) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) recvmsg$can_raw(r1, &(0x7f0000001780)={&(0x7f0000000040), 0x80, &(0x7f0000001600)=[{&(0x7f00000000c0)=""/126, 0x7e}, {&(0x7f0000000140)=""/227, 0xe3}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f00000002c0)=""/56, 0x38}, {&(0x7f0000000300)=""/150, 0x96}, {&(0x7f00000003c0)=""/61, 0x3d}, {&(0x7f0000001480)=""/111, 0x6f}, {&(0x7f0000001500)=""/246, 0xf6}], 0x9, &(0x7f0000001680)=""/224, 0xe0}, 0x2) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) r3 = dup3(r2, r0, 0x0) recvmmsg(r3, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002fc0)=[{&(0x7f0000001fc0)=""/4092, 0x1c74}], 0x300}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x17) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r4, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) [ 339.551502][ T9018] tmpfs: Bad value for 'mpol' [ 339.625977][ T9018] tmpfs: Bad value for 'mpol' 18:46:04 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) r0 = openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r1 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r2, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x70, &(0x7f0000000000)={r6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000180)={r6, 0x1b7, 0x1ff}, 0x8) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc04c5611, &(0x7f0000000080)={0x400, 0x1, 0x4, 0x10000, 0xa11, {0x77359400}, {0x3, 0x2, 0x5, 0x8e, 0x3, 0x9, "14227fc6"}, 0x1ff, 0x2, @fd=r1, 0x7}) [ 340.011387][ T9028] tmpfs: Bad value for 'mpol' 18:46:04 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) r0 = openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r1 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r2, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x70, &(0x7f0000000000)={r6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000180)={r6, 0x1b7, 0x1ff}, 0x8) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc04c5611, &(0x7f0000000080)={0x400, 0x1, 0x4, 0x10000, 0xa11, {0x77359400}, {0x3, 0x2, 0x5, 0x8e, 0x3, 0x9, "14227fc6"}, 0x1ff, 0x2, @fd=r1, 0x7}) [ 340.396029][ T8702] Bluetooth: hci1: command 0x0419 tx timeout [ 340.449953][ T9031] tmpfs: Bad value for 'mpol' 18:46:04 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) r0 = openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r1 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r2, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x70, &(0x7f0000000000)={r6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000180)={r6, 0x1b7, 0x1ff}, 0x8) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc04c5611, &(0x7f0000000080)={0x400, 0x1, 0x4, 0x10000, 0xa11, {0x77359400}, {0x3, 0x2, 0x5, 0x8e, 0x3, 0x9, "14227fc6"}, 0x1ff, 0x2, @fd=r1, 0x7}) 18:46:05 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x596, 0x506, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000000)={0x14, 0x0, 0x0, &(0x7f0000000040), 0x0}, 0x0) [ 340.877063][ T9037] tmpfs: Bad value for 'mpol' 18:46:05 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x70, &(0x7f0000000000)={r5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000180)={r5, 0x1b7, 0x1ff}, 0x8) [ 341.248667][ T9043] tmpfs: Bad value for 'mpol' 18:46:05 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x70, &(0x7f0000000000)={r5}, &(0x7f0000000100)=0x8) [ 341.338511][ T27] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 341.585862][ T9047] tmpfs: Bad value for 'mpol' [ 341.592176][ T27] usb 1-1: Using ep0 maxpacket: 8 18:46:06 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x70, &(0x7f0000000000), &(0x7f0000000100)=0x8) [ 341.718278][ T27] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 341.729554][ T27] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 341.739713][ T27] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 341.752894][ T27] usb 1-1: New USB device found, idVendor=0596, idProduct=0506, bcdDevice= 0.40 [ 341.762280][ T27] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 341.899690][ T27] usb 1-1: config 0 descriptor?? [ 342.002308][ T9053] tmpfs: Bad value for 'mpol' 18:46:06 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x70, &(0x7f0000000000), &(0x7f0000000100)=0x8) [ 342.389023][ T9055] tmpfs: Bad value for 'mpol' 18:46:06 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x70, &(0x7f0000000000), &(0x7f0000000100)=0x8) [ 342.636807][ T27] usbhid 1-1:0.0: can't add hid device: -71 [ 342.643277][ T27] usbhid: probe of 1-1:0.0 failed with error -71 [ 342.699517][ T27] usb 1-1: USB disconnect, device number 2 [ 342.788848][ T9065] tmpfs: Bad value for 'mpol' 18:46:07 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x70, &(0x7f0000000000)={r4}, &(0x7f0000000100)=0x8) [ 343.059001][ T9068] tmpfs: Bad value for 'mpol' 18:46:07 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x70, &(0x7f0000000000)={r4}, &(0x7f0000000100)=0x8) [ 343.320612][ T9072] tmpfs: Bad value for 'mpol' [ 343.366961][ T8703] usb 1-1: new high-speed USB device number 3 using dummy_hcd 18:46:07 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x70, &(0x7f0000000000)={r4}, &(0x7f0000000100)=0x8) [ 343.606997][ T8703] usb 1-1: Using ep0 maxpacket: 8 [ 343.702551][ T9076] tmpfs: Bad value for 'mpol' [ 343.748677][ T8703] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 343.760016][ T8703] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 343.770152][ T8703] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 343.783200][ T8703] usb 1-1: New USB device found, idVendor=0596, idProduct=0506, bcdDevice= 0.40 [ 343.792448][ T8703] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 343.879265][ T8703] usb 1-1: config 0 descriptor?? 18:46:08 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000000)={r4}, &(0x7f0000000100)=0x8) 18:46:08 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x70, &(0x7f0000000000)={r5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000180)={r5, 0x1b7, 0x1ff}, 0x8) [ 344.197328][ T8703] usbhid 1-1:0.0: can't add hid device: -71 [ 344.203802][ T8703] usbhid: probe of 1-1:0.0 failed with error -71 [ 344.252391][ T9084] tmpfs: Bad value for 'mpol' [ 344.253599][ T8703] usb 1-1: USB disconnect, device number 3 18:46:08 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000000)={r4}, &(0x7f0000000100)=0x8) [ 344.394400][ T9089] tmpfs: Bad value for 'mpol' 18:46:08 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000000)={r4}, &(0x7f0000000100)=0x8) [ 344.663070][ T9092] tmpfs: Bad value for 'mpol' [ 344.742837][ T9094] tmpfs: Bad value for 'mpol' 18:46:09 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x70, &(0x7f0000000000)={r5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000180)={r5, 0x1b7, 0x1ff}, 0x8) 18:46:09 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000000)={r4}, &(0x7f0000000100)=0x8) [ 345.020047][ T9098] tmpfs: Bad value for 'mpol' 18:46:09 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x70, &(0x7f0000000000)={r5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000180)={r5, 0x1b7, 0x1ff}, 0x8) [ 345.088898][ T9099] tmpfs: Bad value for 'mpol' 18:46:09 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x70, &(0x7f0000000000)={r5}, &(0x7f0000000100)=0x8) [ 345.443948][ T9103] tmpfs: Bad value for 'mpol' [ 345.547351][ T9105] tmpfs: Bad value