Warning: Permanently added '10.128.1.43' (ECDSA) to the list of known hosts. 2020/04/01 22:18:18 fuzzer started 2020/04/01 22:18:19 dialing manager at 10.128.0.26:35359 2020/04/01 22:18:20 syscalls: 2996 2020/04/01 22:18:20 code coverage: enabled 2020/04/01 22:18:20 comparison tracing: enabled 2020/04/01 22:18:20 extra coverage: enabled 2020/04/01 22:18:20 setuid sandbox: enabled 2020/04/01 22:18:20 namespace sandbox: enabled 2020/04/01 22:18:20 Android sandbox: /sys/fs/selinux/policy does not exist 2020/04/01 22:18:20 fault injection: enabled 2020/04/01 22:18:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/04/01 22:18:20 net packet injection: enabled 2020/04/01 22:18:20 net device setup: enabled 2020/04/01 22:18:20 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/04/01 22:18:20 devlink PCI setup: PCI device 0000:00:10.0 is not available 22:20:41 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x2000) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000040)={0x3, 0x6}) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000080)={0x4, 0x7, {}, {0xffffffffffffffff}, 0xad9, 0x2}) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @null, r1}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f0000000300)={0x0, 0x1, 0x100, 0x75, &(0x7f0000000140)=""/117, 0xcd, &(0x7f00000001c0)=""/205, 0x3c, &(0x7f00000002c0)=""/60}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x8200, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r3, 0xc034564b, &(0x7f0000000380)={0x6, 0x38aa628153fa4d27, 0x800, 0x39ca, 0x2, @discrete={0x9, 0x6}}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000003c0)={r4}) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000400)={0x81ae, 0x7, [{0x2}, {0x8, 0x1}, {0x0, 0x1}, {0xa, 0x1}, {0xf}, {0xf}, {0x9}]}) r5 = getuid() lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000540)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = geteuid() r10 = getegid() r11 = getegid() getgroups(0x1, &(0x7f0000000700)=[0xee01]) fsetxattr$system_posix_acl(r3, &(0x7f0000000440)='system.posix_acl_access\x00', &(0x7f0000000800)={{}, {0x1, 0x4}, [{0x2, 0x1, r5}, {0x2, 0x2, r6}, {0x2, 0x8, r7}, {0x2, 0x1, r8}, {0x2, 0x6, r9}], {0x4, 0x6}, [{0x8, 0x0, r10}, {0x8, 0x0, r11}, {0x8, 0x0, r12}, {0x8, 0x1, 0xee00}, {}], {0x10, 0x3}, {0x20, 0x3}}, 0x74, 0x3) 22:20:41 executing program 1: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x341000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2200}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xe0, r1, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x40}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8001}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x10000}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x80000001}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xff5a}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2b}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x55}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3ff}]}, 0xe0}, 0x1, 0x0, 0x0, 0x80}, 0x114) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000004800)='dummy0\x00') r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000004840)='/dev/ocfs2_control\x00', 0x12000, 0x0) accept4$inet(r3, &(0x7f0000004880)={0x2, 0x0, @loopback}, &(0x7f00000048c0)=0x10, 0x80000) fremovexattr(r3, &(0x7f0000004900)=@random={'osx.', 'dummy0\x00'}) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000004a00)={&(0x7f0000004940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000049c0)={&(0x7f0000004980)={0x28, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8004}, 0x8000) ioctl$VFIO_SET_IOMMU(0xffffffffffffffff, 0x3b66, 0x3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000004a80)='nl80211\x00') sendmsg$NL80211_CMD_NEW_MPATH(r4, &(0x7f0000004b40)={&(0x7f0000004a40)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000004b00)={&(0x7f0000004ac0)={0x2c, r5, 0x4, 0x70bd25, 0x25dfdbff, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3}}, @NL80211_ATTR_MAC={0xa}]}, 0x2c}}, 0x10) r6 = syz_open_dev$media(&(0x7f0000004b80)='/dev/media#\x00', 0x2, 0x111000) ioctl$EVIOCGNAME(r6, 0x80404506, &(0x7f0000004bc0)=""/26) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000004c00)='/dev/dlm_plock\x00', 0x840, 0x0) connect$inet(r7, &(0x7f0000004c40)={0x2, 0x4e20, @broadcast}, 0x10) r8 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000004c80)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RM_MAP(r8, 0x4028641b, &(0x7f0000004cc0)={&(0x7f0000ffd000/0x2000)=nil, 0x55f, 0x3, 0xd1, &(0x7f0000ffd000/0x1000)=nil, 0x1}) syzkaller login: [ 226.700157][ T9471] IPVS: ftp: loaded support on port[0] = 21 [ 226.833310][ T9471] chnl_net:caif_netlink_parms(): no params data found [ 226.950832][ T9475] IPVS: ftp: loaded support on port[0] = 21 [ 226.962887][ T9471] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.986546][ T9471] bridge0: port 1(bridge_slave_0) entered disabled state 22:20:41 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000040)={0xd, 0x1}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) readv(r1, &(0x7f0000001500)=[{&(0x7f0000000080)=""/3, 0x3}, {&(0x7f00000000c0)=""/45, 0x2d}, {&(0x7f0000000100)=""/202, 0xca}, {&(0x7f0000000200)=""/213, 0xd5}, {&(0x7f0000000300)=""/69, 0x45}, {&(0x7f0000000380)=""/134, 0x86}, {&(0x7f0000000440)=""/188, 0xbc}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x8) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000001580)=0xcd0, 0x4) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000015c0)={0x1}, 0x4) execve(&(0x7f0000001600)='./file0\x00', &(0x7f0000001740)=[&(0x7f0000001640)='/dev/zero\x00', &(0x7f0000001680)='-]\x00', &(0x7f00000016c0)='/dev/zero\x00', &(0x7f0000001700)='\x00'], &(0x7f0000001940)=[&(0x7f0000001780)='/dev/zero\x00', &(0x7f00000017c0)='\x00', &(0x7f0000001800)='/dev/zero\x00', &(0x7f0000001840)='\'\x00', &(0x7f0000001880)='\x00', &(0x7f00000018c0)='/dev/zero\x00', &(0x7f0000001900)='/dev/zero\x00']) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000001980)='/dev/zero\x00', 0x2000, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001a80)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(r2, &(0x7f0000001b80)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001ac0)={0x48, r3, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0x24, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a21aa9444e"}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x4) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000001c00)={0x990000, 0x9d, 0x81, 0xffffffffffffffff, 0x0, &(0x7f0000001bc0)={0x990a7a, 0x3, [], @value=0x401}}) setsockopt$CAN_RAW_FILTER(r4, 0x65, 0x1, &(0x7f0000001c40)=[{{0x4, 0x0, 0x1, 0x1}, {0x0, 0x1, 0x1}}, {{0x1, 0x0, 0x1, 0x1}, {0x2, 0x1, 0x1}}, {{0x0, 0x0, 0x1, 0x1}, {0x4, 0x0, 0x1, 0x1}}, {{0x4, 0x1, 0x0, 0x1}, {0x1, 0x0, 0x1}}, {{0x3, 0x0, 0x1, 0x1}, {0x3, 0x0, 0x1, 0x1}}, {{0x1, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{0x4, 0x0, 0x1}, {0x3, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x1, 0x1}, {0x2}}, {{0x4, 0x0, 0x1, 0x1}, {0x1, 0x1, 0x1}}, {{0x3, 0x0, 0x1, 0x1}, {0x4, 0x1, 0x0, 0x1}}], 0x50) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, &(0x7f0000001cc0)={{0x29, @empty, 0x4e21, 0x2, 'nq\x00', 0x10, 0x3ff, 0x4c}, {@broadcast, 0x4e23, 0x10000, 0x0, 0x1, 0x9}}, 0x44) stat(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000001f00), &(0x7f0000001f40), &(0x7f0000001f80)=0x0) getresuid(&(0x7f0000001fc0)=0x0, &(0x7f0000002000), &(0x7f0000002040)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002080)={0x0, 0x0}, &(0x7f00000020c0)=0xc) syz_mount_image$hfs(&(0x7f0000001d40)='hfs\x00', &(0x7f0000001d80)='./file0\x00', 0x4, 0x1, &(0x7f0000001e00)=[{&(0x7f0000001dc0)="94a4a822f06b3b6e002a4bcab086af8c2c7b5cd3c71b4e1218b121317d10c83ea9e98e4f058656408e0a9b", 0x2b, 0xfffffffffffffffa}], 0x20, &(0x7f0000002100)={[{@dir_umask={'dir_umask', 0x3d, 0x9}}, {@gid={'gid', 0x3d, r6}}, {@type={'type', 0x3d, "48225bc1"}}, {@quiet='quiet'}, {@type={'type', 0x3d, "52d6ef33"}}, {@type={'type', 0x3d, "a62f8483"}}, {@part={'part', 0x3d, 0x3}}, {@codepage={'codepage', 0x3d, 'utf8'}}, {@gid={'gid', 0x3d, r7}}, {@iocharset={'iocharset', 0x3d, 'iso8859-7'}}], [{@uid_lt={'uid<', r8}}, {@euid_lt={'euid<', r9}}]}) [ 226.994830][ T9471] device bridge_slave_0 entered promiscuous mode [ 227.019683][ T9471] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.028989][ T9471] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.037559][ T9471] device bridge_slave_1 entered promiscuous mode [ 227.120895][ T9471] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 227.133948][ T9471] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 227.179117][ T9471] team0: Port device team_slave_0 added [ 227.208703][ T9471] team0: Port device team_slave_1 added [ 227.297130][ T9471] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 227.304417][ T9471] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.331588][ T9480] IPVS: ftp: loaded support on port[0] = 21 22:20:42 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000040)={0x7ff, [0x3, 0xdd, 0x8, 0x6, 0xf001, 0x7, 0x17f, 0x4, 0x7f, 0x5, 0x0, 0x4, 0x7, 0x1, 0x9, 0x7, 0x3597, 0x2, 0x3, 0x1, 0x400, 0x3c3, 0x9, 0x5, 0x3ff, 0xec1, 0x8, 0x3, 0x6, 0x3f, 0x81, 0x1ff, 0x9, 0x8001, 0xfff, 0x5a, 0x9, 0x100, 0x1ff, 0x2, 0x7f, 0x0, 0x43, 0xf19, 0x7, 0x7ff, 0xffff], 0x9}) clone(0x10000000, &(0x7f00000000c0)="4bb86c111f99ec031e93e553d336041480c12cdcc92c6eb23abc441b07ae7b1612ec47525c8c3dba22314e68083413bb57ca8cfe652cc200db2239fea4", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="e2941bc5284922f07c4c5a0fff87e0680757af42f582e737fbe6d84d298bde122d8f1dd2e0680bda414732aef38b727f4fb60011ffb932") r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x6}, &(0x7f0000000240)=0x8) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0xc0, 0x0) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f00000002c0)="aaa908b44a9d8f5204a92a55b49d4c13c7fd6630dba9f3bdc368ec15007802c5a4dd721cf5fac04c81073fbd41bb056b3ebf5fac516f9344f6ead37e01b498d27eeec3717fd472f25a58d0e44cdf9885a8fef1afede2bed0ea6420238f0ecf02b0492f8ac5abf939ed3a6076bdf28e8ae9042f6eae3be193841e789a3fd295eb3089769d9fd43e2f082c73ced16c3ff3318cbc46d09e0a96067b87dd4673fbea964364cf8a27d25d6942482c2080008c8137c025d104d3c0948c") r3 = syz_open_dev$media(&(0x7f0000000380)='/dev/media#\x00', 0x10000, 0x418000) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r3, 0xc034564b, &(0x7f00000003c0)={0xfff, 0x30314442, 0x80000000, 0x29c, 0x3, @discrete={0x5, 0x8}}) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$VIDIOC_S_PARM(r4, 0xc0cc5616, &(0x7f0000000400)={0x3, @output={0x0, 0x1, {0x81, 0x2}, 0x2, 0x1}}) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x4c, 0x1407, 0x100, 0x70bd28, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000010}, 0x24002004) mount(&(0x7f0000000640)=@loop={'/dev/loop', 0x0}, &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='squashfs\x00', 0x48000, &(0x7f0000000700)='$\x00') ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000740)={0x2, 0x0, [{}, {}]}) prctl$PR_SET_ENDIAN(0x14, 0x0) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780)='/dev/autofs\x00', 0x400, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000800)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r5, &(0x7f0000000900)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000008c0)={&(0x7f0000000840)={0x5c, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7ff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1f}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2a}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000800) setxattr$trusted_overlay_nlink(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)='trusted.overlay.nlink\x00', &(0x7f00000009c0)={'L+', 