[ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.36' (ECDSA) to the list of known hosts. 2020/05/08 07:55:52 fuzzer started 2020/05/08 07:55:52 dialing manager at 10.128.0.105:45985 2020/05/08 07:55:53 syscalls: 3055 2020/05/08 07:55:53 code coverage: enabled 2020/05/08 07:55:53 comparison tracing: enabled 2020/05/08 07:55:53 extra coverage: enabled 2020/05/08 07:55:53 setuid sandbox: enabled 2020/05/08 07:55:53 namespace sandbox: enabled 2020/05/08 07:55:53 Android sandbox: /sys/fs/selinux/policy does not exist 2020/05/08 07:55:53 fault injection: enabled 2020/05/08 07:55:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/08 07:55:53 net packet injection: enabled 2020/05/08 07:55:53 net device setup: enabled 2020/05/08 07:55:53 concurrency sanitizer: enabled 2020/05/08 07:55:53 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/08 07:55:53 USB emulation: enabled syzkaller login: [ 51.702276][ T8914] KCSAN: could not find function: 'poll_schedule_timeout' [ 54.070802][ T8914] KCSAN: could not find function: '_find_next_bit' 2020/05/08 07:55:58 adding functions to KCSAN blacklist: 'do_exit' 'shmem_getpage_gfp' '__ext4_new_inode' 'do_signal_stop' 'xas_clear_mark' 'futex_wait_queue_me' 'poll_schedule_timeout' 'ext4_free_inodes_count' 'do_nanosleep' 'pcpu_alloc' '__x64_sys_ptrace' 'ext4_da_write_end' 'generic_write_end' 'copy_process' 'page_counter_charge' 'wg_packet_send_staged_packets' 'blk_mq_get_request' 'kauditd_thread' 'ep_poll' 'run_timer_softirq' 'dd_has_work' 'mod_timer' '_find_next_bit' '__add_to_page_cache_locked' 'shmem_file_read_iter' 'vm_area_dup' 'io_sq_thread' 'pipe_double_lock' 'do_wait' 'wbt_done' 'echo_char' 'xas_find_marked' 'atime_needs_update' 'add_timer' 'decrypt_packet' 'tick_sched_do_timer' 'blk_mq_sched_dispatch_requests' '__process_echoes' 'lookup_fast' 'audit_log_start' 'ktime_get_real_seconds' 'find_get_pages_range_tag' 'tick_nohz_idle_stop_tick' 'ext4_mark_iloc_dirty' 'generic_fillattr' 'blk_mq_dispatch_rq_list' 07:58:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706018300000000400000000000000005000100fe"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 214.966804][ T8918] IPVS: ftp: loaded support on port[0] = 21 [ 215.051952][ T8918] chnl_net:caif_netlink_parms(): no params data found 07:58:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="84000000000119050005000000000000000000003c0001002c0001001400030000000000000000008b704e2c766ec59d14000400fe800000000000007191e355000002bb0c0002000500010000000000240002000c0002000500010000000000140001000800010000112c0013000200e00000010800070008000000080010"], 0x84}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x39, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 215.095470][ T8918] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.102971][ T8918] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.110712][ T8918] device bridge_slave_0 entered promiscuous mode [ 215.130600][ T8918] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.137688][ T8918] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.160066][ T8918] device bridge_slave_1 entered promiscuous mode [ 215.200040][ T8918] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 215.221635][ T8918] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 215.248328][ T9056] IPVS: ftp: loaded support on port[0] = 21 [ 215.262896][ T8918] team0: Port device team_slave_0 added [ 215.284339][ T8918] team0: Port device team_slave_1 added [ 215.311923][ T8918] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 215.318888][ T8918] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 215.345475][ T8918] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 215.359939][ T8918] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 215.367038][ T8918] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 215.394613][ T8918] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 07:58:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) [ 215.461360][ T8918] device hsr_slave_0 entered promiscuous mode [ 215.530766][ T8918] device hsr_slave_1 entered promiscuous mode [ 215.605412][ T9106] IPVS: ftp: loaded support on port[0] = 21 [ 215.683034][ T9056] chnl_net:caif_netlink_parms(): no params data found 07:58:38 executing program 3: perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) close(r0) [ 215.781842][ T9056] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.790890][ T9056] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.798597][ T9056] device bridge_slave_0 entered promiscuous mode [ 215.815019][ T9056] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.823550][ T9056] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.833227][ T9056] device bridge_slave_1 entered promiscuous mode [ 215.849698][ T9106] chnl_net:caif_netlink_parms(): no params data found [ 215.865147][ T8918] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 215.932389][ T8918] netdevsim netdevsim0 netdevsim1: renamed from eth1 07:58:38 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) write$binfmt_script(r1, &(0x7f0000002800)=ANY=[@ANYBLOB="2321202e2f66696c653020f014"], 0x191) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x2, 0x0, 0x5, 0x2, 0x80000000}, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x7, &(0x7f00000002c0)=""/216) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000000)={0x2, 'bond_slave_0\x00', {0x6}, 0x4}) [ 216.057435][ T9358] IPVS: ftp: loaded support on port[0] = 21 [ 216.063652][ T8918] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 216.102035][ T8918] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 216.160116][ T9056] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 216.191511][ T9056] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 216.235134][ T9106] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.252182][ T9106] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.260564][ T9106] device bridge_slave_0 entered promiscuous mode [ 216.268841][ T9106] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.276225][ T9106] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.284379][ T9106] device bridge_slave_1 entered promiscuous mode [ 216.296813][ T9056] team0: Port device team_slave_0 added [ 216.322250][ T9056] team0: Port device team_slave_1 added [ 216.325367][ T9417] IPVS: ftp: loaded support on port[0] = 21 [ 216.370402][ T9056] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 216.377410][ T9056] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 216.405647][ T9056] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 07:58:38 executing program 5: ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x8200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) msgsnd(0x0, &(0x7f0000000340)={0x3}, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) [ 216.418851][ T9056] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 216.432424][ T9056] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 216.460227][ T9056] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 216.503458][ T9106] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 216.525471][ T9358] chnl_net:caif_netlink_parms(): no params data found [ 216.562389][ T9056] device hsr_slave_0 entered promiscuous mode [ 216.609462][ T9056] device hsr_slave_1 entered promiscuous mode [ 216.659388][ T9056] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 216.666953][ T9056] Cannot create hsr debugfs directory [ 216.677501][ T8918] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.687012][ T9106] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 216.715477][ T9542] IPVS: ftp: loaded support on port[0] = 21 [ 216.722563][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.730291][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.759752][ T8918] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.789954][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.798350][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.806718][ T4135] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.813784][ T4135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.823531][ T9106] team0: Port device team_slave_0 added [ 216.833650][ T9106] team0: Port device team_slave_1 added [ 216.847608][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.899161][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.907851][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.916996][ T5299] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.924045][ T5299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.932417][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.941536][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.950563][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.959368][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.967976][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.977078][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.004542][ T9106] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 217.013584][ T9106] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 217.040202][ T9106] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 217.058639][ T8918] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 217.069201][ T8918] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 217.080518][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.088372][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.096751][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.105324][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.113790][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.122166][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.138742][ T9358] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.148515][ T9358] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.156369][ T9358] device bridge_slave_0 entered promiscuous mode [ 217.164841][ T9106] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 217.172018][ T9106] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 217.200266][ T9106] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 217.235097][ T9358] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.244445][ T9358] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.253256][ T9358] device bridge_slave_1 entered promiscuous mode [ 217.264647][ T9056] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 217.312188][ T9056] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 217.381609][ T9056] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 217.443982][ T9056] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 217.508140][ T9417] chnl_net:caif_netlink_parms(): no params data found [ 217.539235][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.546660][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 217.556759][ T9358] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 217.583543][ T8918] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.594667][ T9358] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 217.631085][ T9106] device hsr_slave_0 entered promiscuous mode [ 217.669346][ T9106] device hsr_slave_1 entered promiscuous mode [ 217.709031][ T9106] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 217.716590][ T9106] Cannot create hsr debugfs directory [ 217.729902][ T9542] chnl_net:caif_netlink_parms(): no params data found [ 217.769540][ T9358] team0: Port device team_slave_0 added [ 217.778304][ T9358] team0: Port device team_slave_1 added [ 217.795780][ T9358] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 217.803010][ T9358] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 217.829011][ T9358] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 217.841547][ T9358] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 217.848751][ T9358] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 217.874983][ T9358] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 217.913865][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 217.923136][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.959004][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 217.967330][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.001237][ T9358] device hsr_slave_0 entered promiscuous mode [ 218.049274][ T9358] device hsr_slave_1 entered promiscuous mode [ 218.089034][ T9358] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 218.096591][ T9358] Cannot create hsr debugfs directory [ 218.113126][ T9417] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.120232][ T9417] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.127848][ T9417] device bridge_slave_0 entered promiscuous mode [ 218.141436][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.150121][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.162431][ T8918] device veth0_vlan entered promiscuous mode [ 218.174093][ T9417] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.181282][ T9417] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.188761][ T9417] device bridge_slave_1 entered promiscuous mode [ 218.222763][ T9542] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.231036][ T9542] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.238464][ T9542] device bridge_slave_0 entered promiscuous mode [ 218.254464][ T8918] device veth1_vlan entered promiscuous mode [ 218.279138][ T9417] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 218.288270][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 218.296927][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 218.306334][ T9542] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.313916][ T9542] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.321798][ T9542] device bridge_slave_1 entered promiscuous mode [ 218.341811][ T9417] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 218.370079][ T9056] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.388032][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.403252][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.422092][ T9542] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 218.433286][ T9542] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 218.443244][ T9106] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 218.491810][ T9417] team0: Port device team_slave_0 added [ 218.499599][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.507319][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.523166][ T8918] device veth0_macvtap entered promiscuous mode [ 218.535723][ T9106] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 218.572029][ T9417] team0: Port device team_slave_1 added [ 218.593074][ T9056] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.602769][ T8918] device veth1_macvtap entered promiscuous mode [ 218.613044][ T9106] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 218.653666][ T9542] team0: Port device team_slave_0 added [ 218.664296][ T9542] team0: Port device team_slave_1 added [ 218.681507][ T9106] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 218.713729][ T9417] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 218.720792][ T9417] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 218.746755][ T9417] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 218.759175][ T9417] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 218.766124][ T9417] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 218.793580][ T9417] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 218.805488][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 218.813701][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.825308][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.834029][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.844711][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.851834][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.862557][ T9542] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 218.870030][ T9542] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 218.896389][ T9542] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 218.909003][ T9542] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 218.916028][ T9542] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 218.942030][ T9542] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 218.954621][ T9358] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 219.019940][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.028019][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.037429][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.045961][ T9568] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.053363][ T9568] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.061557][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.076751][ T8918] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 219.131621][ T9542] device hsr_slave_0 entered promiscuous mode [ 219.189382][ T9542] device hsr_slave_1 entered promiscuous mode [ 219.248986][ T9542] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 219.256607][ T9542] Cannot create hsr debugfs directory [ 219.262857][ T9358] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 219.320582][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.329660][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.342301][ T8918] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 219.421045][ T9417] device hsr_slave_0 entered promiscuous mode [ 219.479340][ T9417] device hsr_slave_1 entered promiscuous mode [ 219.519227][ T9417] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 219.519244][ T9417] Cannot create hsr debugfs directory [ 219.548929][ T9358] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 219.580766][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 219.589833][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 219.598567][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.630570][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.641967][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.650891][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.661764][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.670631][ T9358] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 219.807987][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.817136][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.827862][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.896288][ T9056] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 219.907408][ T9056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.916147][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.925518][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.977457][ T9106] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.027583][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.038233][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.049828][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 220.057298][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.093224][ T9056] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.102586][ T9542] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 220.117958][ T27] audit: type=1804 audit(1588924722.523:2): pid=10157 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir182229835/syzkaller.hGsh5i/0/cgroup.controllers" dev="sda1" ino=15735 res=1 [ 220.200991][ T9542] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 220.215343][ T9106] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.229488][ T9542] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 220.273260][ T9542] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 220.332662][ T9417] netdevsim netdevsim4 netdevsim0: renamed from eth0 07:58:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706018300000000400000000000000005000100fe"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 220.373530][ T9417] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 220.441360][ T9417] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 220.496373][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.511026][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.527812][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.534985][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.571267][ T9417] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 220.579835][ T27] audit: type=1804 audit(1588924722.993:3): pid=10180 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir182229835/syzkaller.hGsh5i/1/cgroup.controllers" dev="sda1" ino=15735 res=1 [ 220.635889][ T9358] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.648787][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.683042][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 220.691834][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 220.701357][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.710086][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.718405][ T5266] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.725539][ T5266] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.733674][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.748221][ T9358] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.770621][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.778492][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.786695][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 220.795409][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.804905][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 220.813781][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.822215][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.834183][ T9056] device veth0_vlan entered promiscuous mode [ 220.859616][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 220.867435][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 220.876371][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.885010][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.894017][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.902674][ T9902] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.909741][ T9902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.920294][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 07:58:43 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB]) sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/82, 0x52}}], 0x1, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 220.931510][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.940491][ T9902] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.947509][ T9902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.960874][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.969519][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.012919][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.021752][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.032931][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.042931][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 221.054586][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.063202][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.075302][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.084289][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.095478][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.104799][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.116221][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.129556][ T9106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 221.138785][ T9056] device veth1_vlan entered promiscuous mode [ 221.155117][ T9542] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.164310][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 221.176650][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 221.193275][ T9358] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 221.205645][ T9358] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 221.228400][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 221.236838][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.245280][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.254338][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 221.262797][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.279949][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 221.296235][ T9417] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.322712][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.334853][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.344603][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 221.352858][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 221.368498][ T9106] 8021q: adding VLAN 0 to HW filter on device batadv0 07:58:43 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB]) sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/82, 0x52}}], 0x1, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 221.398260][ T9056] device veth0_macvtap entered promiscuous mode [ 221.409597][ T9542] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.424533][ T9056] device veth1_macvtap entered promiscuous mode [ 221.440556][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 221.450233][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 221.458671][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 