for 'mpol' 18:46:09 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) openat2(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x8041, 0x0, 0x9}, 0x18) 18:46:10 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) socket(0x80000000000000a, 0x2, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x70, &(0x7f0000000000)={r4}, &(0x7f0000000100)=0x8) 18:46:10 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) openat2(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x8041, 0x0, 0x9}, 0x18) [ 345.981480][ T9111] tmpfs: Bad value for 'mpol' 18:46:10 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r1, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x70, &(0x7f0000000000)={r4}, &(0x7f0000000100)=0x8) 18:46:10 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) openat2(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x8041, 0x0, 0x9}, 0x18) [ 346.409086][ T9116] tmpfs: Bad value for 'mpol' 18:46:10 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x6, 0x1b, 0x0, &(0x7f0000000200)) signalfd(r0, &(0x7f0000000140)={[0x5067, 0x2]}, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x70, &(0x7f0000000000)={r3}, &(0x7f0000000100)=0x8) 18:46:11 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) openat2(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x8041, 0x0, 0x9}, 0x18) [ 346.857514][ T9121] tmpfs: Bad value for 'mpol' 18:46:11 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x6, 0x1b, 0x0, &(0x7f0000000200)) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x70, &(0x7f0000000000)={r3}, &(0x7f0000000100)=0x8) 18:46:11 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) [ 347.237590][ T9126] tmpfs: Bad value for 'mpol' 18:46:11 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:11 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) [ 347.583212][ T9131] tmpfs: Bad value for 'mpol' 18:46:11 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:12 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) [ 347.948561][ T9136] tmpfs: Bad value for 'mpol' 18:46:12 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) openat$null(0xffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) [ 348.266043][ T9141] tmpfs: Bad value for 'mpol' 18:46:12 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:12 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000c40)='tmpfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:12 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) [ 348.686280][ T9146] tmpfs: Bad value for 'mpol' 18:46:13 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:13 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:13 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:13 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:13 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:13 executing program 0: unshare(0x4000600) close(0xffffffffffffffff) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:14 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:14 executing program 0: unshare(0x4000600) close(0xffffffffffffffff) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:14 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}, {@huge_always={'huge=always', 0x3d, '.'}}], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:14 executing program 2: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) openat2(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x8041, 0x0, 0x9}, 0x18) 18:46:14 executing program 0: unshare(0x4000600) close(0xffffffffffffffff) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:15 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:15 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:15 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:15 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:15 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:15 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:16 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer'}}}], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:16 executing program 0: unshare(0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:16 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:16 executing program 0: unshare(0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) [ 353.034853][ T9186] IPVS: ftp: loaded support on port[0] = 21 [ 353.769957][ T9186] chnl_net:caif_netlink_parms(): no params data found [ 354.038441][ T9186] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.045753][ T9186] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.056773][ T9186] device bridge_slave_0 entered promiscuous mode [ 354.076637][ T9186] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.084675][ T9186] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.094643][ T9186] device bridge_slave_1 entered promiscuous mode [ 354.278345][ T9186] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 354.314631][ T9186] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 354.466836][ T9186] team0: Port device team_slave_0 added [ 354.527414][ T9186] team0: Port device team_slave_1 added [ 354.696396][ T9186] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 354.703580][ T9186] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 354.730675][ T9186] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 354.794747][ T9186] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 354.802517][ T9186] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 354.828812][ T9186] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 354.910683][ T9186] device hsr_slave_0 entered promiscuous mode [ 354.923130][ T9186] device hsr_slave_1 entered promiscuous mode [ 354.932243][ T9186] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 354.941285][ T9186] Cannot create hsr debugfs directory [ 354.962231][ T5] Bluetooth: hci2: command 0x0409 tx timeout [ 355.256819][ T9186] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 355.304700][ T9186] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 355.350962][ T9186] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 355.392669][ T9186] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 355.785169][ T9186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 355.829309][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 355.839550][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 355.864985][ T9186] 8021q: adding VLAN 0 to HW filter on device team0 [ 355.895198][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 355.906273][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 355.916142][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.923720][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.980566][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 355.990458][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 356.000761][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.010565][ T8994] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.017829][ T8994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.027193][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 356.038824][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 356.096075][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 356.107608][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 