Starting Permit User Sessions... Starting getty on tty2-tty6 if dbus and logind are not available... Starting OpenBSD Secure Shell server... [ OK ] Started Daily Cleanup of Temporary Directories. [ OK ] Reached target Timers. [ OK ] Started Regular background program processing daemon. [ OK ] Started System Logging Service. [ OK ] Started Permit User Sessions. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.15.224' (ECDSA) to the list of known hosts. 2020/06/30 10:38:57 fuzzer started 2020/06/30 10:38:58 dialing manager at 10.128.0.26:34179 2020/06/30 10:38:58 syscalls: 3118 2020/06/30 10:38:58 code coverage: enabled 2020/06/30 10:38:58 comparison tracing: enabled 2020/06/30 10:38:58 extra coverage: enabled 2020/06/30 10:38:58 setuid sandbox: enabled 2020/06/30 10:38:58 namespace sandbox: enabled 2020/06/30 10:38:58 Android sandbox: enabled 2020/06/30 10:38:58 fault injection: enabled 2020/06/30 10:38:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/30 10:38:58 net packet injection: enabled 2020/06/30 10:38:58 net device setup: enabled 2020/06/30 10:38:58 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/06/30 10:38:58 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/30 10:38:58 USB emulation: enabled 10:43:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) connect$llc(r1, &(0x7f0000000080), 0x10) syzkaller login: [ 354.040671][ T28] audit: type=1400 audit(1593513821.580:8): avc: denied { execmem } for pid=6823 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 354.209610][ T6824] IPVS: ftp: loaded support on port[0] = 21 10:43:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x10001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x182e, 0x600005f, 0x80ffff, 0x5f, 0x5f, 0x52, 0x48, 0x48]}, 0x40) [ 354.391306][ T6824] chnl_net:caif_netlink_parms(): no params data found [ 354.508182][ T6824] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.525020][ T6824] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.536400][ T6824] device bridge_slave_0 entered promiscuous mode [ 354.549289][ T6824] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.556592][ T6824] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.567099][ T6824] device bridge_slave_1 entered promiscuous mode [ 354.601175][ T6824] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 354.603257][ T6955] IPVS: ftp: loaded support on port[0] = 21 [ 354.616089][ T6824] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 354.652425][ T6824] team0: Port device team_slave_0 added [ 354.662943][ T6824] team0: Port device team_slave_1 added 10:43:42 executing program 2: syz_emit_ethernet(0x42, &(0x7f0000000080)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, {[@ra={0x94, 0x4}]}}, @time_exceeded={0x3, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @loopback}}}}}}, 0x0) [ 354.706123][ T6824] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 354.713097][ T6824] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 354.742363][ T6824] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 354.780767][ T6824] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 354.803666][ T6824] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 354.853743][ T6824] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 354.958153][ T6824] device hsr_slave_0 entered promiscuous mode 10:43:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x69) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0x10, 0x2, [@TCA_CAKE_BASE_RATE64={0xc, 0x2, 0x5}]}}]}, 0x40}}, 0x0) [ 355.014254][ T6824] device hsr_slave_1 entered promiscuous mode [ 355.109066][ T6999] IPVS: ftp: loaded support on port[0] = 21 [ 355.220753][ T7033] IPVS: ftp: loaded support on port[0] = 21 [ 355.312394][ T6955] chnl_net:caif_netlink_parms(): no params data found [ 355.601034][ T6955] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.614850][ T6955] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.623016][ T6955] device bridge_slave_0 entered promiscuous mode [ 355.636106][ T6955] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.643185][ T6955] bridge0: port 2(bridge_slave_1) entered disabled state 10:43:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000fc0)={0x44, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x44}}, 0x0) [ 355.651760][ T6955] device bridge_slave_1 entered promiscuous mode [ 355.858352][ T6824] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 355.939023][ T6824] netdevsim netdevsim0 netdevsim1: renamed from eth1 10:43:43 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f0900fe01b2a4a280930a602a0000a8430291000000390009", 0x1f}], 0x1}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 356.029579][ T6955] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 356.067901][ T6999] chnl_net:caif_netlink_parms(): no params data found [ 356.077626][ T6824] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 356.129125][ T6955] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 356.159455][ T6824] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 356.187088][ T7033] chnl_net:caif_netlink_parms(): no params data found [ 356.213268][ T7335] IPVS: ftp: loaded support on port[0] = 21 [ 356.236258][ T6955] team0: Port device team_slave_0 added [ 356.269619][ T7375] IPVS: ftp: loaded support on port[0] = 21 [ 356.301753][ T6955] team0: Port device team_slave_1 added [ 356.373080][ T6999] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.380462][ T6999] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.388829][ T6999] device bridge_slave_0 entered promiscuous mode [ 356.402200][ T6999] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.410194][ T6999] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.418267][ T6999] device bridge_slave_1 entered promiscuous mode [ 356.425752][ T6955] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 356.432705][ T6955] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 356.464386][ T6955] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 356.510383][ T6955] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 356.517579][ T6955] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 356.550990][ T6955] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 356.587889][ T7033] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.595134][ T7033] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.602909][ T7033] device bridge_slave_0 entered promiscuous mode [ 356.654340][ T7033] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.661412][ T7033] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.669718][ T7033] device bridge_slave_1 entered promiscuous mode [ 356.679611][ T6999] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 356.716874][ T6955] device hsr_slave_0 entered promiscuous mode [ 356.744933][ T6955] device hsr_slave_1 entered promiscuous mode [ 356.793784][ T6955] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 356.801618][ T6955] Cannot create hsr debugfs directory [ 356.824765][ T6999] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 356.897800][ T7033] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 356.925541][ T6999] team0: Port device team_slave_0 added [ 356.948596][ T7033] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 356.977712][ T6999] team0: Port device team_slave_1 added [ 357.079835][ T7033] team0: Port device team_slave_0 added [ 357.087279][ T6999] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 357.096666][ T6999] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 357.124742][ T6999] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 357.137524][ T6999] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 357.144535][ T6999] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 357.170580][ T6999] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 357.196865][ T7033] team0: Port device team_slave_1 added [ 357.210867][ T6824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 357.237564][ T7335] chnl_net:caif_netlink_parms(): no params data found [ 357.367531][ T6999] device hsr_slave_0 entered promiscuous mode [ 357.415280][ T6999] device hsr_slave_1 entered promiscuous mode [ 357.463644][ T6999] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 357.471242][ T6999] Cannot