221.472136][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.481718][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.489947][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 221.501367][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 221.526348][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 221.534837][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.547646][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.573267][ T5266] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.581126][ T5266] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.592374][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.601828][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.613503][ T5266] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.620641][ T5266] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.628628][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.641043][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.653917][ T9056] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 07:58:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write(r4, &(0x7f00000002c0)="c4c074f7b86b758f143bcc14a8dbda4e04405ca86cacc2fd6e08388fbdd899e71c0a189ae454a1f02be7c343e89c6cb19032bc88fc4540863f2f2d9d885edfa7c08e6d0256b3a653385d0c9b827ec9401b4acbd963b3d9aadf680439db8aba3c126201b8531f551638a1dd9d22de30a2a7ea0a31012f0aca3d8e4ff9c1", 0x7d) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x38, 0x0, 0x400, 0x70bd2d, 0x0, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x80000001, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8000}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x4, 0x101, 0x0]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008844}, 0x48040) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) [ 221.665103][ T9056] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.677240][ T9056] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 221.687109][ T9417] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.698253][ T9358] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 221.711386][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.723110][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 221.731856][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 221.744152][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 221.753077][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 221.762429][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.771378][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.782812][ T9056] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.794737][ T9056] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.805922][ T9056] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 221.839225][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 221.848823][ C0] hrtimer: interrupt took 38918 ns [ 221.856837][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 221.874327][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 221.885219][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.894680][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.905069][ T9902] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.912127][ T9902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.924871][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.933801][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.944895][ T9902] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.951951][ T9902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.962990][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.971902][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.983062][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.991639][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.008895][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.024028][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 222.033230][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.066816][ T9106] device veth0_vlan entered promiscuous mode [ 222.130043][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.137685][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.145990][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.154448][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.163313][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.179824][ T9542] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 222.244762][ T9106] device veth1_vlan entered promiscuous mode [ 222.252919][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 222.260991][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.270003][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 222.278587][ T9902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 222.363748][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 222.371816][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.394325][ T9568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.394530][T10217] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 222.421584][T10217] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 222.432567][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.439115][T10217] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 222.444704][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.462872][T10218] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 07:58:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)={0xfff, 0x8001, 0x0, 0x0, 0x9, "7dc26e3a19bc62d8"}) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x101000, 0x0) getpid() write(0xffffffffffffffff, 0x0, 0x0) [ 222.465921][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.473068][T10218] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 222.490636][T10218] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 222.498560][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 222.513278][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.541352][ T9358] device veth0_vlan entered promiscuous mode [ 222.570868][ T9542] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 222.582818][ T9417] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 222.609138][ T9417] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 222.635847][ T9106] device veth0_macvtap entered promiscuous mode [ 222.649683][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.657487][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.681004][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 07:58:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write(r4, &(0x7f00000002c0)="c4c074f7b86b758f143bcc14a8dbda4e04405ca86cacc2fd6e08388fbdd899e71c0a189ae454a1f02be7c343e89c6cb19032bc88fc4540863f2f2d9d885edfa7c08e6d0256b3a653385d0c9b827ec9401b4acbd963b3d9aadf680439db8aba3c126201b8531f551638a1dd9d22de30a2a7ea0a31012f0aca3d8e4ff9c1", 0x7d) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x38, 0x0, 0x400, 0x70bd2d, 0x0, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x80000001, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8000}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x4, 0x101, 0x0]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008844}, 0x48040) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) [ 222.699330][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.717083][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.739279][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.781509][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 222.804736][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 222.828586][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 222.838018][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 222.858143][ T9358] device veth1_vlan entered promiscuous mode 07:58:45 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)={0xfff, 0x8001, 0x0, 0x0, 0x9, "7dc26e3a19bc62d8"}) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x101000, 0x0) getpid() write(0xffffffffffffffff, 0x0, 0x0) [ 222.891847][ T9106] device veth1_macvtap entered promiscuous mode [ 222.906859][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 222.916741][ T4135] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 222.957737][ T9417] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 222.991322][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 223.000166][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 223.049875][ T9106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 223.069956][ T9106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.106079][ T9106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 223.118021][ T9106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.138567][ T9106] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 223.154543][ T9358] device veth0_macvtap entered promiscuous mode [ 223.170231][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 223.182489][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 223.194421][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 07:58:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)={0x0, 0x8001, 0x9, 0xff, 0x9, "7dc26e3a19bc62d8"}) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x101000, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]) r3 = getpid() sched_setattr(r3, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/82, 0x52}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000000c0)) write(0xffffffffffffffff, 0x0, 0x0) [ 223.208064][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 223.219856][ T9106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 223.247383][ T9106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.286115][ T9106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 223.318912][ T9106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.341741][ T9106] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 223.362943][ T9358] device veth1_macvtap entered promiscuous mode [ 223.374720][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 223.385718][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 223.396530][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 223.406276][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.424512][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 223.433668][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 223.487990][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 223.501978][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 223.514358][ T9358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 223.531116][ T9358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.541036][ T9358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 223.551517][ T9358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.561430][ T9358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 223.571927][ T9358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.583455][ T9358] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 223.594775][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 223.622081][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 223.656733][ T9542] device veth0_vlan entered promiscuous mode [ 223.683415][ T9358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 223.708817][ T9358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.718633][ T9358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 223.729907][ T9358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.740268][ T9358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 223.752397][ T9358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.764447][ T9358] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 223.772498][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 223.788118][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 223.801377][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 223.810193][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.869183][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 223.876972][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 223.932184][ T9542] device veth1_vlan entered promiscuous mode [ 223.943743][ T9417] device veth0_vlan entered promiscuous mode [ 223.964298][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 223.973646][ T5266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 223.989726][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 223.997516][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 07:58:46 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) [ 224.141611][ T9417] device veth1_vlan entered promiscuous mode [ 224.201520][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 224.221877][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 224.244056][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 224.256954][ T9542] device veth0_macvtap entered promiscuous mode [ 224.281333][T10285] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) [ 224.291137][ T9542] device veth1_macvtap entered promiscuous mode [ 224.305754][ T9417] device veth0_macvtap entered promiscuous mode [ 224.317403][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 224.328532][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 224.340160][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 224.348247][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 224.359814][ T5299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 224.382349][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.393358][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.409681][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.423011][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.433505][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.444918][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.455305][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.466145][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.477540][ T9542] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 224.485587][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 224.494565][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 07:58:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) [ 224.503586][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 224.521183][ T9417] device veth1_macvtap entered promiscuous mode [ 224.539463][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.553110][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.563531][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.574348][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.584567][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.595451][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.609675][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.621563][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.635532][ T9542] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 224.648338][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 224.657293][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 224.679772][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 224.715647][ T9417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.732643][ T9417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.743675][ T9417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.759571][ T9417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.772363][ T9417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.783442][ T9417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.793886][ T9417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.804751][ T9417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.815173][ T9417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.826016][ T9417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.837432][ T9417] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 224.847937][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 224.858118][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 224.870181][ T9417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.881130][ T9417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.891064][ T9417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.901518][ T9417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.911353][ T9417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.921772][ T9417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.931679][ T9417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.942189][ T9417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.952187][ T9417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.962989][ T9417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.974022][ T9417] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 224.988014][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 224.996921][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 227.289721][ T0] NOHZ: local_softirq_pending 08 07:58:50 