356.121927][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 356.149016][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 356.162087][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 356.203911][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 356.214067][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 356.254854][ T9186] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 356.269897][ T9186] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 356.280306][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 356.290756][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 356.372721][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 356.381468][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 356.420880][ T9186] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 356.513905][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 356.525628][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 356.607867][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 356.620026][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 356.650602][ T9186] device veth0_vlan entered promiscuous mode [ 356.659652][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 356.669210][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 356.720418][ T9186] device veth1_vlan entered promiscuous mode [ 356.837509][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 356.850572][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 356.874275][ T9186] device veth0_macvtap entered promiscuous mode [ 356.902553][ T9186] device veth1_macvtap entered promiscuous mode [ 356.975428][ T9186] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 356.986131][ T9186] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 356.996955][ T9186] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 357.007694][ T9186] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 357.022411][ T9186] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 357.030846][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 357.040879][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 357.049861][ T8702] Bluetooth: hci2: command 0x041b tx timeout [ 357.050748][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 357.066260][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 357.109661][ T9186] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 357.122696][ T9186] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 357.132879][ T9186] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 357.143541][ T9186] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 357.158069][ T9186] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 357.166441][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 357.176804][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:46:22 executing program 2: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) openat2(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x8041, 0x0, 0x9}, 0x18) 18:46:22 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x0, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:22 executing program 0: unshare(0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:22 executing program 0: unshare(0x4000600) r0 = socket(0x0, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:22 executing program 2: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) openat2(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x8041, 0x0, 0x9}, 0x18) 18:46:22 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x0, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:23 executing program 0: unshare(0x4000600) r0 = socket(0x0, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:23 executing program 2: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) [ 359.119262][ T8703] Bluetooth: hci2: command 0x040f tx timeout 18:46:23 executing program 0: unshare(0x4000600) r0 = socket(0x0, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:23 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x0, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:23 executing program 2: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:24 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x0, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:24 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:24 executing program 2: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:24 executing program 2: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 18:46:24 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x0, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:24 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:25 executing program 2: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 18:46:25 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x0, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) [ 361.199702][ T8702] Bluetooth: hci2: command 0x0419 tx timeout 18:46:25 executing program 2: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 18:46:25 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:25 executing program 2: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:26 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(0xffffffffffffffff) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:26 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:26 executing program 2: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:26 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(0xffffffffffffffff) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:26 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:26 executing program 2: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:27 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(0xffffffffffffffff) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:27 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:27 executing program 2: unshare(0x4000600) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(0xffffffffffffffff) 18:46:27 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:27 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r1}, &(0x7f0000000100)=0x8) 18:46:27 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:27 executing program 2: unshare(0x4000600) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(0xffffffffffffffff) 18:46:27 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) 18:46:28 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r1}, &(0x7f0000000100)=0x8) 18:46:28 executing program 2: unshare(0x4000600) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(0xffffffffffffffff) 18:46:28 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:28 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r1}, &(0x7f0000000100)=0x8) 18:46:28 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:28 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x0) 18:46:28 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000), &(0x7f0000000100)=0x8) 18:46:29 executing program 2: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:29 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:29 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000), &(0x7f0000000100)=0x8) 18:46:29 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000), &(0x7f0000000100)=0x8) 18:46:29 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:29 executing