0x6}, 0x16, 0x0) [ 227.347142][ T9471] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 227.378596][ T9471] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 227.386256][ T9471] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.413053][ T9471] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 227.441263][ T9475] chnl_net:caif_netlink_parms(): no params data found [ 227.540000][ T9471] device hsr_slave_0 entered promiscuous mode [ 227.576864][ T9471] device hsr_slave_1 entered promiscuous mode 22:20:42 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/capi/capi20ncci\x00', 0x24ca595b3e312f19, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000740)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x34, r1, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4040}, 0x40008040) mount(&(0x7f0000000840)=@md0='/dev/md0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='hpfs\x00', 0x800002, &(0x7f0000000900)='\x00') r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000940)='/dev/autofs\x00', 0x10080, 0x0) r3 = syz_genetlink_get_family_id$smc(&(0x7f00000009c0)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x34, r3, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x20) ioctl$USBDEVFS_SETINTERFACE(0xffffffffffffffff, 0x80085504, &(0x7f0000000ac0)={0x9, 0x8001}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000b00)=0x20) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/mdstat\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000bc0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f0000000cc0)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x1000840}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c00)={0x80, r5, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK={0x30, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x20000001}, 0x40000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00)={0x0}, &(0x7f0000000d40)=0xc) ptrace$getsig(0x4202, r6, 0x0, &(0x7f0000000d80)) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000e40)={0x7fffffff, 0x7, 0x4, 0x40000000, 0x9, {0x77359400}, {0x2, 0x1, 0x0, 0x1, 0x17, 0x3, "c65d1243"}, 0x3, 0x4, @planes=&(0x7f0000000e00)={0xfffffffa, 0x7, @mem_offset=0x7f, 0x800}, 0x2, 0x0, r4}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r7, 0xc0505350, &(0x7f0000000ec0)={{0x1, 0x2}, {0x0, 0x5}, 0x7ff, 0x6}) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/nvram\x00', 0x50800, 0x0) r9 = syz_genetlink_get_family_id$nbd(&(0x7f0000000fc0)='nbd\x00') pipe2(&(0x7f0000001000)={0xffffffffffffffff}, 0x800) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f0000001140)={&(0x7f0000000f80)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000001080)={0x5c, r9, 0xdd0b5f12ba75600b, 0x70bd2d, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r4}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x7}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r4}, {0x8, 0x1, r10}, {0x8}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x48d1}, 0x0) [ 227.683292][ T9482] IPVS: ftp: loaded support on port[0] = 21 [ 227.872223][ T9475] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.879885][ T9475] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.909466][ T9475] device bridge_slave_0 entered promiscuous mode [ 227.951268][ T9480] chnl_net:caif_netlink_parms(): no params data found [ 227.963599][ T9475] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.978555][ T9475] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.986958][ T9475] device bridge_slave_1 entered promiscuous mode 22:20:42 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x81) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40080, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x101000, 0x0) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, &(0x7f0000000080)) syz_mount_image$cifs(&(0x7f00000000c0)='cifs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)="f276bfe2a1c271afe38de3adb0a9d76ee80a5946948877a6fb919b740caefb8cdda73b6209c924f9ae7c323f424907e10ef48ff3199ccb87a91bc6d438e54fa5f68cfb41e9df173e1c841106ec2ce374ee946244ccad26d5cda77583bc9432cf7f17bd25c5e41d57bf804679bbedeeaad8f5d206293697f4ffb82b1e23936e862f8a65af34bcc2b73eacaf5d4287bddb2e035d06e23393290053c4f2c9ba1a7d2241126527a8d58c90020c1a9243e22df4a7e6085fa6a951d4ec65893a9c0a2ca3be8b06df5f7e24ee22e8e713d07ce4156db769a60c5ae4", 0xd8, 0x7f}, {&(0x7f0000000240)="d409ed0649a38f4cfa22d01aae58b71aa27f973c23d0accda93e83dc84287b506d3edfdfa49d366e54bb29c9462d702fafc4e24b310f06705ce01847b8e5d4d769a7255b150ff664e1d05424f60b75eaa36aa95ae20983ff2693ff12dc8e1ca1ded67405e48953cd860d26a08bb82b93e59f05b0ac", 0x75, 0xe130}, {&(0x7f00000002c0)="4c9f2269764f5df891bba478acd32a169e3892f54585b57fff5d3253c0fb60d4af049607e5a6ca07416ad9e4ddc823065123241aa0841c71fb2d0447c7013fe20149c4dd99dde1c638163e5451a4fe4bd3174225fdfe76dda2feeea4f989ef327aacc35ddffcad82bacf481be8c966c4aef2636b6d2dac9f66d08eb496e135cfd06f851a4afc77", 0x87, 0x8}, {&(0x7f0000000380)="3dfd2ee3881849964e12b01f40388bf51a1257d8447791ac42273813e346064ea220caa1a28b10091c725f3fa7739d8710fa848132b0d793a4f5f42f4b55c997d80eeeea631885d9b4d2684c00a22e13a49e6c9339e0540e2c680cfb3e48aa3f984bce869afe6964209b9e974c527264aba153c840c8225bcc7ecba7abfc4b889ccee19234aae01d4aef9406c8537438b1d25201425b193e3331b13fa07b5ba20a5564a21e33d36c50e5ce16a3be3383bfaf01920d0432dea0a082021a312a3cefd345461572046eab893bbbd2d38720231609f8dc274355bef6231bbadc92", 0xdf, 0x8}], 0x10000, &(0x7f0000000500)='/dev/full\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000540)='fdinfo\x00') ioctl$TCXONC(r3, 0x540a, 0x1) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ubi_ctrl\x00', 0x4800, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f00000005c0)={0x800, 0x3, 0x7fffffff}) r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) r6 = accept4(r3, 0x0, &(0x7f0000000600), 0x1000) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x2200}, {r5, 0x80}, {r6, 0x4000}], 0x3, &(0x7f0000000680)={0x0, 0x989680}, &(0x7f00000006c0)={[0x2]}, 0x8) r7 = openat(0xffffffffffffffff, &(0x7f0000000700)='./file0\x00', 0x0, 0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r7, 0x84, 0x0, &(0x7f0000000740)={0x0, 0xfffffffe, 0xf23, 0x1ff}, &(0x7f0000000780)=0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f00000007c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000800)='/dev/snapshot\x00', 0x6000, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r8, &(0x7f0000000940)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000900)={&(0x7f0000000880)={0x5c, 0x0, 0x8, 0x5, 0x0, 0x0, {0x7, 0x0, 0x2}, [@CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xff}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x10000}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_RESPOND={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x43c}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0xffff}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6001}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x400c890) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) [ 228.015770][ T9488] IPVS: ftp: loaded support on port[0] = 21 [ 228.112847][ T9475] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 228.172133][ T9475] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 228.240447][ T9480] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.247650][ T9480] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.255403][ T9480] device bridge_slave_0 entered promiscuous mode [ 228.278254][ T9475] team0: Port device team_slave_0 added [ 228.308215][ T9480] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.315311][ T9480] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.323229][ T9480] device bridge_slave_1 entered promiscuous mode [ 228.331801][ T9475] team0: Port device team_slave_1 added [ 228.363070][ T9491] IPVS: ftp: loaded support on port[0] = 21 [ 228.373795][ T9482] chnl_net:caif_netlink_parms(): no params data found [ 228.404587][ T9475] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 228.413201][ T9475] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 228.439499][ T9475] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 228.474911][ T9480] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 228.494776][ T9480] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 228.507179][ T9475] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 228.514143][ T9475] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 228.540515][ T9475] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 228.562153][ T9471] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 228.636336][ T9471] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 228.690558][ T9471] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 228.820384][ T9471] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 228.900275][ T9488] chnl_net:caif_netlink_parms(): no params data found [ 228.914343][ T9480] team0: Port device team_slave_0 added [ 228.924816][ T9480] team0: Port device team_slave_1 added [ 228.978582][ T9475] device hsr_slave_0 entered promiscuous mode [ 229.026961][ T9475] device hsr_slave_1 entered promiscuous mode [ 229.086887][ T9475] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 229.094728][ T9475] Cannot create hsr debugfs directory [ 229.146481][ T9480] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 229.153457][ T9480] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 229.179503][ T9480] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 229.195253][ T9480] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 229.202301][ T9480] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 229.231361][ T9480] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 229.278289][ T9482] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.285481][ T9482] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.296138][ T9482] device bridge_slave_0 entered promiscuous mode [ 229.349377][ T9482] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.357335][ T9482] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.365116][ T9482] device bridge_slave_1 entered promiscuous mode [ 229.402605][ T9488] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.410036][ T9488] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.418115][ T9488] device bridge_slave_0 entered promiscuous mode [ 229.470103][ T9480] device hsr_slave_0 entered promiscuous mode [ 229.526779][ T9480] device hsr_slave_1 entered promiscuous mode [ 229.586517][ T9480] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 229.594079][ T9480] Cannot create hsr debugfs directory [ 229.624025][ T9488] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.631270][ T9488] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.640070][ T9488] device bridge_slave_1 entered promiscuous mode [ 229.669499][ T9482] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 229.709863][ T9482] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 229.727964][ T9488] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 229.743502][ T9488] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 229.794895][ T9482] team0: Port device team_slave_0 added [ 229.828492][ T9482] team0: Port device