create hsr debugfs directory [ 357.485089][ T6824] 8021q: adding VLAN 0 to HW filter on device team0 [ 357.492440][ T7033] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 357.500078][ T7033] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 357.526102][ T7033] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 357.542531][ T7033] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 357.549653][ T7033] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 357.578090][ T7033] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 357.600021][ T7375] chnl_net:caif_netlink_parms(): no params data found [ 357.629353][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 357.638714][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 357.717899][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 357.732176][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 357.741945][ T6954] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.749259][ T6954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.773174][ T6955] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 357.823839][ T6955] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 357.886504][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 357.901425][ T6955] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 357.937068][ T7335] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.944304][ T7335] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.952222][ T7335] device bridge_slave_0 entered promiscuous mode [ 358.016136][ T7033] device hsr_slave_0 entered promiscuous mode [ 358.053810][ T7033] device hsr_slave_1 entered promiscuous mode [ 358.093533][ T7033] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 358.101107][ T7033] Cannot create hsr debugfs directory [ 358.107889][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 358.116945][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 358.126479][ T7472] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.133632][ T7472] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.159414][ T6955] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 358.216008][ T7335] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.225275][ T7335] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.233207][ T7335] device bridge_slave_1 entered promiscuous mode [ 358.256973][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 358.279926][ T7375] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.290381][ T7375] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.301044][ T7375] device bridge_slave_0 entered promiscuous mode [ 358.348022][ T7375] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.355892][ T7375] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.364678][ T7375] device bridge_slave_1 entered promiscuous mode [ 358.381404][ T7335] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 358.400739][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 358.410537][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 358.419999][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 358.428859][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 358.438087][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 358.467210][ T7335] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 358.499291][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 358.509570][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 358.518828][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 358.528069][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 358.537168][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 358.565276][ T7375] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 358.581623][ T7375] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 358.593991][ T6824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 358.642929][ T7335] team0: Port device team_slave_0 added [ 358.683834][ T7375] team0: Port device team_slave_0 added [ 358.693166][ T7375] team0: Port device team_slave_1 added [ 358.714807][ T7335] team0: Port device team_slave_1 added [ 358.788446][ T7335] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 358.795588][ T7335] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 358.822984][ T7335] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 358.847433][ T7375] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 358.857483][ T7375] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 358.888965][ T7375] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 358.913089][ T7375] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 358.920127][ T7375] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 358.947552][ T7375] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 358.959820][ T7335] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 358.969443][ T7335] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 358.996648][ T7335] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 359.022330][ T6824] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 359.051200][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 359.059943][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 359.086714][ T6999] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 359.172879][ T6999] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 359.226089][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 359.236852][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 359.288230][ T7335] device hsr_slave_0 entered promiscuous mode [ 359.355259][ T7335] device hsr_slave_1 entered promiscuous mode [ 359.393399][ T7335] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 359.401027][ T7335] Cannot create hsr debugfs directory [ 359.456224][ T7375] device hsr_slave_0 entered promiscuous mode [ 359.494746][ T7375] device hsr_slave_1 entered promiscuous mode [ 359.533574][ T7375] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 359.541158][ T7375] Cannot create hsr debugfs directory [ 359.567468][ T6999] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 359.658991][ T6955] 8021q: adding VLAN 0 to HW filter on device bond0 [ 359.670926][ T6999] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 359.783551][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 359.791965][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 359.810049][ T7033] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 359.851728][ T7033] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 359.908208][ T7033] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 359.970009][ T7033] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 360.025991][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 360.034827][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 360.042905][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 360.051545][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 360.067486][ T6955] 8021q: adding VLAN 0 to HW filter on device team0 [ 360.080426][ T6824] device veth0_vlan entered promiscuous mode [ 360.132808][ T6824] device veth1_vlan entered promiscuous mode [ 360.191717][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 360.201380][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 360.211430][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 360.222750][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.229882][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.238866][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 360.247665][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 360.256184][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.263335][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.272773][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 360.281334][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 360.335492][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 360.369475][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 360.391672][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 360.401576][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 360.410605][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 360.471004][ T6824] device veth0_macvtap entered promiscuous mode [ 360.486701][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 