program 2: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:29 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:29 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:30 executing program 2: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:30 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:30 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:30 executing program 2: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:30 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:30 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:31 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:31 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000000)={r1}, &(0x7f0000000100)=0x8) 18:46:31 executing program 2: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:31 executing program 0: unshare(0x4000600) close(0xffffffffffffffff) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, 0x0, 0x40) 18:46:31 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000000)={r1}, &(0x7f0000000100)=0x8) 18:46:31 executing program 0: unshare(0x4000600) close(0xffffffffffffffff) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, 0x0, 0x40) 18:46:32 executing program 2: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:32 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000000)={r1}, &(0x7f0000000100)=0x8) 18:46:32 executing program 0: unshare(0x4000600) close(0xffffffffffffffff) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, 0x0, 0x40) 18:46:32 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:32 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, 0x0, &(0x7f0000000100)) 18:46:32 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:32 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:33 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, 0x0, &(0x7f0000000100)) 18:46:33 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:33 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:33 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, 0x0, &(0x7f0000000100)) 18:46:33 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:33 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000), &(0x7f0000000100)=0x8) 18:46:33 executing program 0: unshare(0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:33 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:34 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000), &(0x7f0000000100)=0x8) 18:46:34 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:34 executing program 0: unshare(0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:34 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000), &(0x7f0000000100)=0x8) 18:46:34 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:34 executing program 0: unshare(0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:35 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:35 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, 0x0) 18:46:35 executing program 0: unshare(0x4000600) r0 = socket(0x0, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:35 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:35 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, 0x0) 18:46:35 executing program 0: unshare(0x4000600) r0 = socket(0x0, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:35 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:36 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, 0x0) 18:46:36 executing program 0: unshare(0x4000600) r0 = socket(0x0, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:36 executing program 3: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8000000170a01030000000000000000020000050800074000000000a400038008000140000000001800038014000100726f7365300000000000000000000000080002407fffffff080002400000007f68400380140001006e657464657673696d30000000000000140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010076657468305f746f5f6261746164760014000100626f6e645f736c6176655f300000000008000140000000000800074000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) openat2(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x8041, 0x0, 0x9}, 0x18) 18:46:36 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:36 executing program 1 (fault-call:4 fault-nth:0): syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:36 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x0, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) [ 372.694977][ T9701] FAULT_INJECTION: forcing a failure. [ 372.694977][ T9701] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 372.708252][ T9701] CPU: 1 PID: 9701 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 372.716933][ T9701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.727064][ T9701] Call Trace: [ 372.730535][ T9701] dump_stack+0x21c/0x280 [ 372.735015][ T9701] should_fail+0x8b7/0x9e0 [ 372.739551][ T9701] should_fail_usercopy+0x39/0x40 [ 372.744768][ T9701] sctp_getsockopt+0x14b/0x1f730 [ 372.749844][ T9701] ? kmsan_set_origin_checked+0x95/0xf0 [ 372.755502][ T9701] ? kmsan_get_metadata+0x116/0x180 [ 372.761842][ T9701] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 372.767756][ T9701] ? kmsan_get_metadata+0x116/0x180 [ 372.773046][ T9701] ? kmsan_set_origin_checked+0x95/0xf0 [ 372.778686][ T9701] ? kmsan_get_metadata+0x116/0x180 [ 372.783987][ T9701] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 372.789886][ T9701] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 372.796126][ T9701] ? selinux_socket_getsockopt+0x132/0x380 [ 372.802035][ T9701] ? kmsan_get_metadata+0x116/0x180 [ 372.807332][ T9701] ? sctp_setsockopt+0x1dac0/0x1dac0 [ 372.812778][ T9701] compat_sock_common_getsockopt+0x1a7/0x1d0 [ 372.818874][ T9701] ? sock_common_getsockopt+0x170/0x170 [ 372.824584][ T9701] __compat_sys_getsockopt+0x3ac/0x550 [ 372.830153][ T9701] __se_compat_sys_getsockopt+0xe1/0x100 [ 372.835905][ T9701] __ia32_compat_sys_getsockopt+0x62/0x80 [ 372.841761][ T9701] __do_fast_syscall_32+0x2af/0x480 [ 372.847115][ T9701] do_fast_syscall_32+0x6b/0xd0 [ 372.852072][ T9701] do_SYSENTER_32+0x73/0x90 [ 372.856717][ T9701] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 372.863112][ T9701] RIP: 0023:0xf7f5e549 [ 372.867239][ T9701] Code: Bad RIP value. [ 372.871381][ T9701] RSP: 002b:00000000f55580cc EFLAGS: 00000296 ORIG_RAX: 000000000000016d [ 372.879889][ T9701] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000084 [ 372.887938][ T9701] RDX: 0000000000000070 RSI: 0000000020000000 RDI: 0000000020000100 [ 372.895976][ T9701] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 372.904014][ T9701] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 372.912059][ T9701] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:46:37 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x0, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:38 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x0, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:38 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x70, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:38 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:38 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x2, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:38 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(0xffffffffffffffff) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:38 