team_slave_1 added [ 229.881575][ T9488] team0: Port device team_slave_0 added [ 229.914920][ T9488] team0: Port device team_slave_1 added [ 229.942961][ T9491] chnl_net:caif_netlink_parms(): no params data found [ 229.951893][ T9482] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 229.959061][ T9482] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 229.986098][ T9482] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 230.000026][ T9482] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 230.007045][ T9482] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 230.033058][ T9482] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 230.072457][ T9488] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 230.079954][ T9488] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 230.106086][ T9488] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 230.144424][ T9488] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 230.151475][ T9488] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 230.177692][ T9488] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 230.199065][ T9475] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 230.274352][ T9475] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 230.329641][ T9475] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 230.393717][ T9475] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 230.529139][ T9482] device hsr_slave_0 entered promiscuous mode [ 230.566759][ T9482] device hsr_slave_1 entered promiscuous mode [ 230.616572][ T9482] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 230.624292][ T9482] Cannot create hsr debugfs directory [ 230.661172][ T9480] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 230.782271][ T9488] device hsr_slave_0 entered promiscuous mode [ 230.838874][ T9488] device hsr_slave_1 entered promiscuous mode [ 230.876588][ T9488] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 230.884213][ T9488] Cannot create hsr debugfs directory [ 230.917659][ T9480] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 230.959729][ T9491] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.967158][ T9491] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.975130][ T9491] device bridge_slave_0 entered promiscuous mode [ 230.986627][ T9491] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.993762][ T9491] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.002116][ T9491] device bridge_slave_1 entered promiscuous mode [ 231.028036][ T9480] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 231.098904][ T9480] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 231.203314][ T9471] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.215188][ T9491] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 231.261433][ T9491] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 231.313240][ T9491] team0: Port device team_slave_0 added [ 231.344278][ T9491] team0: Port device team_slave_1 added [ 231.371182][ T9471] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.390064][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.399023][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.440682][ T9491] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 231.448142][ T9491] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 231.474243][ T9491] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 231.485429][ T9482] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 231.535963][ T9482] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 231.591260][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.599911][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.609428][ T3021] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.616726][ T3021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.624715][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.633744][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.642280][ T3021] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.649373][ T3021] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.658677][ T9491] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 231.665652][ T9491] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 231.695362][ T9491] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 231.722146][ T9482] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 231.779593][ T9482] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 231.849111][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.940196][ T9491] device hsr_slave_0 entered promiscuous mode [ 231.996924][ T9491] device hsr_slave_1 entered promiscuous mode [ 232.056502][ T9491] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 232.064062][ T9491] Cannot create hsr debugfs directory [ 232.118054][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.126955][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.135630][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.144790][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.153860][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 232.167035][ T9488] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 232.221205][ T9488] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 232.300284][ T9488] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 232.330661][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.339493][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.374673][ T9480] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.382987][ T9488] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 232.419937][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.429272][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.438650][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.447564][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.477746][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.485519][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.500088][ T9471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.511253][ T9475] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.536803][ T9480] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.563741][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.572406][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.585498][ T9475] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.606586][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.615558][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.631560][ T3021] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.638779][ T3021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.647835][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.689907][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.700493][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.709268][ T2933] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.716331][ T2933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.724967][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.734019][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.742519][ T2933] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.749591][ T2933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.758028][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.767089][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.775407][ T2933] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.782501][ T2933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.791234][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.836162][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.845227][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.854275][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.864543][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.873762][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.896617][ T9471] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 232.927544][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 232.935459][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 232.945360][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 232.954034][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.963023][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.972965][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.004740][ T9491] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 233.040144][ T9491] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 233.088923][ T9491] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 233.128136][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 233.140250][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 233.148914][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.158049][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.166260][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.175473][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.188067][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 233.202268][ T9482] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.215557][ T9491] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 233.278972][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.289174][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.336659][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 233.345100][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 233.354775][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.363584][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.372695][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.381688][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 233.390076][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.399136][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.408838][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.419096][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 233.427629][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 233.459440][ T9471] device veth0_vlan entered promiscuous mode [ 233.490290][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.499629][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.518793][ T9488] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.535492][ T9480] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 233.562564][ T9482] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.582680][ T9471] device veth1_vlan entered promiscuous mode [ 233.597051][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 233.604524][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 233.614919][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 233.622533][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 233.633249][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.642013][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.651193][ T2931] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.658323][ T2931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.693879][ T9488] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.704602][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.713093][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.722454][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.731466][ T2931] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.738574][ T2931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.746644][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.755285][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.763199][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.774032][ T9475] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 233.828321][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.841914][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.850661][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.859895][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 233.868910][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.879731][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.888482][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.897239][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.905772][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.915002][ T2920] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.922112][ T2920] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.947382][ T9471] device veth0_macvtap entered promiscuous mode [ 233.961219][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 233.969977][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 233.979006][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.987453][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.000243][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.008722][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.018230][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.028237][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 234.051287][ T9491] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.066719][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.075368][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.085188][ T3021] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.092301][ T3021] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.100482][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.109846][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.123625][ T9471] device veth1_macvtap entered promiscuous mode [ 234.144990][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 234.153534][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 234.162392][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 234.172274][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 234.181678][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 234.228341][ T9482] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 234.241509][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.250674][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.259703][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 234.267267][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 234.274751][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 234.302820][ T9471] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 234.326038][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.334753][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.346092][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.355474][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.364682][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.374326][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.382886][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 234.391640][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.400448][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 234.409523][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.434513][ T9491] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.447194][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.455016][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 234.463396][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.472348][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.481811][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 234.490588][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.503426][ T9471] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 234.512533][ T9480] device veth0_vlan entered promiscuous mode [ 234.524522][ T9475] device veth0_vlan entered promiscuous mode [ 234.533694][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.543128][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 234.551510][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 234.561040][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 234.570872][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.579929][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.588869][ T2919] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.596093][ T2919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.608979][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.618373][ T9488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 234.645563][ T9480] device veth1_vlan entered promiscuous mode [ 234.714202][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 234.724316][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 234.733490][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 234.741259][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 234.866055][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.881336][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.892190][ T2933] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.899327][ T2933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.908472][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.919666][ T9475] device veth1_vlan entered promiscuous mode [ 234.932210][ T9488] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 234.954981][ T9482] device veth0_vlan entered promiscuous mode [ 234.978765][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.988878][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.999425][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.009844][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 235.019155][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.060077][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.071834][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.082516][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.091896][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 22:20:49 executing program 0: [ 235.103172][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.112769][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.121785][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.131107][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 235.140448][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 235.158042][ T9480] device veth0_macvtap entered promiscuous mode [ 235.172909][ T9482] device veth1_vlan entered promiscuous mode 22:20:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x6400) [ 235.213888][ T9491] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 235.233300][ T9491] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.280468][ T9480] device veth1_macvtap entered promiscuous mode [ 235.291925][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 235.302186][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 235.311791][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 235.322977][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.332935][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.377931][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 235.385959][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 235.395174][ T2933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 22:20:50 executing program 0: memfd_create(0x0, 0xb) [ 235.418578][ T9480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 235.435264][ T9480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 22:20:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f00000001c0)={{0x32, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x4, 'dh\x00', 0x0, 0x1, 0x5d}, {@multicast2, 0x4e20, 0x0, 0x7, 0x1c, 0x6}}, 0x44) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 235.473106][ T9480] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 235.502450][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 235.518880][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 235.528767][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 235.541473][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 235.552403][ T9491] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.570770][ T9475] device veth0_macvtap entered promiscuous mode [ 235.600932][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 235.620092][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 235.629813][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 235.672146][ T9482] device veth0_macvtap entered promiscuous mode [ 235.689352][ T9480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 235.702955][ T9480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.732579][ T9530] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, and O_DIRECT support! [ 235.747808][ T9480] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 235.757907][ T9475] device veth1_macvtap entered promiscuous mode [ 235.760180][ T9530] EXT4-fs (loop0): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 235.767137][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 235.783842][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 235.792969][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 235.804915][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 235.818007][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 235.834057][ T9482] device veth1_macvtap entered promiscuous mode [ 235.917864][ T9488] device veth0_vlan entered promiscuous mode [ 235.962763][ T9475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 235.973514][ T9537] EXT4-fs (loop0): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 235.985476][ T9475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.001699][ T9475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 236.012832][ T9475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.025203][ T9475] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 236.045711][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 22:20:50 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) ioctl$MON_IOCX_GETX(r0, 0x80089203, &(0x7f0000000240)={0x0, 0x0}) [ 236.054945][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 236.064848][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 236.074431][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 236.083576][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 236.152438][ T9475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.164488][ T9475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.174915][ T9475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.186594][ T9475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.199378][ T9475] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 236.209948][ T9488] device veth1_vlan entered promiscuous mode [ 236.219205][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 236.231264][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 236.239315][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 236.249356][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 236.258410][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 236.355850][ T9482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 236.368854][ T9482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.379650][ T9482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 236.390218][ T9482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.400653][ T9482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 236.411158][ T9482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.422482][ T9482] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 236.448056][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 236.459696][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 236.468865][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 236.478605][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 236.511976][ T9482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.525457][ T9482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.542630][ T9482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.553980][ T9482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.580762][ T9482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.593832][ T9548] IPVS: set_ctl: invalid protocol: 41 0.0.0.0:20001 [ 236.596841][ T9482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.613238][ T9482] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 236.642056][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 236.651064][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 22:20:51 executing program 2: prlimit64(0x0, 0x7, &(0x7f0000000280), 0x0) socket$pppl2tp(0x18, 0x1, 0x1) [ 236.660795][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 236.671095][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 236.680880][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 236.683098][ T9551] IPVS: set_ctl: invalid protocol: 41 0.0.0.0:20001 22:20:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28081) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x10, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_CLAIMINTERFACE(r2, 0x8004550f, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x38}}, 0x20}}, 0x0) ioctl$USBDEVFS_GETDRIVER(r2, 0x40085511, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 236.779622][ T9491] device veth0_vlan entered promiscuous mode [ 236.806677][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 236.814586][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 236.932425][ T9491] device veth1_vlan entered promiscuous mode [ 237.005278][ T9488] device veth0_macvtap entered promiscuous mode [ 237.018740][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 237.042024][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 237.063905][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 237.077701][ T9488] device veth1_macvtap entered promiscuous mode [ 237.211415][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 237.222133][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.232004][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 237.243051][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.254297][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 237.264786][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.274646][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 237.285168][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.301384][ T9488] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 237.317077][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 237.325079][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 237.335469][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 237.371495][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 237.404842][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.415848][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 237.427315][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.437592][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 237.449380][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.459936][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 237.473253][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.485445][ T9488] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 237.496792][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 237.505585][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 22:20:52 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) 22:20:52 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) ioctl$MON_IOCX_GETX(r0, 0x80089203, &(0x7f0000000240)={0x0, 0x0}) 22:20:52 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) ioctl$MON_IOCX_GETX(r0, 0x80089203, &(0x7f0000000240)={0x0, 0x0}) [ 237.537433][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 237.557677][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 237.580161][ T9491] device veth0_macvtap entered promiscuous mode [ 237.585643][ T9491] device veth1_macvtap entered promiscuous mode [ 237.649782][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 237.659112][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 237.669519][ T9491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 237.680074][ T9491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.689954][ T9491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 237.701495][ T9491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.712055][ T9491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 237.722515][ T9491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.733637][ T9491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 237.745299][ T9491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.755184][ T9491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 237.765819][ T9491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.778398][ T9491] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 237.864172][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 237.877271][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 237.895161][ T9491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 237.906092][ T9491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.916591][ T9491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 237.927111][ T9491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.937294][ T9491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 237.947755][ T9491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.958822][ T9491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 237.971061][ T9491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.981656][ T9491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 237.992215][ T9491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 238.003713][ T9491] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 238.048837][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 238.058594][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 22:20:53 executing program 4: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r2 = dup(0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x202000, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r2, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) mmap(&(0x7f00002ef000/0x1000)=nil, 0x1000, 0x2000006, 0x4000010, r2, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x1c500) close(0xffffffffffffffff) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) [ 238.414013][ C1] hrtimer: interrupt took 62112 ns [ 238.462247][ T9598] CIFS: Attempting to mount /dev/loop5 [ 238.476768][ T9598] CIFS VFS: Malformed UNC in devname. [ 238.496626][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 238.496639][ T27] audit: type=1804 audit(1585779653.238:31): pid=9597 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir622846460/syzkaller.U77jC3/1/file0" dev="sda1" ino=16520 res=1 [ 238.572028][ T27] audit: type=1804 audit(1585779653.318:32): pid=9597 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir622846460/syzkaller.U77jC3/1/file0" dev="sda1" ino=16520 res=1 [ 238.610757][ T9603] CIFS: Attempting to mount /dev/loop5 [ 238.631230][ T9603] CIFS VFS: Malformed UNC in devname. 22:20:53 executing program 5: bpf$MAP_DELETE_ELEM(0x6, 0x0, 0x2) 22:20:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = io_uring_setup(0xc1a, &(0x7f0000000140)) sync_file_range(r2, 0xfffffffffffffff7, 0x0, 0x0) 22:20:53 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) ioctl$MON_IOCX_GETX(r0, 0x80089203, &(0x7f0000000240)={0x0, 0x0}) 22:20:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x2, 0x4, 0x4, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r3, &(0x7f0000847f95), &(0x7f000089b000)}, 0x18) 22:20:53 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) ioctl$MON_IOCX_GETX(r0, 0x80089203, &(0x7f0000000240)={0x0, 0x0}) 22:20:53 executing program 4: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x1, 0xb, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 22:20:53 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) read$char_usb(r0, 0x0, 0x0) 22:20:53 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000240)={&(0x7f0000000200), 0x0}) 22:20:53 executing program 3: syslog(0x1, 0x0, 0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000240)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000700000004000000c8040000e00300000000000000000000e0030000f8020000e00300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80100000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000000000073797374656d5f753a6f626a6563745f723a7570646174655f6d6f64756c65735f657865635f743a733000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffac14140000000000000000000000ffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468305f746f5f6261746164760076657468315f746f5f687372000000000000000000000000000000000000000000004000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c6500ecff000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e00000027f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="c4ea2bf95e378c5ad3385c4b40cc02922b1651a7761a454993a092ce0cd2d9b83cbb15df51ff56267a41760d4fa2947b53de1f20909676d840311d8e8fd4474423001cc3c3818e2ab7bf4147cc7edd730af29768fea67c9c58000a39c05d0b39e1a53cb1277f493a819dafcfe429f545ec9d80219bb4746b46e264e240cea9472c9220ace61693c6806387c639386a098ee968cc61e2a8567cd7529f13700e77e56c84487b485605d5c7af101531fc3ab00c86dc42ae26965c6ee4c1fbe4230859b5b527"], 0x3c}}, 0x0) pipe(&(0x7f0000000000)) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r4, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000001d80)={'syz', 0x1, 0x2e}, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000040)={r4, 0xb3, 0xaf}, 0x0, &(0x7f0000000780)="6109b2c6c1b86a9a98ca8c7a15d463e1f9634ae631e79120a0d9464e576f8cfa1540aa2c078c516b561dd426aeeb1a15d8e296e05c08a624e819fcc1497a8d00ad3dc56710024500ce6856375e52079817e1b7a988e1af863f21f819c29faab31ae9d9802c5fb8906db33aa341a898583e81a4325ae50e3744605bf0dc200fb5820f32aa5b6657112817b333c8640ace6f5a9a2bdab670c741798ccee8fcb589ee407a4391771563ea47c2ea9611739d6975a1", &(0x7f0000000840)="e32cc9de39ba2c5601eedfc5bb00fee35f5dd16c89cfb30d305275ce5234b1559540687ddc609ed7240b8dbc4ece5b5639488d3d6f41d3ca01c2db8d9a921cbb89e4ee4f0be27b291cc071e21277caade09ae649985cd4ab8101b2e9570b7afe449b2f31261e7ef249a5fb363bc300949f12cdf86fcf2db043fdbb046d9b42f5796dae598a26e4113225b38049a63e42daa3dc4da33589c468a851f22e3b92d675de28553060e029d81e074d9465d0") syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000940)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x601ed, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VTI_REMOTE={0x8, 0x5, @local}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_EVENT={0x8, 0x2c, 0x2}, @IFLA_EVENT={0x8, 0x2c, 0x80}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xeb8c}]}, 0x58}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 22:20:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000940)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0x4, r3}]}, 