360.496285][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 360.518969][ T7375] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 360.586282][ T7375] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 360.649792][ T7375] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 360.705574][ T7375] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 360.757991][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 360.767940][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 360.777782][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 360.786928][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 360.800002][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 360.823536][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 360.832125][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 360.852912][ T6955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 360.864814][ T6824] device veth1_macvtap entered promiscuous mode [ 360.926843][ T7335] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 360.982630][ T6999] 8021q: adding VLAN 0 to HW filter on device bond0 [ 361.018457][ T7335] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 361.096872][ T7335] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 361.158493][ T7033] 8021q: adding VLAN 0 to HW filter on device bond0 [ 361.187850][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 361.195951][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 361.204440][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 361.212169][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.222425][ T6999] 8021q: adding VLAN 0 to HW filter on device team0 [ 361.233105][ T7335] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 361.341935][ T6955] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 361.352582][ T6824] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 361.372824][ T7033] 8021q: adding VLAN 0 to HW filter on device team0 [ 361.382343][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 361.393770][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 361.402237][ T6954] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.409356][ T6954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.417579][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 361.426390][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 361.435334][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 361.443378][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.477426][ T6824] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 361.504492][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 361.513030][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 361.524988][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 361.533968][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 361.542720][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 361.552514][ T3272] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.559639][ T3272] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.568924][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 361.577878][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.586515][ T3272] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.593641][ T3272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.601559][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 361.611093][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.619982][ T3272] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.627134][ T3272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.634764][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 361.643654][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 361.663641][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 361.671591][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 361.681252][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 361.720860][ T7375] 8021q: adding VLAN 0 to HW filter on device bond0 [ 361.739422][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 361.748509][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 361.758348][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 361.770554][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 361.812002][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 361.820247][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 361.829006][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 361.839683][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 361.849711][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 361.858848][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 361.868368][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 361.877331][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 361.888114][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 361.899134][ T6955] device veth0_vlan entered promiscuous mode [ 361.945739][ T7375] 8021q: adding VLAN 0 to HW filter on device team0 [ 361.955107][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 361.964454][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 361.972251][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 361.981799][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 361.991390][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.000807][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 362.008932][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 362.023597][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 362.031965][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.189003][ T6955] device veth1_vlan entered promiscuous mode [ 362.199989][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 362.224998][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 10:43:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 362.251269][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 362.310835][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.325537][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 362.344037][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 362.357205][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.364409][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.394413][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 362.403004][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 362.422263][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.429556][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.437436][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 362.447931][ T7033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 362.461561][ T6999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 10:43:50 executing program 0: r0 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c46caf07ddc56b6d0b065ce27b90300060000000000000000b738000000570035f4c38422a3bc822000050000e30302030006000000000000000400b357c52ebf31a8b70be85ecb000000090000f8ffffffffffffff03000000110000000d60395a700000000001"], 0xd8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 362.494556][ T7170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 362.505670][ T7170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 362.515465][ T7170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 362.536482][ T7170] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 362.555874][ T7170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 362.576678][ T7170] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 362.586102][ T8095] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 362.616227][ T8097] ERROR: Domain ' /sbin/init /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.0 proc:/self/fd/3' not defined. [ 362.669019][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 362.680551][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 10:43:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x5}, 0x14) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) [ 362.712645][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 362.750472][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 10:43:50 executing program 0: r0 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(r0, 0xe, &(0x7f00000001c0)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000004d40)=[{{&(0x7f0000000100)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, 