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) write$binfmt_script(r1, &(0x7f0000002800)=ANY=[@ANYBLOB="2321202e2f66696c653020f014"], 0x191) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x2, 0x0, 0x5, 0x2, 0x80000000}, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x7, &(0x7f00000002c0)=""/216) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000000)={0x2, 'bond_slave_0\x00', {0x6}, 0x4}) 07:58:50 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002840)={0x90, 0x0, 0x2}, 0x90) open(&(0x7f0000000000)='./file0/file1\x00', 0x0, 0x0) 07:58:50 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000280)=""/121, 0x200002f9) 07:58:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) 07:58:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write(r4, &(0x7f00000002c0)="c4c074f7b86b758f143bcc14a8dbda4e04405ca86cacc2fd6e08388fbdd899e71c0a189ae454a1f02be7c343e89c6cb19032bc88fc4540863f2f2d9d885edfa7c08e6d0256b3a653385d0c9b827ec9401b4acbd963b3d9aadf680439db8aba3c126201b8531f551638a1dd9d22de30a2a7ea0a31012f0aca3d8e4ff9c1", 0x7d) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x4, 0x101, 0x0]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008844}, 0x48040) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 07:58:50 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20082, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) getpid() pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x20000000000}, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xefffffffffffffff, r1, 0x0) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, 0x0, 0x800000080004103) 07:58:50 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) write$binfmt_script(r1, &(0x7f0000002800)=ANY=[@ANYBLOB="2321202e2f66696c653020f014"], 0x191) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x2, 0x0, 0x5, 0x2, 0x80000000}, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x7, &(0x7f00000002c0)=""/216) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000000)={0x2, 'bond_slave_0\x00', {0x6}, 0x4}) 07:58:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) 07:58:51 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) write$binfmt_script(r1, &(0x7f0000002800)=ANY=[@ANYBLOB="2321202e2f66696c653020f014"], 0x191) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x2, 0x0, 0x5, 0x2, 0x80000000}, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x7, &(0x7f00000002c0)=""/216) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000000)={0x2, 'bond_slave_0\x00', {0x6}, 0x4}) 07:58:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) 07:58:51 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20082, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) getpid() pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x20000000000}, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xefffffffffffffff, r1, 0x0) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, 0x0, 0x800000080004103) 07:58:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write(r4, &(0x7f00000002c0)="c4c074f7b86b758f143bcc14a8dbda4e04405ca86cacc2fd6e08388fbdd899e71c0a189ae454a1f02be7c343e89c6cb19032bc88fc4540863f2f2d9d885edfa7c08e6d0256b3a653385d0c9b827ec9401b4acbd963b3d9aadf680439db8aba3c126201b8531f551638a1dd9d22de30a2a7ea0a31012f0aca3d8e4ff9c1", 0x7d) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x4, 0x101, 0x0]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008844}, 0x48040) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 07:58:51 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20082, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) getpid() pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x20000000000}, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xefffffffffffffff, r1, 0x0) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, 0x0, 0x800000080004103) 07:58:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) 07:58:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) 07:58:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write(r4, &(0x7f00000002c0)="c4c074f7b86b758f143bcc14a8dbda4e04405ca86cacc2fd6e08388fbdd899e71c0a189ae454a1f02be7c343e89c6cb19032bc88fc4540863f2f2d9d885edfa7c08e6d0256b3a653385d0c9b827ec9401b4acbd963b3d9aadf680439db8aba3c126201b8531f551638a1dd9d22de30a2a7ea0a31012f0aca3d8e4ff9c1", 0x7d) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x4, 0x101, 0x0]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008844}, 0x48040) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 07:58:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) 07:58:53 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20082, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) getpid() pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x20000000000}, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xefffffffffffffff, r1, 0x0) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, 0x0, 0x800000080004103) 07:58:54 executing program 0: r0 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r1) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:58:54 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) 07:58:54 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) write$binfmt_script(r1, &(0x7f0000002800)=ANY=[@ANYBLOB="2321202e2f66696c653020f014"], 0x191) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x2, 0x0, 0x5, 0x2, 0x80000000}, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x7, &(0x7f00000002c0)=""/216) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000000)={0x2, 'bond_slave_0\x00', {0x6}, 0x4}) 07:58:54 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write(r4, &(0x7f00000002c0)="c4c074f7b86b758f143bcc14a8dbda4e04405ca86cacc2fd6e08388fbdd899e71c0a189ae454a1f02be7c343e89c6cb19032bc88fc4540863f2f2d9d885edfa7c08e6d0256b3a653385d0c9b827ec9401b4acbd963b3d9aadf680439db8aba3c126201b8531f551638a1dd9d22de30a2a7ea0a31012f0aca3d8e4ff9c1", 0x7d) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x0, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8000}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x4, 0x101, 0x0]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008844}, 0x48040) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 07:58:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write(r4, &(0x7f00000002c0)="c4c074f7b86b758f143bcc14a8dbda4e04405ca86cacc2fd6e08388fbdd899e71c0a189ae454a1f02be7c343e89c6cb19032bc88fc4540863f2f2d9d885edfa7c08e6d0256b3a653385d0c9b827ec9401b4acbd963b3d9aadf680439db8aba3c126201b8531f551638a1dd9d22de30a2a7ea0a31012f0aca3d8e4ff9c1", 0x7d) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x4, 0x101, 0x0]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008844}, 0x48040) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 07:58:54 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) 07:58:54 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x88b02, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) write$tun(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa8100000086dd60"], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 07:58:54 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20082, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) getpid() pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x20000000000}, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xefffffffffffffff, r1, 0x0) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r3, r2, 0x0, 0x800000080004103) 07:58:54 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) 07:58:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write(r4, &(0x7f00000002c0)="c4c074f7b86b758f143bcc14a8dbda4e04405ca86cacc2fd6e08388fbdd899e71c0a189ae454a1f02be7c343e89c6cb19032bc88fc4540863f2f2d9d885edfa7c08e6d0256b3a653385d0c9b827ec9401b4acbd963b3d9aadf680439db8aba3c126201b8531f551638a1dd9d22de30a2a7ea0a31012f", 0x76) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x0, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8000}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}}, 0x4000000) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x4, 0x101, 0x0]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008844}, 0x48040) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 07:58:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)={0xfff, 0x8001, 0x0, 0xff, 