0x38}}, 0x0) [ 238.974878][ T9645] x_tables: unsorted underflow at hook 1 22:20:53 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000640)={0xffffffffffffffff, 0x0}, 0x20) 22:20:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@var={0x5, 0x0, 0x0, 0xe, 0x3}, @func_proto={0x0, 0x0, 0x0, 0x2}, @volatile={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000002c0)=""/4096, 0x49, 0x1000, 0x1}, 0x20) 22:20:54 executing program 1: bpf$MAP_DELETE_ELEM(0xd, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x10}, 0x20) 22:20:54 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000000c0)={&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, 0x0}) [ 239.452140][ T9650] x_tables: unsorted underflow at hook 1 22:20:54 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) ioctl$MON_IOCX_GETX(r0, 0x80089203, &(0x7f0000000240)={0x0, 0x0}) 22:20:54 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) ioctl$MON_IOCX_GETX(r0, 0x80089203, &(0x7f0000000240)={0x0, 0x0}) 22:20:54 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='TIPC\x00') 22:20:54 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r3 = dup(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r3, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) mmap(&(0x7f00002ef000/0x1000)=nil, 0x1000, 0x2000006, 0x4000010, r3, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r0, r1, 0x0, 0x1c600) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) close(0xffffffffffffffff) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) 22:20:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) [ 239.827072][ T27] audit: type=1804 audit(1585779654.578:33): pid=9682 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir656335369/syzkaller.kdvwI6/7/file0" dev="sda1" ino=16545 res=1 [ 239.934110][ T27] audit: type=1804 audit(1585779654.678:34): pid=9686 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir656335369/syzkaller.kdvwI6/7/file0" dev="sda1" ino=16545 res=1 22:20:54 executing program 3: ioperm(0x1, 0xffff, 0x6) 22:20:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000040)={&(0x7f0000000080), 0x0}) 22:20:55 executing program 4: setxattr(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x70) 22:20:55 executing program 2: epoll_pwait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}], 0x2, 0x0, &(0x7f0000000040), 0x51) 22:20:55 executing program 0: prctl$PR_SET_THP_DISABLE(0x35, 0x1) 22:20:55 executing program 0: mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x10) 22:20:55 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xfc2d41658b955f2c) 22:20:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x1, 0xb, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) preadv(r2, 0x0, 0x0, 0x0) [ 240.589898][ T27] audit: type=1804 audit(1585779655.338:35): pid=9686 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir656335369/syzkaller.kdvwI6/7/file0" dev="sda1" ino=16545 res=1 22:20:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000280)='>', 0x1, 0xffffffffffffffff) 22:20:55 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000440)=[{0x0}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28081) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x10, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_CLAIMINTERFACE(r4, 0x8004550f, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 22:20:55 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r3 = dup(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r3, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) mmap(&(0x7f00002ef000/0x1000)=nil, 0x1000, 0x2000006, 0x4000010, r3, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x1c600) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) close(0xffffffffffffffff) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) [ 240.693761][ T27] audit: type=1804 audit(1585779655.388:36): pid=9686 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir656335369/syzkaller.kdvwI6/7/file0" dev="sda1" ino=16545 res=1 22:20:55 executing program 5: munmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x10) 22:20:55 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6, 0xfdc}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 240.934474][ T27] audit: type=1804 audit(1585779655.678:37): pid=9727 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir656335369/syzkaller.kdvwI6/8/file0" dev="sda1" ino=16528 res=1 22:20:55 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0, 0x0, 0x5}) 22:20:55 executing program 0: set_robust_list(&(0x7f0000000040), 0x18) [ 241.054708][ T27] audit: type=1804 audit(1585779655.678:38): pid=9723 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir656335369/syzkaller.kdvwI6/8/file0" dev="sda1" ino=16528 res=1 22:20:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 22:20:55 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x14, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) creat(0x0, 0x0) write$P9_RREADLINK(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="eee15cf1ba409bc7365c91a0d2aa191e91857646a5a12870800580bbf4ea4f0700000000000080afac0000000000000900a8caa8655c6078884669074800f7e9a30000000000000000000000763e23d389a5f03be9115d7d4e06"], 0x5a) sendfile(r2, r2, &(0x7f0000000240)=0x8, 0x7fff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012abd7ecdab3fa7f7ec34e87000ffdbdf2500051601000000000014000500fe80000000000000001a0000000000aa000000"], 0x30}, 0x1, 0x0, 0x0, 0x44000}, 0x8000) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x58001, 0x0) ioctl$TIOCL_SELLOADLUT(r6, 0x541c, &(0x7f0000000200)={0x5, 0x20, 0x40, 0x1, 0x5}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 241.250314][ T27] audit: type=1804 audit(1585779655.778:39): pid=9727 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir656335369/syzkaller.kdvwI6/8/file0" dev="sda1" ino=16528 res=1 22:20:56 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000380)={0x0, 0x0, 0x7fff}) 22:20:56 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008907"], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r6, @ANYRES16], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:20:56 executing program 2: r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x1, 0xb, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) dup3(r1, r0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 241.885561][ T9758] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 22:20:56 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x0, 0x3b, 0x8, 0x0, 0x99}) 22:20:56 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) lseek(r0, 0x0, 0x3) 22:20:56 executing program 1: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) dup(r2) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x202000, 0x40) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mmap(&(0x7f00002ef000/0x1000)=nil, 0x1000, 0x2000006, 0x4000010, 0xffffffffffffffff, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r0, r1, 0x0, 0x1c500) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) 22:20:56 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x1, 0xb, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fchdir(r2) 22:20:56 executing program 0: syslog(0x1, 0x0, 0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000240)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000700000004000000c8040000e00300000000000000000000e0030000f8020000e00300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80100000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000000000073797374656d5f753a6f626a6563745f723a7570646174655f6d6f64756c65735f657865635f743a733000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffac14140000000000000000000000ffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468305f746f5f6261746164760076657468315f746f5f687372000000000000000000000000000000000000000000004000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c6500ecff000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e00000027f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="c4ea2bf95e378c5ad3385c4b40cc02922b1651a7761a454993a092ce0cd2d9b83cbb15df51ff56267a41760d4fa2947b53de1f20909676d840311d8e8fd4474423001cc3c3818e2ab7bf4147cc7edd730af29768fea67c9c58000a39c05d0b39e1a53cb1277f493a819dafcfe429f545ec9d80219bb4746b46e264e240cea9472c9220ace61693c6806387c639386a098ee968cc61e2a8567cd7529f13700e77e56c84487b485605d5c7af101531fc3ab00c86dc42ae26965c6ee4c1fbe4230859b5b527"], 0x3c}}, 0x0) pipe(&(0x7f0000000000)) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r4, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000001d80)={'syz', 0x1, 0x2e}, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000040)={r4, 0xb3, 0xaf}, 0x0, &(0x7f0000000780)="6109b2c6c1b86a9a98ca8c7a15d463e1f9634ae631e79120a0d9464e576f8cfa1540aa2c078c516b561dd426aeeb1a15d8e296e05c08a624e819fcc1497a8d00ad3dc56710024500ce6856375e52079817e1b7a988e1af863f21f819c29faab31ae9d9802c5fb8906db33aa341a898583e81a4325ae50e3744605bf0dc200fb5820f32aa5b6657112817b333c8640ace6f5a9a2bdab670c741798ccee8fcb589ee407a4391771563ea47c2ea9611739d6975a1", &(0x7f0000000840)="e32cc9de39ba2c5601eedfc5bb00fee35f5dd16c89cfb30d305275ce5234b1559540687ddc609ed7240b8dbc4ece5b5639488d3d6f41d3ca01c2db8d9a921cbb89e4ee4f0be27b291cc071e21277caade09ae649985cd4ab8101b2e9570b7afe449b2f31261e7ef249a5fb363bc300949f12cdf86fcf2db043fdbb046d9b42f5796dae598a26e4113225b38049a63e42daa3dc4da33589c468a851f22e3b92d675de28553060e029d81e074d9465d0") syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000940)=@newlink={0x70, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x601ed}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x24, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_OKEY={0xd}], @IFLA_VTI_REMOTE={0x8, 0x5, @local}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}], @IFLA_VTI_LOCAL={0x8, 0x4, @broadcast}]}}}, @IFLA_MASTER={0x8}, @IFLA_EVENT={0x8, 0x2c, 0x2}, @IFLA_EVENT={0x8, 0x2c, 0x80}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xeb8c}]}, 0x70}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 22:20:56 executing program 3: bpf$MAP_CREATE(0x10000000000000a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 242.257419][ T9779] x_tables: unsorted underflow at hook 1 22:20:57 executing program 2: ioperm(0x0, 0xffff, 0x0) 22:20:57 executing program 4: bpf$MAP_CREATE(0x100000000000014, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 22:20:57 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_names\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001800)={0xffffffffffffffff}) r2 = getpid() openat$fuse(0xffffffffffffff9c, &(0x7f0000001c40)='/dev/fuse\x00', 0x2, 0x0) sendmsg$unix(r1, &(0x7f0000002940)={0x0, 0x0, 0x0, 0x0, &(0x7f00000027c0)=[@cred={{0x1c, 0x1, 0x2, {r2}}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x38}, 0x0) [ 242.311727][ T9779] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 242.332433][ T27] audit: type=1804 audit(1585779657.078:40): pid=9782 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir656335369/syzkaller.kdvwI6/9/file0" dev="sda1" ino=16554 res=1 [ 242.382750][ T9779] device vti0 entered promiscuous mode 22:20:57 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) ioctl$MON_IOCX_GETX(r0, 0x9201, 0x0) 22:20:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x4000, 0x0) 22:20:57 executing program 2: perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) 22:20:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000180)) [ 242.677021][ T9779] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 