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:38 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x3, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) [ 375.348414][ T9716] IPVS: ftp: loaded support on port[0] = 21 [ 376.078931][ T9716] chnl_net:caif_netlink_parms(): no params data found [ 376.404389][ T9716] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.411918][ T9716] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.443577][ T9716] device bridge_slave_0 entered promiscuous mode [ 376.476725][ T9716] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.485238][ T9716] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.524496][ T9716] device bridge_slave_1 entered promiscuous mode [ 376.664405][ T9716] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 376.761886][ T9716] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 376.978799][ T9716] team0: Port device team_slave_0 added [ 377.009610][ T9716] team0: Port device team_slave_1 added [ 377.118738][ T9716] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 377.127376][ T9716] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 377.153491][ T9716] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 377.183752][ T9716] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 377.191347][ T9716] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 377.217633][ T9716] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 377.295231][ T27] Bluetooth: hci3: command 0x0409 tx timeout [ 377.347096][ T9716] device hsr_slave_0 entered promiscuous mode [ 377.359286][ T9716] device hsr_slave_1 entered promiscuous mode [ 377.376888][ T9716] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 377.384658][ T9716] Cannot create hsr debugfs directory [ 377.699295][ T9716] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 377.735663][ T9716] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 377.783517][ T9716] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 377.803242][ T9716] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 378.215357][ T9716] 8021q: adding VLAN 0 to HW filter on device bond0 [ 378.268910][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 378.278491][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 378.306887][ T9716] 8021q: adding VLAN 0 to HW filter on device team0 [ 378.347333][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 378.358103][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 378.367900][ T3749] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.375278][ T3749] bridge0: port 1(bridge_slave_0) entered forwarding state [ 378.415288][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 378.424978][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 378.435607][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 378.445384][ T3749] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.452841][ T3749] bridge0: port 2(bridge_slave_1) entered forwarding state [ 378.464142][ T3749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 378.550737][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 378.562637][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 378.573869][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 378.584843][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 378.595981][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 378.606894][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 378.617014][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 378.630035][ T8994] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 378.650179][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 378.661135][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 378.690609][ T9716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 378.778825][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 378.787390][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 378.834734][ T9716] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 378.929263][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 378.939902][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 379.013881][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 379.025109][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 379.053553][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 379.063553][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 379.080840][ T9716] device veth0_vlan entered promiscuous mode [ 379.127558][ T9716] device veth1_vlan entered promiscuous mode [ 379.223729][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 379.233631][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 379.243705][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 379.254239][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 379.290471][ T9716] device veth0_macvtap entered promiscuous mode [ 379.348300][ T9716] device veth1_macvtap entered promiscuous mode [ 379.365551][ T8702] Bluetooth: hci3: command 0x041b tx timeout [ 379.437356][ T9716] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 379.448402][ T9716] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 379.458947][ T9716] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 379.469544][ T9716] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 379.479541][ T9716] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 379.490127][ T9716] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 379.504862][ T9716] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 379.523123][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 379.533858][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 379.543709][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 379.554009][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 379.610056][ T9716] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 379.620796][ T9716] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 379.631059][ T9716] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 379.641694][ T9716] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 379.651721][ T9716] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 379.662404][ T9716] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 379.677366][ T9716] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 379.689238][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 379.700250][ T8702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 18:46:44 executing program 3 (fault-call:3 fault-nth:0): unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x0) 18:46:44 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(0xffffffffffffffff) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:44 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:44 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x4, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:44 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(0xffffffffffffffff) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x40) 18:46:45 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:45 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) [ 380.865758][ T9970] FAULT_INJECTION: forcing a failure. [ 380.865758][ T9970] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 380.879052][ T9970] CPU: 0 PID: 