0x0, 0x0, &(0x7f0000000400)=""/49, 0x31}, 0x207}, {{0x0, 0x0, &(0x7f0000003a40)}, 0x800}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000180)=0x7, 0x4) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000240)={{}, 0x0, 0x5, 0x8}) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r4, r3, 0x0, 0x800000080004103) [ 362.783565][ T6955] device veth0_macvtap entered promiscuous mode [ 362.821902][ T7335] 8021q: adding VLAN 0 to HW filter on device bond0 [ 362.832659][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 362.854845][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 362.863738][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 362.871243][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 362.880959][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 362.897058][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 362.928865][ T7033] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 362.940960][ T6955] device veth1_macvtap entered promiscuous mode [ 362.960152][ T6999] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 362.976430][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 363.009379][ T7335] 8021q: adding VLAN 0 to HW filter on device team0 [ 363.524535][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 363.541310][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 363.573957][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 363.582731][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 363.593319][ T7472] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.600584][ T7472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 363.609473][ T7170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 363.621567][ T6955] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 363.634216][ T6955] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 363.650223][ T6955] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 363.675344][ T6955] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 363.686106][ T6955] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 363.698745][ T6955] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 363.706796][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 363.716074][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 363.725535][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 363.734791][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 363.744694][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 363.754018][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 363.762623][ T7753] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.769804][ T7753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 363.779497][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 363.780268][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 10:43:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xf}, {0x0}, {&(0x7f00000002c0)=""/8, 0x8}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x141, &(0x7f0000000140)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 364.433085][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 364.440613][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 364.470303][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 364.488798][ T7033] device veth0_vlan entered promiscuous mode [ 364.507390][ T7375] 8021q: adding VLAN 0 to HW filter on device batadv0 10:43:52 executing program 0: getpid() perf_event_open(0x0, 0x0, 0x80009, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000004d40)=[{{0x0, 0x0, 0x0}, 0x207}, {{0x0, 0x0, 0x0}, 0x800}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000180)=0x7, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x2}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000240)={{}, 0x0, 0x5, 0x8}) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r4, r3, 0x0, 0x800000080004103) [ 364.536655][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 364.545504][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 364.555446][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 364.566522][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 364.576329][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 364.747023][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 364.764847][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 364.775024][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 364.775877][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 364.777465][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 364.814595][ T7033] device veth1_vlan entered promiscuous mode [ 364.880920][ T7033] device veth0_macvtap entered promiscuous mode [ 364.890060][ T7033] device veth1_macvtap entered promiscuous mode [ 364.911829][ T7033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 364.911866][ T7033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 364.911877][ T7033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 364.911883][ T7033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 364.937557][ T7033] batman_adv: batadv0: Interface activated: batadv_slave_0 10:43:52 executing program 1: r0 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(r0, 0xe, &(0x7f00000001c0)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004d40), 0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x2}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000240)={{}, 0x20, 0x5}) 10:43:52 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {&(0x7f00000003c0)}], 0x2) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b0b, &(0x7f0000000000)='wlan0\x00') [ 365.920691][ T6999] device veth0_vlan entered promiscuous mode [ 365.939584][ T6999] device veth1_vlan entered promiscuous mode [ 366.387824][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 366.416218][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 366.444579][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 366.456051][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 366.464933][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 366.475265][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 366.484551][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 366.495345][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 366.503964][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 366.514576][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 366.524635][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 366.536082][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 366.544975][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 366.555480][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 366.570426][ T7033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 366.592707][ T7033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.603632][ T7033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 366.614285][ T7033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.626146][ T7033] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 366.644792][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 366.656344][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 366.668632][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 366.677082][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 366.687786][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 366.707725][ T7335] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 366.733702][ T7335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 366.761550][ T8095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 366.778141][ T8095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 366.818260][ T8095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 366.830298][ T8095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 366.857887][ T8095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 366.867160][ T8095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 366.890649][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 366.898426][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 366.978980][ T7335] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 366.999702][ T6999] device veth0_macvtap entered promiscuous mode [ 