0x9, "7dc26e3a19bc62d8"}) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="2f03000000000000030000000000000007000000ff0000000400000000000000ffffffff007e69b90d581de271cd3ff1b8ddf6000000070000000000000001000000000000000000000000000000000000000000000001000000000000000000000000000000f8ffffffffffffff80000000000000000400000000000000000000000000000000000000000000000c2100000000000000000000000000000000000000000000b483000000000002ff03000000000000000000000000000000000000000000000020000000000000000000000000000004000000000000000200000000000000"]) getpid() sched_setattr(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/82, 0x52}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000000c0)) write(0xffffffffffffffff, 0x0, 0x0) 07:58:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write(r4, &(0x7f00000002c0)="c4c074f7b86b758f143bcc14a8dbda4e04405ca86cacc2fd6e08388fbdd899e71c0a189ae454a1f02be7c343e89c6cb19032bc88fc4540863f2f2d9d885edfa7c08e6d0256b3a653385d0c9b827ec9401b4acbd963b3d9aadf680439db8aba3c126201b8531f551638a1dd9d22de30a2a7ea0a31012f0aca3d8e4ff9c1", 0x7d) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x4, 0x101, 0x0]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008844}, 0x48040) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 07:58:55 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) 07:58:55 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20082, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) getpid() pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x20000000000}, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xefffffffffffffff, r1, 0x0) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x800000080004103) 07:58:55 executing program 0: r0 = socket(0x22, 0x3, 0xfffffffd) write(r0, &(0x7f0000000000)="1c0000004a005f0214f90707000904000a00"/28, 0x37f) read(r0, &(0x7f0000000040)=""/217, 0xd9) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="1c0000004a005f0214f90707000904000a00"/28, 0x37f) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) r4 = socket(0x10, 0x3, 0x0) read(r4, &(0x7f0000000280)=""/236, 0x10e) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r5) 07:58:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write(r1, &(0x7f00000002c0)="c4c074f7b86b758f143bcc14a8dbda4e04405ca86cacc2fd6e08388fbdd899e71c0a189ae454a1f02be7c343e89c6cb19032bc88fc4540863f2f2d9d885edf", 0x3f) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8000}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}}, 0x4000000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x5c, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x4, 0x101, 0x0]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4008844}, 0x48040) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 07:58:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)={0xfff, 0x8001, 0x0, 0xff, 0x9, "7dc26e3a19bc62d8"}) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="2f03000000000000030000000000000007000000ff0000000400000000000000ffffffff007e69b90d581de271cd3ff1b8ddf6000000070000000000000001000000000000000000000000000000000000000000000001000000000000000000000000000000f8ffffffffffffff80000000000000000400000000000000000000000000000000000000000000000c2100000000000000000000000000000000000000000000b483000000000002ff03000000000000000000000000000000000000000000000020000000000000000000000000000004000000000000000200000000000000"]) getpid() sched_setattr(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/82, 0x52}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000000c0)) write(0xffffffffffffffff, 0x0, 0x0) 07:58:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)={0xfff, 0x8001, 0x0, 0xff, 0x9, "7dc26e3a19bc62d8"}) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="2f03000000000000030000000000000007000000ff0000000400000000000000ffffffff007e69b90d581de271cd3ff1b8ddf6000000070000000000000001000000000000000000000000000000000000000000000001000000000000000000000000000000f8ffffffffffffff80000000000000000400000000000000000000000000000000000000000000000c2100000000000000000000000000000000000000000000b483000000000002ff03000000000000000000000000000000000000000000000020000000000000000000000000000004000000000000000200000000000000"]) getpid() sched_setattr(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/82, 0x52}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000000c0)) write(0xffffffffffffffff, 0x0, 0x0) 07:58:56 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) 07:58:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write(r4, &(0x7f00000002c0)="c4c074f7b86b758f143bcc14a8dbda4e04405ca86cacc2fd6e08388fbdd899e71c0a189ae454a1f02be7c343e89c6cb19032bc88fc4540863f2f2d9d885edfa7c08e6d0256b3a653385d0c9b827ec9401b4acbd963b3d9aadf680439db8aba3c126201b8531f551638a1dd9d22de30a2a7ea0a31012f0aca3d8e4ff9c1", 0x7d) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x4, 0x101, 0x0]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008844}, 0x48040) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 07:58:56 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20082, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) getpid() pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x20000000000}, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xefffffffffffffff, r1, 0x0) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x800000080004103) 07:58:56 executing program 0: dup(0xffffffffffffffff) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 07:58:56 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) [ 234.229007][T10491] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 234.234282][T10491] loop0: partition table partially beyond EOD, truncated [ 234.267096][T10491] loop0: p1 start 1 is beyond EOD, truncated [ 234.273814][T10491] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 234.282051][T10491] loop0: p3 size 2 extends beyond EOD, truncated [ 234.289618][T10491] loop0: p4 size 32768 extends beyond EOD, truncated [ 234.300814][T10491] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 234.309270][T10491] loop0: p6 size 32768 extends beyond EOD, truncated 07:58:56 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write(r4, &(0x7f00000002c0)="c4c074f7b86b758f143bcc14a8dbda4e04405ca86cacc2fd6e08388fbdd899e71c0a189ae454a1f02be7c343e89c6cb19032bc88fc4540863f2f2d9d885edfa7c08e6d0256b3a653385d0c9b827ec9401b4acbd963b3d9aadf680439db8aba3c126201b8531f551638a1dd9d22de30a2a7ea0a31012f0aca3d8e4ff9c1", 0x7d) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x0, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8000}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x4, 0x101, 0x0]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008844}, 0x48040) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 07:58:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="2f03000000000000030000000000000007000000ff0000000400000000000000ffffffff007e69b90d581de271cd3ff1b8ddf6000000070000000000000001000000000000000000000000000000000000000000000001000000000000000000000000000000f8ffffffffffffff80000000000000000400000000000000000000000000000000000000000000000c2100000000000000000000000000000000000000000000b483000000000002ff03000000000000000000000000000000000000000000000020000000000000000000000000000004000000000000000200000000000000030000000000000000000000000000000000000000000000040000000000"]) sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/82, 0x52}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000000c0)) write(0xffffffffffffffff, 0x0, 0x0) 07:58:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) 07:58:57 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$TCSETA(r2, 0x5406, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x101000, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 07:58:57 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write(r4, &(0x7f00000002c0)="c4c074f7b86b758f143bcc14a8dbda4e04405ca86cacc2fd6e08388fbdd899e71c0a189ae454a1f02be7c343e89c6cb19032bc88fc4540863f2f2d9d885edfa7c08e6d0256b3a653385d0c9b827ec9401b4acbd963b3d9aadf680439db8aba3c126201b8531f551638a1dd9d22de30a2a7ea0a31012f0aca3d8e4ff9c1", 0x7d) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x0, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8000}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x4, 0x101, 0x0]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008844}, 0x48040) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 07:58:57 executing program 3: 07:58:57 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20082, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) getpid() pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x20000000000}, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xefffffffffffffff, r1, 