22:20:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:20:57 executing program 1: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) dup(r2) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x202000, 0x40) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mmap(&(0x7f00002ef000/0x1000)=nil, 0x1000, 0x2000006, 0x4000010, 0xffffffffffffffff, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x1c500) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) 22:20:57 executing program 0: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r3 = dup(r2) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x202000, 0x40) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mmap(&(0x7f00002ef000/0x1000)=nil, 0x1000, 0x2000006, 0x4000010, r3, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x1c500) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) close(0xffffffffffffffff) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) 22:20:57 executing program 4: unshare(0x40000000) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100002c00270d0000000057125f24b041f6d7", @ANYRES32=r2, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 22:20:57 executing program 3: prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="057a0e5e77a849c27b31acaaa3b77e38cb5cbb35cd6db1bac5f502c4970385f24efcb968e5a48f1f65a3a7fe28dfeaf51a1a35b32eede5510a7756ab3c9be4011e5692c334ebbbf6a87ae66e82cbe64a01ff03e1dbee14599701bb7486c2d1f0ced95fa75d9cf6886511e812f3427d8f7cc1ebc9430a584b74b83da19276ba60e4935fbc3fef42747b0f51334760e0f91ba08152e84c9d384423c55db34e424f2a1e3d3d7609c519e47047995835c61b7bdb320d54346a566ed6d7f022dae2b1b8570fb71601854b1b015381fa20b8c30ce258900fc3208b49860fd3bccfb7df3bc9b71bc1da8273e975883743922b235fa59b6422d71b2a", 0xfffffffffffffe01) 22:20:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000000)={'xfrm0\x00', 0x8000008}) 22:20:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000000)={'xfrm0\x00', 0x8000008}) 22:20:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x9, 0x209e20, 0x2, 0x1}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x9}, 0x8, 0x10, 0x0}, 0x78) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000140)=""/130}, 0x18) [ 243.160778][ T9829] xfrm0: mtu greater than device maximum [ 243.180930][ T9833] IPVS: ftp: loaded support on port[0] = 21 [ 243.188833][ T9837] netlink: 248 bytes leftover after parsing attributes in process `syz-executor.4'. 22:20:58 executing program 5: syz_genetlink_get_family_id$netlbl_mgmt(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) dup(r2) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x1c500) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) close(0xffffffffffffffff) open(0x0, 0x0, 0x0) 22:20:58 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x142f3fddc981205f, &(0x7f00000001c0), 0x11}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x29}) 22:20:58 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000300000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 243.472430][ T9849] xfrm0: mtu greater than device maximum 22:20:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 22:20:58 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x4d2, 0x32}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) [ 243.630118][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 243.630132][ T27] audit: type=1804 audit(1585779658.378:48): pid=9859 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir370679438/syzkaller.RWzw3u/9/file0" dev="sda1" ino=16557 res=1 [ 243.720833][ T9837] netlink: 248 bytes leftover after parsing attributes in process `syz-executor.4'. [ 243.745142][ T9833] IPVS: ftp: loaded support on port[0] = 21 [ 243.767724][ T9864] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 243.801483][ T27] audit: type=1804 audit(1585779658.378:49): pid=9859 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir370679438/syzkaller.RWzw3u/9/file0" dev="sda1" ino=16557 res=1 22:20:58 executing program 1: r0 = memfd_create(&(0x7f0000000240)='ovf\x00', 0x0) pwritev(r0, &(0x7f0000001500)=[{&(0x7f0000000280)=']', 0x1}], 0x1, 0x0) 22:20:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 22:20:58 executing program 2: bpf$MAP_DELETE_ELEM(0x13, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x10}, 0x20) 22:20:58 executing program 4: bpf$MAP_DELETE_ELEM(0x7, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x10}, 0x20) 22:20:59 executing program 4: bpf$MAP_DELETE_ELEM(0xb, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x10}, 0x20) 22:20:59 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0xc125, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, &(0x7f0000469ffc)=0x100000000007fd, 0x4) 22:20:59 executing program 1: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = dup(r2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) mmap(&(0x7f00002ef000/0x1000)=nil, 0x1000, 0x2000006, 0x4000010, r3, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x1c500) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) [ 244.316716][ T21] tipc: TX() has been purged, node left! 22:20:59 executing program 5: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r3 = dup(r2) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x202000, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r3, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) mmap(&(0x7f00002ef000/0x1000)=nil, 0x1000, 0x2000006, 0x4000010, r3, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x1c500) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) close(0xffffffffffffffff) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) 22:20:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 22:20:59 executing program 4: bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x10}, 0x20) [ 244.592454][ T27] audit: type=1804 audit(1585779659.338:50): pid=9901 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir656335369/syzkaller.kdvwI6/12/file0" dev="sda1" ino=16535 res=1 22:20:59 executing program 4: r0 = memfd_create(&(0x7f0000000240)='ovf\x00', 0x0) pwritev(r0, 0x0, 0x0, 0x0) [ 244.746600][ T27] audit: type=1804 audit(1585779659.388:51): pid=9902 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir370679438/syzkaller.RWzw3u/10/file0" dev="sda1" ino=16542 res=1 [ 244.913156][ T27] audit: type=1804 audit(1585779659.448:52): pid=9911 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir370679438/syzkaller.RWzw3u/10/file0" dev="sda1" ino=16542 res=1 [ 245.060507][ T27] audit: type=1804 audit(1585779659.458:53): pid=9910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir656335369/syzkaller.kdvwI6/12/file0" dev="sda1" ino=16535 res=1 [ 245.319911][ T27] audit: type=1804 audit(1585779660.068:54): pid=9910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir656335369/syzkaller.kdvwI6/12/file0" dev="sda1" ino=16535 res=1 22:21:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x4d2, 0x32}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 22:21:00 executing program 5: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r3 = dup(r2) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x202000, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r3, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) mmap(&(0x7f00002ef000/0x1000)=nil, 0x1000, 0x2000006, 0x4000010, r3, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x1c500) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) close(0xffffffffffffffff) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) 22:21:00 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000240)={0x0, 0x0}) 22:21:00 executing program 4: bpf$MAP_DELETE_ELEM(0x6, 0x0, 0xe8) 22:21:00 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) bind$xdp(r2, &(0x7f0000000900)={0x2c, 0x1, r4}, 0x52) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) clock_nanosleep(0x1, 0x1, 0x0, &(0x7f0000000200)) 22:21:00 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28081) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x10, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x41045508, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x38}}, 0x20}}, 0x0) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x40085511, 0x0) [ 245.563458][ T27] audit: type=1804 audit(1585779660.308:55): pid=9939 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir370679438/syzkaller.RWzw3u/11/file0" dev="sda1" ino=16570 res=1 [ 245.659418][ T27] audit: type=1804 audit(1585779660.388:56): pid=9933 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir370679438/syzkaller.RWzw3u/11/file0" dev="sda1" ino=16570 res=1 [ 245.815709][ T27] audit: type=1804 audit(1585779660.408:57): pid=9939 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir370679438/syzkaller.RWzw3u/11/file0" dev="sda1" ino=16570 res=1 22:21:00 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0xc125, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, &(0x7f0000469ffc)=0x100000000007fd, 0x4) 22:21:00 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 22:21:00 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="5500000018007f7d00fe01b2a4a280930a600000fca84302910000003900090020000c0003", 0x25}], 0x1}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r3 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28081) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x10, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_CLAIMINTERFACE(r3, 0x8004550f, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x38}}, 0x20}}, 0x0) ioctl$USBDEVFS_GETDRIVER(r3, 0x40085511, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 22:21:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x46010000, &(0x7f0000000000)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 22:21:00 executing program 4: setrlimit(0x0, &(0x7f0000000000)={0x2}) 22:21:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000280)={0x0, 0x27, &(0x7f00000002c0)={&(0x7f00000003c0)={0x68, r3, 0x1, 0x0, 0x0, {{}, {0x0, 0x4108}, {0x4c, 0x18, {0xfffffffe, @media='eth\x00'}}}}, 0x68}}, 0x0) 22:21:01 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x61a, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 22:21:01 executing program 5: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 22:21:01 executing program 4: setrlimit(0x10, &(0x7f0000000000)) 22:21:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$pppl2tp(0x18, 0x1, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000000)={'xfrm0\x00', 0x8000008}) 22:21:01 executing program 0: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffffe, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), 0x0, 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x2) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x5, 0x0, {0x0, 0x3}}, 0x30) [ 246.554609][ T9983] xfrm0: mtu greater than device maximum 22:21:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) epoll_pwait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}], 0x2, 0x0, &(0x7f0000000040), 0x51) [ 248.916532][ T21] tipc: TX() has been purged, node left! 22:21:11 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_names\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001800)={0xffffffffffffffff}) r1 = getpid() r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xffffffffffffffff, r3, 0x0) sendmsg$unix(r0, &(0x7f0000002940)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, r3}}}], 0x40}, 0x0) 22:21:11 executing program 4: 22:21:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:11 