367.015271][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 367.025761][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 367.034585][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 367.043202][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 367.050998][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 367.118903][ T6999] device veth1_macvtap entered promiscuous mode [ 367.131665][ T7375] device veth0_vlan entered promiscuous mode [ 367.223291][ T6999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 367.250616][ T6999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 367.270110][ T6999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 367.281710][ T6999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 367.304453][ T6999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 367.329788][ T6999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 367.343408][ T6999] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 367.357297][ T6999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 367.368026][ T6999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 367.379824][ T6999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 367.391195][ T6999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 367.411960][ T6999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 367.423449][ T6999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 367.437748][ T6999] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 367.450218][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 367.460385][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 367.470525][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 367.479836][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 367.488908][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 367.499215][ T7375] device veth1_vlan entered promiscuous mode [ 367.635468][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 367.646468][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 367.720221][ T7335] device veth0_vlan entered promiscuous mode [ 367.762943][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 367.771446][ T6954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 10:43:55 executing program 2: r0 = getpid() perf_event_open(0x0, 0x0, 0x80009, 0xffffffffffffffff, 0x0) prlimit64(r0, 0xe, &(0x7f00000001c0)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000004d40)=[{{&(0x7f0000000100)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, 0x0, 0x0, &(0x7f0000000400)=""/49, 0x31}, 0x207}, {{0x0, 0x0, &(0x7f0000003a40)}, 0x800}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000180)=0x7, 0x4) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000240)={{}, 0x20, 0x5, 0x8}) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r6, r5, 0x0, 0x800000080004103) 10:43:55 executing program 0: socket(0x0, 0x5, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{0x0, 0x0, 0x0}, 0x728b553b}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=""/175, 0xaf}, 0xffffffff}, {{&(0x7f0000004cc0)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000005240)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000001d00)=""/244, 0xf4}, 0x1f}, {{&(0x7f0000001a00)=@sco, 0x80, 0x0}, 0x8}, {{&(0x7f0000001680)=@xdp, 0x80, &(0x7f0000001780)=[{&(0x7f00000000c0)=""/4, 0x4}], 0x1, &(0x7f0000001b80)=""/246, 0xf6}, 0xd9}], 0x5, 0x20, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x1ffe, 0x3}, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x4000, 0x0) [ 367.806429][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 367.816748][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 367.830634][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 367.863723][ T7753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 367.883095][ T7335] device veth1_vlan entered promiscuous mode [ 367.891143][ T7375] device veth0_macvtap entered promiscuous mode [ 367.934928][ T7375] device veth1_macvtap entered promiscuous mode [ 367.994045][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.038481][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.056490][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.072220][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.090047][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.101760][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.112669][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.126575][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.139429][ T7375] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 368.151934][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.170065][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.201046][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.213595][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.224111][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.237291][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.247910][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.264167][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.276846][ T7375] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 368.333225][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 368.341289][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 368.359444][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 368.368790][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 368.384741][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 368.394324][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 368.413911][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 368.422577][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 368.469344][ T7170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 368.478247][ T7170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 368.540211][ T7335] device veth0_macvtap entered promiscuous mode [ 368.555869][ T7335] device veth1_macvtap entered promiscuous mode [ 368.637549][ T7335] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.648606][ T7335] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.661257][ T7335] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.672158][ T7335] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.685552][ T7335] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.696590][ T7335] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.707174][ T7335] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.718094][ T7335] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.728451][ T7335] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.739371][ T7335] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.751080][ T7335] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 368.799717][ T7170] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 368.815786][ T7170] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 368.830253][ T7170] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 368.842542][ T7170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 368.861575][ T7335] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.883033][ T7335] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.895071][ T7335] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.906711][ T7335] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.917019][ T7335] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.929319][ T7335] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.939662][ T7335] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.951224][ T7335] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.961592][ T7335] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.972604][ T7335] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.986075][ T7335] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 369.014821][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 369.026281][ T3272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 10:43:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r1, &(0x7f0000002200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) read$FUSE(r2, &(0x7f0000000540), 0x1000) 10:43:56 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x4c4c) 10:43:56 executing program 3: getpid() perf_event_open(0x0, 0x0, 