9970 Comm: syz-executor.3 Not tainted 5.8.0-rc5-syzkaller #0 [ 380.887721][ T9970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.897862][ T9970] Call Trace: [ 380.901282][ T9970] dump_stack+0x21c/0x280 [ 380.905768][ T9970] should_fail+0x8b7/0x9e0 [ 380.910326][ T9970] should_fail_usercopy+0x39/0x40 [ 380.915565][ T9970] _copy_to_user+0x64/0x2b0 [ 380.920196][ T9970] ? kmsan_get_metadata+0x116/0x180 [ 380.925526][ T9970] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 380.931528][ T9970] simple_read_from_buffer+0x310/0x4c0 [ 380.937209][ T9970] proc_fail_nth_read+0x320/0x3f0 [ 380.942385][ T9970] ? proc_fault_inject_write+0x5d0/0x5d0 [ 380.948201][ T9970] vfs_read+0x577/0x14d0 [ 380.952575][ T9970] ? __msan_poison_alloca+0xf0/0x120 [ 380.957989][ T9970] ? kmsan_get_metadata+0x116/0x180 [ 380.963283][ T9970] ksys_read+0x275/0x500 [ 380.967629][ T9970] __se_sys_read+0x92/0xb0 [ 380.972146][ T9970] __ia32_sys_read+0x4a/0x70 [ 380.976846][ T9970] __do_fast_syscall_32+0x2af/0x480 [ 380.982168][ T9970] do_fast_syscall_32+0x6b/0xd0 [ 380.987119][ T9970] do_SYSENTER_32+0x73/0x90 [ 380.991730][ T9970] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 380.998152][ T9970] RIP: 0023:0xf7f40549 [ 381.002274][ T9970] Code: Bad RIP value. [ 381.006410][ T9970] RSP: 002b:00000000f553a0e4 EFLAGS: 00000292 ORIG_RAX: 0000000000000003 [ 381.014926][ T9970] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000f553a13c [ 381.022981][ T9970] RDX: 000000000000000f RSI: 0000000000022408 RDI: 0000000000000003 [ 381.031039][ T9970] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 381.039098][ T9970] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 381.047163][ T9970] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 381.443583][ T8703] Bluetooth: hci3: command 0x040f tx timeout 18:46:45 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x7, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:45 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:45 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, 0x0, 0x40) 18:46:46 executing program 3: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x0) 18:46:46 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x8, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:46 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, 0x0, 0x40) 18:46:46 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, 0x0, 0x0) close(r0) 18:46:46 executing program 3: unshare(0x4000600) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x0) 18:46:47 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x9, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:47 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, 0x0, 0x0) close(r0) 18:46:47 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, 0x0, 0x40) 18:46:47 executing program 3: ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x2c) close(r0) bind(r0, &(0x7f0000000200)=@tipc=@name={0x1e, 0x2, 0x0, {{0x40, 0x4}, 0x2}}, 0x80) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x0) r1 = signalfd(r0, &(0x7f00000001c0)={[0x40, 0x1]}, 0x8) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x1, 0x3f, 0x7, 0x1, 0x0, 0x2ce, 0x10, 0xaf7cc5bec438e446, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x4, 0x7}, 0x0, 0x6, 0x2, 0x4, 0x6, 0x9, 0x478}, 0x0, 0x5, r1, 0x1) ioctl$sock_netdev_private(r0, 0x89f7, &(0x7f0000000040)="3b71aec2a8ca3f05d5b4925c1cdb2b1f58f4908d6cc959ba03ef9a67763ee635aa0325628ac186d97c471c0e83b87b2d394b47140bfac85eda12d2d3596f99839ea47ec97865b23af5ff5042c45ea7b91e9a37d8c9b5ccfca92d447546c7fc737a86041c632baacd0191e695913299b3f91ac4fe32fd8931091d9612a5873ed4fa8d5ef295ae1ecc40a5a55c7dc13cbd5bcc0a7847c3e21efa91a2832f7fd4a4ec0c85adde7bd55d9c29a5edc60bfe39da1504d99b442e6586a6b8c1e47b0e10b1cd84be318186d71fe6e73d469124629d82d33255852e0ff0ce2ab903e6ad8f7276e30aa752b1483018dcef6a2f347321aaa5185728e4bdd8") 18:46:47 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0xa, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:47 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, 0x0, 0x0) close(r0) 18:46:47 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x0) [ 383.524443][ T27] Bluetooth: hci3: command 0x0419 tx timeout 18:46:48 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0xb, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:48 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(0xffffffffffffffff) 18:46:48 executing program 0 (fault-call:3 fault-nth:0): unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x0) 18:46:48 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0xc, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:48 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(0xffffffffffffffff) [ 384.493521][T10034] FAULT_INJECTION: forcing a failure. [ 384.493521][T10034] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 384.506896][T10034] CPU: 0 PID: 10034 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 384.515637][T10034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.525753][T10034] Call Trace: [ 384.529151][T10034] dump_stack+0x21c/0x280 [ 384.533588][T10034] should_fail+0x8b7/0x9e0 [ 384.538116][T10034] should_fail_usercopy+0x39/0x40 [ 384.543240][T10034] _copy_to_user+0x64/0x2b0 [ 384.547855][T10034] ? kmsan_get_metadata+0x116/0x180 [ 384.553154][T10034] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 384.559051][T10034] simple_read_from_buffer+0x310/0x4c0 [ 384.564641][T10034] proc_fail_nth_read+0x320/0x3f0 [ 384.569790][T10034] ? proc_fault_inject_write+0x5d0/0x5d0 [ 384.575516][T10034] vfs_read+0x577/0x14d0 [ 384.579871][T10034] ? __msan_poison_alloca+0xf0/0x120 [ 384.585253][T10034] ? kmsan_get_metadata+0x116/0x180 [ 384.590546][T10034] ksys_read+0x275/0x500 [ 384.594903][T10034] __se_sys_read+0x92/0xb0 [ 384.599425][T10034] __ia32_sys_read+0x4a/0x70 [ 384.604120][T10034] __do_fast_syscall_32+0x2af/0x480 [ 384.609441][T10034] do_fast_syscall_32+0x6b/0xd0 [ 384.614405][T10034] do_SYSENTER_32+0x73/0x90 [ 384.619019][T10034] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 384.625435][T10034] RIP: 0023:0xf7fb4549 [ 384.629540][T10034] Code: Bad RIP value. [ 384.633717][T10034] RSP: 002b:00000000f55ae0e4 EFLAGS: 00000292 ORIG_RAX: 0000000000000003 [ 384.643006][T10034] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000f55ae13c [ 384.651052][T10034] RDX: 000000000000000f RSI: 0000000000022408 RDI: 0000000000000003 [ 384.659100][T10034] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 384.667138][T10034] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 384.675188][T10034] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:46:49 executing program 3: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x4, 0x0) close(r0) r1 = openat$dlm_control(0xffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)={0x18, r3, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x29, 0x81, 0xfe, 0x101, 0x2c, @empty, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x8, 0x0, 0x5}}) r5 = syz_genetlink_get_family_id$smc(&(0x7f0000000300)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x88}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x5c, r5, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x40) r6 = eventfd(0x2) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r6, 