0x0) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x800000080004103) 07:58:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) 07:58:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="2f03000000000000030000000000000007000000ff0000000400000000000000ffffffff007e69b90d581de271cd3ff1b8ddf6000000070000000000000001000000000000000000000000000000000000000000000001000000000000000000000000000000f8ffffffffffffff80000000000000000400000000000000000000000000000000000000000000000c2100000000000000000000000000000000000000000000b483000000000002ff03000000000000000000000000000000000000000000000020000000000000000000000000000004000000000000000200000000000000030000000000000000000000000000000000000000000000040000000000"]) sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/82, 0x52}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000000c0)) write(0xffffffffffffffff, 0x0, 0x0) 07:58:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)={0x0, 0x8001, 0x0, 0xff, 0x9, "7dc26e3a19bc62d8"}) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/82, 0x52}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000000c0)) write(0xffffffffffffffff, 0x0, 0x0) 07:58:57 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$TCSETA(r2, 0x5406, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x101000, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 07:58:57 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(0xffffffffffffffff, &(0x7f00000000c0)="fe", 0x300) 07:58:57 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$TCSETA(r2, 0x5406, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x101000, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 07:58:58 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(0xffffffffffffffff, &(0x7f00000000c0)="fe", 0x300) 07:58:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)={0x0, 0x8001, 0x0, 0xff, 0x9, "7dc26e3a19bc62d8"}) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/82, 0x52}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000000c0)) write(0xffffffffffffffff, 0x0, 0x0) 07:58:58 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)={0xfff, 0x8001, 0x9, 0xff, 0x9, "7dc26e3a19bc62d8"}) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) getpid() socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 07:58:58 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write(r4, &(0x7f00000002c0)="c4c074f7b86b758f143bcc14a8dbda4e04405ca86cacc2fd6e08388fbdd899e71c0a189ae454a1f02be7c343e89c6cb19032bc88fc4540863f2f2d9d885edfa7c08e6d0256b3a653385d0c9b827ec9401b4acbd963b3d9aadf680439db8aba3c126201b8531f551638a1dd9d22de30a2a7ea0a31012f0aca3d8e4ff9c1", 0x7d) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x0, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8000}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x80000001, 0xbb14, 0x1]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000000) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x64, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x4, 0x101, 0x0]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008844}, 0x48040) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 07:58:58 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(0xffffffffffffffff, &(0x7f00000000c0)="fe", 0x300) 07:58:58 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20082, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) getpid() pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x20000000000}, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xefffffffffffffff, r1, 0x0) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, 0xffffffffffffffff, 0x0, 0x800000080004103) 07:58:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)={0xfff, 0x8001, 0x0, 0xff, 0x9, "7dc26e3a19bc62d8"}) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x101000, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="2f03000000000000030000000000000007000000ff0000000400000000000000ffffffff007e69b90d581de271cd3ff1b8ddf6000000070000000000000001000000000000000000000000000000000000000000000001000000000000000000000000000000f8ffffffffffffff80000000000000000400000000000000000000000000000000000000000000000c2100000000000000000000000000000000000000000000b483000000000002ff03000000000000000000000000000000000000000000000020000000000000000000000000000004000000000000000200000000000000"]) r3 = getpid() sched_setattr(r3, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/82, 0x52}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000000c0)) write(0xffffffffffffffff, 0x0, 0x0) 07:58:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) 07:58:58 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 07:58:58 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)={0xfff, 0x8001, 0x9, 0xff, 0x9, "7dc26e3a19bc62d8"}) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) getpid() socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 07:58:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0xd0}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x6788, 0x4) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f00000000c0)="fe", 0x300) 07:58:58 executing program 0: [ 236.255172][T10250] ================================================================== [ 236.263305][T10250] BUG: KCSAN: data-race in commit_echoes / n_tty_receive_char_special [ 236.271445][T10250] [ 236.273770][T10250] write to 0xffffc900159a5018 of 8 bytes by task 10629 on cpu 0: [ 236.281491][T10250] n_tty_receive_char_special+0x116d/0x1bc0 [ 236.287381][T10250] n_tty_receive_buf_common+0x17d6/0x1a40 [ 236.293101][T10250] n_tty_receive_buf+0x36/0x50 [ 236.297853][T10250] tty_ioctl+0xaf4/0xd80 [ 236.302099][T10250] ksys_ioctl+0x101/0x150 [ 236.306435][T10250] __x64_sys_ioctl+0x47/0x60 [ 236.311023][T10250] do_syscall_64+0xc7/0x3b0 [ 236.315525][T10250] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 236.321396][T10250] [ 236.323722][T10250] read to 0xffffc900159a5018 of 8 bytes by task 10250 on cpu 1: [ 236.331349][T10250] commit_echoes+0x51/0x160 [ 236.335849][T10250] n_tty_receive_buf_common+0x16dc/0x1a40 [ 236.341565][T10250] n_tty_receive_buf2+0x39/0x50 [ 236.346414][T10250] tty_ldisc_receive_buf+0x69/0xe0 07:58:58 executing program 0: [ 236.351517][T10250] tty_port_default_receive_buf+0x82/0xd0 [ 236.357229][T10250] flush_to_ldisc+0x1dd/0x260 [ 236.361903][T10250] process_one_work+0x424/0x930 [ 236.366757][T10250] worker_thread+0x9a/0x7e0 [ 236.371256][T10250] kthread+0x203/0x230 [ 236.375318][T10250] ret_from_fork+0x1f/0x30 [ 236.379717][T10250] [ 236.382031][T10250] Reported by Kernel Concurrency Sanitizer on: [ 236.388179][T10250] CPU: 1 PID: 10250 Comm: kworker/u4:6 Not tainted 5.7.0-rc1-syzkaller #0 [ 236.396665][T10250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.406731][T10250] Workqueue: events_unbound flush_to_ldisc [ 236.412524][T10250] ================================================================== [ 236.420577][T10250] Kernel panic - not syncing: panic_on_warn set ... [ 236.427164][T10250] CPU: 1 PID: 10250 Comm: kworker/u4:6 Not tainted 5.7.0-rc1-syzkaller #0 [ 236.436169][T10250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.446234][T10250] Workqueue: events_unbound flush_to_ldisc [ 236.452047][T10250] Call Trace: [ 236.455338][T10250] dump_stack+0x11d/0x187 [ 236.459671][T10250] panic+0x210/0x640 [ 236.463572][T10250] ? vprintk_func+0x89/0x13a [ 236.468185][T10250] kcsan_report.cold+0xc/0x1a [ 236.472864][T10250] kcsan_setup_watchpoint+0x3fb/0x440 [ 236.478332][T10250] commit_echoes+0x51/0x160 [ 236.482842][T10250] n_tty_receive_buf_common+0x16dc/0x1a40 [ 236.488580][T10250] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 236.494389][T10250] ? n_tty_receive_buf_common+0x1a40/0x1a40 [ 236.500290][T10250] n_tty_receive_buf2+0x39/0x50 [ 236.505148][T10250] tty_ldisc_receive_buf+0x69/0xe0 [ 236.510257][T10250] tty_port_default_receive_buf+0x82/0xd0 [ 236.515977][T10250] flush_to_ldisc+0x1dd/0x260 [ 236.520665][T10250] process_one_work+0x424/0x930 [ 236.525555][T10250] worker_thread+0x9a/0x7e0 [ 236.530070][T10250] ? rescuer_thread+0x6a0/0x6a0 [ 236.534916][T10250] kthread+0x203/0x230 [ 236.538985][T10250] ? kthread_unpark+0xd0/0xd0 [ 236.543661][T10250] ret_from_fork+0x1f/0x30 [ 236.549549][T10250] Kernel Offset: disabled [ 236.553867][T10250] Rebooting in 86400 seconds..