0x80009, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000004d40)=[{{&(0x7f0000000100)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, 0x0, 0x0, &(0x7f0000000400)=""/49, 0x31}, 0x207}, {{0x0, 0x0, &(0x7f0000003a40)}, 0x800}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000180)=0x7, 0x4) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r5, r4, 0x0, 0x800000080004103) 10:43:56 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd}, 0x0) getpid() socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1}, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/msg\x00', 0x0, 0x0) clone(0x180a983, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xffc}, 0x0, 0x0) 10:43:56 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) preadv(r1, &(0x7f0000000600)=[{&(0x7f0000000380)=""/224, 0xe0}], 0x1, 0x8000068) 10:43:56 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000380)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x1ffe0, 0x0) [ 369.225930][ T8201] IPVS: Unknown mcast interface: rose0 [ 369.241460][ T8202] IPVS: Unknown mcast interface: rose0 10:43:56 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) [ 369.377325][ T28] audit: type=1326 audit(1593513836.921:9): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8203 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f95a code=0x0 10:43:57 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val, @void, @eth={@multicast, @link_local, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0xfce2, 0x0, 0x0, 0x0, 0x6, 0x0, @loopback, @multicast1}, @payload_direct={{{{0x2a, 0x0, 0x0, 0x0, 0x0, 0x8}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}}}}}, 0x50) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x5fffffffd, 0x759e38a3d21f6dff) 10:43:57 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x100, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000100)=0x80000000, 0x4) write(r0, &(0x7f0000000040)="bd38832aa0da3ed709249f2c8e21", 0xca) 10:43:57 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self\x00', 0x40480, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000080)={{0x0, @local, 0x0, 0x0, 'none\x00', 0x0, 0x106, 0xfffffffd}, {@empty, 0x4e22}}, 0x44) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/13) 10:43:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x5}, 0x14) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) [ 370.195822][ T28] audit: type=1326 audit(1593513837.741:10): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8225 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f95a code=0x0 10:43:57 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp6\x00') preadv(r2, &(0x7f00000017c0), 0x333, 0x4c4c) [ 370.271228][ T8250] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 8782) 10:43:57 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @empty, 0x0, 0x0, 'none\x00', 0x0, 0x2}, {@empty}}, 0x44) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) statfs(&(0x7f0000000040)='./file0\x00', 0x0) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) 10:43:58 executing program 0: socket(0x1, 0x5, 0x7e) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000001540)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000001f40), 0x0, &(0x7f00000028c0)=""/214, 0xd6}, 0x7}, {{&(0x7f0000001600)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001700)}, 0x728b553b}, {{&(0x7f0000002a00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001980), 0x0, &(0x7f00000017c0)=""/175, 0xaf}, 0xffffffff}, {{&(0x7f0000004cc0)=@l2tp={0x2, 0x0, @remote}, 0x80, 0x0}}, {{&(0x7f00000053c0)=@ipx, 0x80, &(0x7f00000054c0)=[{&(0x7f0000005440)=""/89, 0x59}], 0x1, &(0x7f0000005500)=""/121, 0x79}, 0x2f4}, {{&(0x7f0000001a00)=@sco, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001940)=""/82, 0x52}, {&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000001700)=""/10, 0xa}, {&(0x7f0000001a80)=""/95, 0x5f}, {&(0x7f0000001b00)=""/65, 0x41}, {&(0x7f0000001e00)=""/56, 0x38}, {&(0x7f0000001e40)=""/115, 0x73}], 0x7, &(0x7f00000015c0)=""/51, 0x33}}], 0x6, 0x20, 0x0) pipe(&(0x7f0000000380)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000480), 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x1ffe, 0x3, 0xfffffffffffffffe}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000280)='encrypted\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x4000, 0x0) ioctl$TIOCL_BLANKSCREEN(r2, 0x541c, &(0x7f0000000100)) [ 370.474610][ T8265] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:43:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xf}, {0x0}, {&(0x7f00000002c0)=""/8, 0x8}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x140, &(0x7f0000000140)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:43:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {&(0x7f00000000c0)="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", 0x238}], 0x2) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b0b, &(0x7f0000000000)='wlan0\x00') 10:43:58 executing program 4: socket(0x0, 0x0, 0x7e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x4, 0x8, 0x3}, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000001540)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000001f40), 0x0, &(0x7f00000028c0)=""/214, 0xd6}, 0x7}, {{&(0x7f0000001600)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001700)}, 0x728b553b}, {{&(0x7f0000002a00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001980), 0x0, &(0x7f00000017c0)=""/175, 0xaf}, 0xffffffff}, {{&(0x7f0000004cc0)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000005240)=[{&(0x7f0000005740)=""/187, 0xbb}, {&(0x7f0000004e00)=""/250, 0xfa}, {&(0x7f0000004f00)=""/200, 0xc8}, {&(0x7f0000005000)=""/151, 0x97}, {&(0x7f0000005700)=""/56, 0x38}, {&(0x7f0000001880)=""/138, 0x8a}, {&(0x7f00000051c0)=""/28, 0x1c}, {&(0x7f0000005200)=""/33, 0x21}], 0x8}, 0x1f}, {{&(0x7f00000053c0)=@ipx, 0x80, &(0x7f00000054c0)=[{&(0x7f0000000300)=""/89, 0x59}], 0x1, &(0x7f0000005500)=""/121, 0x79}, 0x2f4}, {{&(0x7f0000001a00)=@sco, 0x80, &(0x7f0000000200)=[{&(0x7f0000001940)=""/82, 0x52}, {&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000001700)=""/10, 0xa}, {&(0x7f0000001a80)=""/95, 0x5f}, {&(0x7f0000001b00)=""/65, 0x41}, {&(0x7f0000001e00)=""/56, 0x38}, {&(0x7f0000001e40)=""/115, 0x73}, {&(0x7f0000000100)=""/196, 0xc4}], 0x8, &(0x7f00000015c0)=""/51, 0x33}, 0x8}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)=""/246, 0xf6}, 0xd9}], 0x7, 0x20, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x1ffe, 0x3, 0xfffffffffffffffe}, 0x0) read$FUSE(r1, &(0x7f0000000540), 0x1000) 10:43:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 370.690994][ T7014] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 8782) [ 370.738660][ T7014] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 10:43:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x44, 0x5, [{{@in6=@private1, 0x0, 0x3c}, 0x0, @in=@remote}]}]}, 0xfc}}, 0x0) 10:43:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xf}, {0x0}, {&(0x7f00000002c0)=""/8, 0x8}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x10e, &(0x7f0000000180)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:43:58 executing program 5: socket(0x0, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x4, 0x8, 0x3, 0x800000000000}, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000001540)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000001f40), 0x0, &(0x7f00000028c0)=""/214, 0xd6}, 0x7}, {{&(0x7f0000001600)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001700)}, 0x728b553b}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000005500)=""/121, 0x79}, 0x2f4}, {{&(0x7f0000001a00)=@sco, 0x80, 0x0, 0x0, &(0x7f00000015c0)=""/51, 0x33}, 0x8}, {{&(0x7f0000001680)=@xdp, 0x80, &(0x7f0000001780)=[{0x0}, {&(0x7f0000001740)=""/43, 0x2b}], 0x2, &(0x7f0000001b80)=""/246, 0xf6}, 0xd9}], 0x5, 0x20, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x1ffe, 0x3, 0xfffffffffffffffe}, 0x0) read$FUSE(r1, &(0x7f0000000540), 0x1000) 10:43:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="1200000000000000000034f1fe1f465226"]}) 10:43:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'veth0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote, r2}, 0x14) 10:43:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f00000040c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000004bc0)=[{&(0x7f00000007c0)=""/150, 