0xd0009411, &(0x7f00000006c0)={{0x0, 0x22c9, 0xc1, 0x97cd, 0x7fffffff, 0x3, 0x5, 0xf52a, 0x1000, 0x0, 0x401, 0x9, 0x40, 0xff06}}) getsockopt$inet_pktinfo(r7, 0x6, 0x1b, 0x0, &(0x7f0000000200)) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYBLOB="00042abd7000fbdbdf2502000000050004000000000008000b00", @ANYRES32=r4, @ANYBLOB="08000b007b673e7598bf5c72380638484265897f3eed5618fdeb20adb8b7fbf8c43ce01a", @ANYBLOB="5efa4568f5e82b050983a27da403bad2f7a938b5c98edf4f20dbd6e9fcb28e0d90ba978b4b1e6b094daa4b", @ANYBLOB="0400050014000700000000000000000000000000000000000500030087000000050003006c000000050002000200000014000700fe880000000000000000000000000001", @ANYRESDEC=r7], 0x70}, 0x1, 0x0, 0x0, 0x44000}, 0x4040080) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x0) r8 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r8, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r8, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) sendmsg$NFT_MSG_GETCHAIN(r8, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, 0x4, 0xa, 0xbe5106e5683eebed, 0x0, 0x0, {0x0, 0x0, 0x4}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008015}, 0x20040040) 18:46:49 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0xd, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:49 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(0xffffffffffffffff) 18:46:49 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0xe, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:49 executing program 0: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x0) 18:46:49 executing program 3: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x3, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x1) dup2(r0, 0xffffffffffffffff) r2 = mq_open(&(0x7f0000000040)='*J+[[\xa7\x00', 0x800, 0x20, &(0x7f0000000080)={0x7f, 0x5, 0xc9e, 0xcca}) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r2, 0x80089419, &(0x7f0000000000)) r3 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200200, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) r4 = openat$dir(0xffffff9c, &(0x7f0000000100)='./file0\x00', 0xa00, 0x1aa) linkat(r3, &(0x7f00000000c0)='./file0\x00', r4, &(0x7f0000000140)='./file0\x00', 0x1400) ioctl$FIOCLEX(r1, 0x5451) 18:46:50 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0xf, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:50 executing program 2 (fault-call:3 fault-nth:0): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:50 executing program 0: unshare(0x4000600) r0 = shmget(0x3, 0x11000, 0x2, &(0x7f0000fee000/0x11000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/4096) r1 = socket(0x80000000000000a, 0x2, 0x0) close(r1) sendmsg$NFT_MSG_GETFLOWTABLE(r1, 0x0, 0x0) 18:46:50 executing program 3: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0xfffffffd) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x0) [ 386.399640][T10073] FAULT_INJECTION: forcing a failure. [ 386.399640][T10073] name failslab, interval 1, probability 0, space 0, times 1 [ 386.412497][T10073] CPU: 0 PID: 10073 Comm: syz-executor.2 Not tainted 5.8.0-rc5-syzkaller #0 [ 386.421246][T10073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.431379][T10073] Call Trace: [ 386.434789][T10073] dump_stack+0x21c/0x280 [ 386.439227][T10073] should_fail+0x8b7/0x9e0 [ 386.443764][T10073] __should_failslab+0x1f6/0x290 [ 386.448925][T10073] should_failslab+0x29/0x70 [ 386.453677][T10073] kmem_cache_alloc_trace+0xf7/0xc70 [ 386.459100][T10073] ? igmp6_group_dropped+0x9eb/0x17b0 [ 386.464632][T10073] ? __local_bh_enable_ip+0x97/0x1d0 [ 386.470018][T10073] igmp6_group_dropped+0x9eb/0x17b0 [ 386.475349][T10073] __ipv6_dev_mc_dec+0x64f/0xd40 [ 386.480398][T10073] ? _raw_write_unlock_bh+0x4b/0x57 [ 386.485702][T10073] __ipv6_sock_mc_close+0x3ce/0x670 [ 386.491000][T10073] ipv6_sock_mc_close+0x137/0x190 [ 386.496189][T10073] inet6_release+0x7e/0x100 [ 386.500812][T10073] sock_close+0x150/0x450 [ 386.505273][T10073] ? __inet6_bind+0x2270/0x2270 [ 386.510232][T10073] ? sock_mmap+0x120/0x120 [ 386.514855][T10073] __fput+0x53f/0xdb0 [ 386.518959][T10073] ____fput+0x37/0x40 [ 386.523042][T10073] ? fput_many+0x360/0x360 [ 386.527607][T10073] task_work_run+0x1f2/0x2e0 [ 386.532344][T10073] __prepare_exit_to_usermode+0x45b/0x560 [ 386.538182][T10073] ? kmsan_get_metadata+0x116/0x180 [ 386.543497][T10073] __do_fast_syscall_32+0x346/0x480 [ 386.548835][T10073] do_fast_syscall_32+0x6b/0xd0 [ 386.553792][T10073] do_SYSENTER_32+0x73/0x90 [ 386.558417][T10073] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 386.564828][T10073] RIP: 0023:0xf7fc8549 [ 386.569633][T10073] Code: Bad RIP value. [ 386.573859][T10073] RSP: 002b:00000000f55c20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000006 [ 386.582354][T10073] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 386.590399][T10073] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 386.598459][T10073] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 386.606501][T10073] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 386.614540][T10073] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:46:50 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x10, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) [ 386.993319][T10081] sctp: [Deprecated]: syz-executor.1 (pid 10081) Use of struct sctp_assoc_value in delayed_ack socket option. [ 386.993319][T10081] Use struct sctp_sack_info instead 18:46:51 executing program 3: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x6, 0x1b, 0x0, &(0x7f0000000200)) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40246608, &(0x7f0000000000)={0x9c, 0x6d, 0x3, 0x0, 0x3, 0xed33}) fdatasync(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x0) [ 387.087094][T10082] sctp: [Deprecated]: syz-executor.1 (pid 10082) Use of struct sctp_assoc_value in delayed_ack socket option. [ 387.087094][T10082] Use struct sctp_sack_info instead 18:46:51 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x11, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:51 executing program 3: unshare(0x4000600) r0 = openat$vsock(0xffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x381000, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='nomand\x00', 0x0, 0x0) r1 = socket(0x28, 0x3, 0x9) close(r1) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @remote}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x104) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendmsg$NFT_MSG_GETFLOWTABLE(r2, 0x0, 0x0) 18:46:52 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x12, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:52 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:52 executing program 3: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xcfa, 0x6000) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) 18:46:52 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x13, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:52 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x5) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x4e23, 0x0, @private1, 0x7}}, {{0xa, 0x0, 0x3, @loopback, 0x800}}}, 0x104) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) fchown(r4, r2, r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) r8 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) fchown(r8, r6, r7) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)={{0x3, 0x0, r3, 0xee01, r7, 0x26, 0x4}, 0x9, 0x1b3, 0x0, 0x0, 0x0, 0x0, 0x6}) r9 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r9, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r9, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x108) getsockopt$SO_J1939_ERRQUEUE(r9, 0x6b, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) syncfs(r0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) 18:46:53 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x14, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:53 executing program 3: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x2) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x0) 18:46:53 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x400, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x10}}, {{0xa, 0x0, 0x0, @remote}}}, 0x104) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) sendmsg$nl_crypto(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@del={0x118, 0x11, 0x4, 0x70bd2b, 0x25dfdbfd, {{'xts-serpent-avx\x00'}, [], [], 0x400, 0x200}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x100}, {0x8, 0x1, 0x4}, {0x8, 0x1, 0x1}]}, 0x118}, 0x1, 0x0, 0x0, 0x20004000}, 0x40841) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x1b, 0x0, &(0x7f0000000200)) close(r0) 18:46:53 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x15, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:53 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000001c0), 0x4) unshare(0x4000600) r1 = socket(0x80000000000000a, 0x2, 0x0) close(r1) getsockname$inet6(r1, &(0x7f0000000000), &(0x7f0000000040)=0x1c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r2, 0xc0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r3}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r3}, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r1, 0x0, 0x0) 18:46:53 executing program 3: unshare(0x2010300) r0 = socket(0x80000000000000a, 0x2, 0x0) close(r0) accept4(r0, 0x0, &(0x7f0000000000), 0xc00) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8040942d, &(0x7f0000000040)) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x0) 18:46:54 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0xff) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000000)={0x0, {{0xa, 0x8000, 0x4, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x104) close(r0) 18:46:54 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [], 0x30}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x16, &(0x7f0000000000)={r2}, &(0x7f0000000100)=0x8) 18:46:54 executing program 3: unshare(0x4000600) r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = openat$nvme_fabrics(0xffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x80000, 0x0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000040)) close(r0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x0) [ 390.332334][T10127] ===================================================== [ 390.339387][T10127] BUG: KMSAN: kernel-infoleak in kmsan_copy_to_user+0x81/0x90 [ 390.346881][T10127] CPU: 1 PID: 10127 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 390.355572][T10127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.365653][T10127] Call Trace: [ 390.368987][T10127] dump_stack+0x21c/0x280 [ 390.373344][T10127] kmsan_report+0xf7/0x1e0 [ 390.377793][T10127] kmsan_internal_check_memory+0x238/0x3d0 [ 390.383615][T10127] ? should_fail+0x72/0x9e0 [ 390.388148][T10127] kmsan_copy_to_user+0x81/0x90 [ 390.393017][T10127] _copy_to_user+0x1d2/0x2b0 [ 390.397729][T10127] move_addr_to_user+0x45e/0x710 [ 390.402716][T10127] __sys_getsockname+0x407/0x5e0 [ 390.407765][T10127] ? put_old_timespec32+0x231/0x2d0 [ 390.412997][T10127] ? kmsan_get_metadata+0x116/0x180 [ 390.418225][T10127] ? kmsan_get_metadata+0x116/0x180 [ 390.423455][T10127] ? kmsan_get_metadata+0x116/0x180 [ 390.428691][T10127] __se_sys_getsockname+0x91/0xb0 [ 390.433779][T10127] __ia32_sys_getsockname+0x4a/0x70 [ 390.439028][T10127] __do_fast_syscall_32+0x2af/0x480 [ 390.444266][T10127] do_fast_syscall_32+0x6b/0xd0 [ 390.449147][T10127] do_SYSENTER_32+0x73/0x90 [ 390.453677][T10127] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 390.460090][T10127] RIP: 0023:0xf7fb4549 [ 390.464159][T10127] Code: Bad RIP value. [ 390.468226][T10127] RSP: 002b:00000000f55ae0cc EFLAGS: 00000296 ORIG_RAX: 000000000000016f [ 390.476647][T10127] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 390.484623][T10127] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 390.492602][T10127] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 390.500610][T10127] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 390.508603][T10127] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 390.516607][T10127] [ 390.518967][T10127] Local variable ----address@__sys_getsockname created at: [ 390.526187][T10127] __sys_getsockname+0x91/0x5e0 [ 390.531057][T10127] __sys_getsockname+0x91/0x5e0 [ 390.535931][T10127] [ 390.538272][T10127] Bytes 2-3 of 24 are uninitialized [ 390.543478][T10127] Memory access of size 24 starts at ffff888040937d50 [ 390.550253][T10127] Data copied to user address 0000000020000000 [ 390.556408][T10127] ===================================================== [ 390.563341][T10127] Disabling lock debugging due to kernel taint [ 390.569491][T10127] Kernel panic - not syncing: panic_on_warn set ... [ 390.576116][T10127] CPU: 1 PID: 10127 Comm: syz-executor.0 Tainted: G B 5.8.0-rc5-syzkaller #0 [ 390.586176][T10127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.596242][T10127] Call Trace: [ 390.599564][T10127] dump_stack+0x21c/0x280 [ 390.603925][T10127] panic+0x4d7/0xef7 [ 390.607864][T10127] ? add_taint+0x17c/0x210 [ 390.612331][T10127] kmsan_report+0x1df/0x1e0 [ 390.616887][T10127] kmsan_internal_check_memory+0x238/0x3d0 [ 390.622725][T10127] ? should_fail+0x72/0x9e0 [ 390.627275][T10127] kmsan_copy_to_user+0x81/0x90 [ 390.632170][T10127] _copy_to_user+0x1d2/0x2b0 [ 390.636807][T10127] move_addr_to_user+0x45e/0x710 [ 390.641795][T10127] __sys_getsockname+0x407/0x5e0 [ 390.646772][T10127] ? put_old_timespec32+0x231/0x2d0 [ 390.651992][T10127] ? kmsan_get_metadata+0x116/0x180 [ 390.657228][T10127] ? kmsan_get_metadata+0x116/0x180 [ 390.662456][T10127] ? kmsan_get_metadata+0x116/0x180 [ 390.667675][T10127] __se_sys_getsockname+0x91/0xb0 [ 390.672728][T10127] __ia32_sys_getsockname+0x4a/0x70 [ 390.677939][T10127] __do_fast_syscall_32+0x2af/0x480 [ 390.683163][T10127] do_fast_syscall_32+0x6b/0xd0 [ 390.688025][T10127] do_SYSENTER_32+0x73/0x90 [ 390.692549][T10127] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 390.698897][T10127] RIP: 0023:0xf7fb4549 [ 390.702966][T10127] Code: Bad RIP value. [ 390.707039][T10127] RSP: 002b:00000000f55ae0cc EFLAGS: 00000296 ORIG_RAX: 000000000000016f [ 390.715470][T10127] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 390.723464][T10127] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 390.731453][T10127] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 390.739444][T10127] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 390.747435][T10127] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 390.756705][T10127] Kernel Offset: disabled [ 390.761048][T10127] Rebooting in 86400 seconds..