0x96}, {&(0x7f0000000880)=""/165, 0xa5}, {&(0x7f0000000940)=""/30, 0x1e}, {0x0}, {&(0x7f0000003a40)=""/238, 0xee}, {&(0x7f0000006280)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/108, 0x6c}], 0x7}, 0x4}, {{0x0, 0x0, &(0x7f0000004040)=[{&(0x7f0000007280)=""/4096, 0x1000}], 0x1}}], 0x3, 0x0, 0x0) 10:43:59 executing program 0: r0 = getpid() perf_event_open(0x0, 0x0, 0x80009, 0xffffffffffffffff, 0x0) prlimit64(r0, 0xe, &(0x7f00000001c0)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000004d40)=[{{&(0x7f0000000100)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, 0x0, 0x0, &(0x7f0000000400)=""/49, 0x31}, 0x207}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000180)=0x7, 0x4) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000240)={{}, 0x0, 0x5, 0x8}) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r6, r5, 0x0, 0x800000080004103) 10:43:59 executing program 2: r0 = getpid() perf_event_open(0x0, 0x0, 0x80009, 0xffffffffffffffff, 0x0) prlimit64(r0, 0xe, &(0x7f00000001c0)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000004d40)=[{{&(0x7f0000000100)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, 0x0, 0x0, &(0x7f0000000400)=""/49, 0x31}, 0x207}, {{0x0, 0x0, &(0x7f0000003a40)}, 0x800}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000180)=0x7, 0x4) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x8000, 0x80401) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000240)={{}, 0x20, 0x5, 0x8}) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r6, r5, 0x0, 0x800000080004103) 10:44:01 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) 10:44:01 executing program 4: r0 = getpid() perf_event_open(0x0, 0x0, 0x80009, 0xffffffffffffffff, 0x0) prlimit64(r0, 0xe, &(0x7f00000001c0)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000004d40)=[{{&(0x7f0000000100)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, 0x0, 0x0, &(0x7f0000000400)=""/49, 0x31}, 0x207}, {{0x0, 0x0, &(0x7f0000003a40)}, 0x800}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000180)=0x7, 0x4) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000240)={{}, 0x0, 0x5, 0x8}) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r6, r5, 0x0, 0x800000080004103) 10:44:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x3, [@struct={0x0, 0x4, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}]}, @int]}, {0x0, [0x0]}}, 0x0, 0x67}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 10:44:01 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) r1 = getpid() ioctl$MON_IOCX_MFETCH(r0, 0x4018920a, &(0x7f0000000140)={0x0}) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) socketpair$unix(0x1, 0x80000000003, 0x0, 0x0) 10:44:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xffffffef) recvmmsg(r1, &(0x7f0000001380)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)=""/19, 0x13}, {&(0x7f0000000400)=""/97, 0x61}], 0x2}}], 0x1, 0x0, 0x0) [ 373.753495][ C0] hrtimer: interrupt took 73281 ns 10:44:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x94, 0x94, 0x3, [@struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x3, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}]}, @int]}, {0x0, [0x0]}}, 0x0, 0xaf}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 10:44:01 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000340)={{0x7, 0x4, 0x5, 0x0, '\x00', 0x800}, 0x0, 0x10000066, 0xec4, 0xffffffffffffffff, 0x9, 0xffffff72, 'syz0\x00', &(0x7f00000002c0)=['^(]#\x00', 'threaded\x00', '\x00', '\x00', 'system.posix_acl_default\x00', 'threaded\x00', 'threaded\x00', 'threaded\x00', '\x00'], 0x45, [], [0xaf33, 0xff1f, 0x7, 0x1ff0]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e22, @private=0xa010102}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000001001000001000000ec0000000000000005df89a1033cedb040936a3460c898b78af306de38c052050de547ada587699af04307b4553a8200e169d5d038154dc9e78a3c3188dfae531a6d77b8af1239e5ef2ad0fb90754919d51f"], 0x18}}], 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) ioctl$sock_netdev_private(r5, 0x89f2, &(0x7f0000000200)="047c2fa58dc4d230b2e66c305b08534aebe773d82c43eadd4d50ce72d9239cd0c7c0261e8af834fa201735e8d4b705df9b99907f54e4b6c0d1424891eb540fee7822d7fbf9216737be0426d1c1bd43f7a5e00944a24fecdfe77e2277a06b098b01e8ac236886f3e30a9d58d9998314d045a71cb24173933b0860d1e759b0307cb31b69caeca179b081ff94a6f3461f7ba2bd263dcd1edb2f25e1bb3e9f56cefbab866b02d0e7025a327690") socket$inet6_tcp(0xa, 0x1, 0x0) 10:44:01 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000c00)=""/155, 0x9b}, {&(0x7f0000000bc0)=""/15, 0xf}], 0x2}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000d80)=""/97, 0x61}, {&(0x7f0000000ac0)=""/243, 0xf3}], 0x2}}], 0x2, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000100), 0xc, &(0x7f0000000a40)={0x0, 0x108}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x16b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000001fc0)=""/4109, 0xf2}, {&(0x7f0000000400)=""/104, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 10:44:01 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) membarrier(0x0, 0x0) dup2(r0, r1) 10:44:02 executing program 3: syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000340)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000380)=[{&(0x7f0000000440)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="82e802000000de36880900000000000000a7ed6e87fe67b594d2", 0x1a}], 0x0, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/75) 10:44:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x3) dup2(r0, r1) 10:44:02 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x11}) 10:44:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000040)=ANY=[@ANYBLOB="ee6a0b537b2c314093c2b61b34136c39d34957740000000000000000000000000000f4ff0000000000000000000000000000000000000000b0cf9f48c2b9c80a38b13f880600005003000040040087c051160001c6"], 0x1) 10:44:02 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x3) dup2(r0, r1) 10:44:02 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000100)) 10:44:02 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = inotify_init1(0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) semget(0x1, 0x1, 0x185) fcntl$setown(r0, 0x8, 0xffffffffffffffff) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'vxcan0\x00'}) r1 = dup(0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="28040000", @ANYRES16=0x0, @ANYBLOB="010029bd7000000000000100000008000100", @ANYRES32=0x0, @ANYBLOB="c0000280400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004001a29000008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004006808000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000014000400060001019a0100000600e00900100000080001", @ANYRES32=0x0, @ANYBLOB="400002803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="3802028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000110004006163746976656261636b75700000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400ff070000080007000000000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400000100003c00010024000100656e61626c656400"/221, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72748f2a0c3c5f7374617473007800000000000000000000000023fc331800000000000b0000000800040042", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040004000000080007000000000008000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c6564000000000000000000000000000000000000000000000000000500030006000000", @ANYRES32=0x0, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000080000008000600", @ANYRES32=0x0, @ANYBLOB], 0x428}, 0x1, 0x0, 0x0, 0x200008c4}, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x6, &(0x7f00000000c0), 0x4) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r1, &(0x7f0000000100)={0x18, 0xfffffffffffffff5, 0x3, {0x7fff}}, 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) dup(0xffffffffffffffff) 10:44:02 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = socket(0x10, 0x803, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) unshare(0x2a000400) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000080)) 10:44:02 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x3) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) dup2(r0, r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) write$binfmt_misc(0xffffffffffffffff, 0x0, 0xfffffecc) 10:44:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x3, [@struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x4, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}]}, @int]}, {0x0, [0x0]}}, 0x0, 0xbb}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 10:44:02 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0x4018920a, &(0x7f0000000140)={0x0}) 10:44:02 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) membarrier(0x10, 0x0) dup2(0xffffffffffffffff, r0) [ 375.179197][ T8430] ptrace attach of "/root/syz-executor.4"[7335] was attempted by "/root/syz-executor.4"[8430] [ 375.261245][ T8434] ptrace attach of "/root/syz-executor.4"[7335] was attempted by "/root/syz-executor.4"[8434] 10:44:02 executing program 3: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 10:44:02 executing program 0: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() tkill(r2, 0x1000000000016) r3 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8)={[0xfffffffffffffffc]}, 0x8) read(r3, &(0x7f0000000740)=""/384, 0x200008c0) 10:44:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:44:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "09aa3e106a8974ee0cfb3668874892021980f5"}) 10:44:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000340)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000380)=[{&(0x7f0000000440)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="82e802000000de36880900000000000000a7ed6e87fe67b594d2", 0x1a}], 0x0, 0x0) 10:44:03 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x30}}, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0x4018920a, &(0x7f0000000140)={0x0}) 10:44:03 executing program 5: ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000680)=""/86, 0x56}], 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 10:44:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_pts(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() semop(0x0, &(0x7f0000000200)=[{0x0, 0xffffffff}], 0x1) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) 10:44:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@func, @int={0xd}]}, {0x0, [0x0]}}, 0x0, 0x37}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 10:44:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x2da71dec3908d791, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x3) dup2(r0, r1) 10:44:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xa) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x3) dup2(r0, r1) prctl$PR_SET_FPEXC(0xc, 0x80) 10:44:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x145, 0x145, 0x4, [@datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], "da"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x164}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 10:44:03 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x3) membarrier(0x0, 0x0) dup2(r0, r1) 10:44:06 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000040)=ANY=[@ANYBLOB="ee6a0b537b2c314093c2b61b34136c39d34957740000000000000000000000000000f4ff0000000000000000000000000000000000000000b0cf9f48c2b9c80a38b13f880600005003000040040087c051160001c6"], 0x1) r3 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, 0x0) 10:44:06 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0x4018920a, &(0x7f0000000140)={0x0}) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 10:44:06 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000680)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:44:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x146}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000480)="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", 0x271) sendfile(r2, r3, 0x0, 0x7fffffff) write$FUSE_ATTR(r2, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 10:44:06 executing program 2: ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000680)=""/86, 0x56}], 0x1, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) 10:44:06 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0x4018920a, &(0x7f0000000140)={0x0}) [ 378.520394][ T28] audit: type=1800 audit(1593513846.062:11): pid=8516 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15823 res=0 [ 378.544976][ C0] traps: PANIC: double fault, error_code: 0x0 [ 378.544982][ C0] double fault: 0000 [#1] PREEMPT SMP KASAN [ 378.544988][ C0] CPU: 0 PID: 8513 Comm: syz-executor.3 Not tainted 5.8.0-rc2-syzkaller #0 [ 378.544995][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.544999][ C0] RIP: 0010:fixup_bad_iret+0x24/0x170 [ 378.545011][ C0] Code: eb cb 0f 1f 40 00 41 55 49 bd 00 00 00 00 00 fc ff df 41 54 55 48 89 fd 48 c7 c7 e0 83 45 88 53 48 81 ec 40 01 00 00 48 89 e3 <48> c7 04 24 b3 8a b5 41 48 c7 44 24 08 9f 96 66 89 48 c1 eb 03 48 [ 378.545016][ C0] RSP: 0018:fffffe0000001fb8 EFLAGS: 00010086 [ 378.545025][ C0] RAX: 0000000000000000 RBX: fffffe0000001fb8 RCX: ffffffff88000e87 [ 378.545035][ C0] RDX: 0000000000000000 RSI: ffffffff880009a8 RDI: ffffffff884583e0 [ 378.545041][ C0] RBP: fffffe0000002120 R08: 0000000000000000 R09: 0000000000000000 [ 378.545046][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 378.545052][ C0] R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 [ 378.545059][ C0] FS: 00007fd4644d3700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 378.545063][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 378.545069][ C0] CR2: fffffe0000001fb8 CR3: 000000009ec56000 CR4: 00000000001406f0 [ 378.545075][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 378.545080][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 378.545083][ C0] Call Trace: [ 378.545086][ C0] [ 378.545089][ C0] error_entry+0xb8/0xc0 [ 378.545093][ C0] RIP: 0010:native_irq_return_iret+0x0/0x2 10:44:06 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002840)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r0, &(0x7f0000000380)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}}}, 0x90) [ 378.545106][ C0] Code: 5a 41 59 41 58 58 59 5a 5e 5f 48 83 c4 08 e9 10 00 00 00 90 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 f6 44 24 20 04 75 02 <48> cf 57 0f 01 f8 0f 1f 00 65 48 8b 3c 25 00 90 01 00 48 89 07 48 [ 378.545110][ C0] RSP: 0018:fffffe00000021d8 EFLAGS: 00010046 ORIG_RAX: 0000000000000000 [ 378.545120][ C0] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 378.545125][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000100 [ 378.545131][ C0] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 378.545137][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 378.545142][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0030656c69662f2e [ 378.545146][ C0] ? asm_exc_general_protection+0x8/0x30 [ 378.545150][ C0] RIP: 0033:0x30656c69662f2e [ 378.545153][ C0] Code: Bad RIP value. [ 378.545159][ C0] RSP: 002b:00007fd4644d2c78 EFLAGS: 00000346 [ 378.545162][ C0] Modules linked in: [ 378.800144][ C0] ---[ end trace 83be2be0a5aa3031 ]--- [ 378.800149][ C0] RIP: 0010:fixup_bad_iret+0x24/0x170 [ 378.800161][ C0] Code: eb cb 0f 1f 40 00 41 55 49 bd 00 00 00 00 00 fc ff df 41 54 55 48 89 fd 48 c7 c7 e0 83 45 88 53 48 81 ec 40 01 00 00 48 89 e3 <48> c7 04 24 b3 8a b5 41 48 c7 44 24 08 9f 96 66 89 48 c1 eb 03 48 [ 378.800165][ C0] RSP: 0018:fffffe0000001fb8 EFLAGS: 00010086 [ 378.800173][ C0] RAX: 0000000000000000 RBX: fffffe0000001fb8 RCX: ffffffff88000e87 [ 378.800179][ C0] RDX: 0000000000000000 RSI: ffffffff880009a8 RDI: ffffffff884583e0 [ 378.800185][ C0] RBP: fffffe0000002120 R08: 0000000000000000 R09: 0000000000000000 [ 378.800190][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 378.800196][ C0] R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 [ 378.800203][ C0] FS: 00007fd4644d3700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 378.800208][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 378.800213][ C0] CR2: fffffe0000001fb8 CR3: 000000009ec56000 CR4: 00000000001406f0 [ 378.800219][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 378.800225][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 378.800230][ C0] Kernel panic - not syncing: Fatal exception in interrupt [ 378.801647][ C0] Kernel Offset: disabled