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0xffffffff, 0x0, 0x0, 0x8, 0x0, 0x99}) 22:21:11 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='f', 0x1, 0xffffffffffffffff) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r0, r2, 0x0) 22:21:11 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000140)={@void, @val={0x3}, @mpls={[], @ipv4=@udp={{0x5, 0x4, 0x0, 0x0, 0xfde5, 0x0, 0x0, 0x0, 0x88, 0x0, @remote, @remote}, {0x0, 0x0, 0xfdd1}}}}, 0xfdef) 22:21:11 executing program 0: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) mprotect(&(0x7f00003d4000/0x1000)=nil, 0x1000, 0x0) 22:21:11 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000240)={&(0x7f0000000200), 0x0}) 22:21:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x1, 0xb, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000"], 0x30}, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 22:21:11 executing program 3: unshare(0x40000000) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100001a00270d0000000057125f24b041f6d7", @ANYRES32, @ANYBLOB="00800c0000000000f2ff0001c800010075333200c0010200bc01010004000200b40105510004d72000000807000000ff03fffffffffffff00100000001010000000000010000000000000001ffb810000000000080000080000000000407000000080000d000000040000000050400000020000000000000620000000007000000400000000000800100000000089f1abf5f01978b467790f81f8178070000009b55b91601000300000000000009ffff800009002f3de672922ca7287d55e227a85e000029000000085408b300fbffffff000000080001000007000000f8f600000000a243000080010400000000000000000000675b0d41d9af33380b545184138e54a0000000080800000000000000000001ff00200eb7070020007f000000800000000000007f01000000ff7f00000000000580000001010017fbbc930000fa000010000c00000004070000000000200000000809000008090020000000000700020fffc359000002000000000004000000000900000000000a0000000000060000081707000000ff03000000000007000001ff1200000002000000000000020002000401019910ec13000000e5000300000006000100000900000000000020000013037f000000ff7f00000000001022bd9d000000000000adf007117909895d0ffdc701d59f03d529d940ca2c02eaaa04a8e080b422265e02ae1817f396d57182598287b386ff8cdad692ef98b45b5f7d302a9c27a7e7e5501a583f3a35e2833cd7ed3c5ecae0148ee8e7b69342c9a20caee6d01df95a395d92aca5a9620062d353429dd782684ed3e695921980b1f20e4ad251e1e08156283a14deb206ed12cc3f684847d788b083d3321d7cbfa07b5e1b8e3fb37ec8c429e2cbbfec27a9660c7026588442f5f9f4557511ec050d7a43ed56192fdb1f50cf3f8d9f1b62f596024f8c496cb2f4ea1ff3cefe5bb7b229ec4b81b626f53eed9ffe419ccf45f6bd19857c8c40ad05c2a8924dd25aafec45"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 256.553664][T10012] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 256.655356][T10012] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:21:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:11 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000000c0)={0x0, 0x0}) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) [ 256.750858][T10036] IPVS: ftp: loaded support on port[0] = 21 [ 256.767185][T10012] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 22:21:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 256.952933][T10036] IPVS: ftp: loaded support on port[0] = 21 22:21:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 257.091054][T10012] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 257.146868][T10012] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 22:21:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000000)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 260.936566][ T29] tipc: TX() has been purged, node left! 22:21:19 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 22:21:19 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x1, 0xb, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) flistxattr(r2, 0x0, 0x0) 22:21:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x1, &(0x7f0000000340)=[0x0]) 22:21:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000300000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:21:19 executing program 3: bpf$MAP_DELETE_ELEM(0xb, &(0x7f0000000640)={0xffffffffffffffff, 0x0}, 0x20) 22:21:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_uring_setup(0x0, &(0x7f0000000140)) 22:21:20 executing program 4: 22:21:20 executing program 2: 22:21:20 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 265.413710][T10087] EXT4-fs (loop1): bad geometry: block count 1080 exceeds size of device (1 blocks) 22:21:20 executing program 3: 22:21:20 executing program 0: 22:21:20 executing program 4: 22:21:20 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:20 executing program 2: 22:21:20 executing program 1: 22:21:20 executing program 3: 22:21:20 executing program 0: 22:21:20 executing program 4: 22:21:20 executing program 2: 22:21:20 executing program 3: 22:21:20 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:20 executing program 1: 22:21:20 executing program 0: 22:21:20 executing program 4: 22:21:20 executing program 2: 22:21:20 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:20 executing program 3: 22:21:20 executing program 1: 22:21:20 executing program 0: 22:21:20 executing program 4: 22:21:21 executing program 2: 22:21:21 executing program 3: 22:21:21 executing program 1: 22:21:21 executing program 0: 22:21:21 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:21 executing program 4: 22:21:21 executing program 2: 22:21:21 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:21 executing program 3: 22:21:21 executing program 1: 22:21:21 executing program 0: 22:21:21 executing program 2: 22:21:21 executing program 4: 22:21:21 executing program 1: 22:21:21 executing program 3: 22:21:21 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:21 executing program 0: 22:21:21 executing program 4: 22:21:21 executing program 2: 22:21:21 executing program 3: 22:21:21 executing program 1: 22:21:21 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:21 executing program 0: 22:21:21 executing program 4: 22:21:21 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:21 executing program 2: 22:21:21 executing program 3: 22:21:21 executing program 1: 22:21:22 executing program 4: 22:21:22 executing program 0: 22:21:22 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:22 executing program 2: 22:21:22 executing program 0: 22:21:22 executing program 1: 22:21:22 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:22 executing program 3: 22:21:22 executing program 4: 22:21:22 executing program 0: 22:21:22 executing program 2: 22:21:22 executing program 1: 22:21:22 executing program 3: 22:21:22 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:22 executing program 4: 22:21:22 executing program 0: 22:21:22 executing program 2: 22:21:22 executing program 3: 22:21:22 executing program 1: 22:21:22 executing program 4: 22:21:22 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:22 executing program 2: 22:21:22 executing program 0: 22:21:22 executing program 3: 22:21:22 executing program 1: 22:21:22 executing program 4: 22:21:23 executing program 2: 22:21:23 executing program 0: 22:21:23 executing program 3: 22:21:23 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:23 executing program 4: 22:21:23 executing program 1: 22:21:23 executing program 2: 22:21:23 executing program 3: 22:21:23 executing program 0: 22:21:23 executing program 4: 22:21:23 executing program 2: 22:21:23 executing program 5: 22:21:23 executing program 1: 22:21:23 executing program 3: 22:21:23 executing program 0: 22:21:23 executing program 4: 22:21:23 executing program 1: 22:21:23 executing program 2: 22:21:23 executing program 5: 22:21:23 executing program 3: 22:21:23 executing program 0: 22:21:23 executing program 1: 22:21:23 executing program 2: 22:21:23 executing program 4: 22:21:23 executing program 5: 22:21:23 executing program 3: 22:21:24 executing program 0: 22:21:24 executing program 1: 22:21:24 executing program 4: 22:21:24 executing program 2: 22:21:24 executing program 5: 22:21:24 executing program 0: 22:21:24 executing program 3: 22:21:24 executing program 1: 22:21:24 executing program 4: 22:21:24 executing program 2: 22:21:24 executing program 5: 22:21:24 executing program 3: 22:21:24 executing program 0: 22:21:24 executing program 1: 22:21:24 executing program 2: 22:21:24 executing program 5: 22:21:24 executing program 0: 22:21:24 executing program 4: 22:21:24 executing program 3: 22:21:24 executing program 1: 22:21:24 executing program 5: 22:21:24 executing program 2: 22:21:24 executing program 0: 22:21:24 executing program 4: 22:21:24 executing program 3: 22:21:24 executing program 2: 22:21:25 executing program 5: 22:21:25 executing program 1: 22:21:25 executing program 4: 22:21:25 executing program 3: 22:21:25 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28081) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x10, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x38}}, 0x20}}, 0x0) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x40085511, 0x0) 22:21:25 executing program 1: 22:21:25 executing program 4: 22:21:25 executing program 5: 22:21:25 executing program 2: 22:21:25 executing program 2: 22:21:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000100), 0x4) 22:21:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x6, 0x43}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000100), 0x4) sendto(r0, &(0x7f00000000c0)=':', 0x1, 0x0, 0x0, 0x0) 22:21:25 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r3, @ANYBLOB="0000400000000005280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6e6b090000a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863829b9ace6afe217b151889f478b7a2603d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac64832"], 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x1d, r3}, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=@can={{}, 0x0, 0x0, 0x0, 0x0, "05ad35c5df014733"}, 0x10}}, 0x0) 22:21:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x61) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f00000004c0)=[{&(0x7f00000008c0)="0a99b3e3930870dcd4c6d68e6abe088a5accdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377b8f0c69b09d01000000cf550f05d219f9c6ca195d3b4e29f3230cdd08cd5f1c946bee78e546d580a203030f47d70c95a97fe501000000ffffffff8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e0000000000003b9bd6b7f46843cd7400000000000000000000da4150cc06507aca4a15ec5bf48efd96e80a2e03ae10c1121d40311509db5b21f3694c4823f7d8b6cab1156cf3a6e5178587f78bdf", 0xc9}], 0x1) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x264) recvmmsg(r0, &(0x7f0000005980)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)=""/231, 0xe7}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="1e268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 22:21:25 executing program 3: 22:21:25 executing program 5: 22:21:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000005280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6e6b090000a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863829b9ace6afe217b151889f478b7a2603d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac64832"], 0x48}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x1d, r4}, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=@can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "05ad35c5df014733"}, 0x10}}, 0x0) 22:21:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000005280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6e6b090000a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863829b9ace6afe217b151889f478b7a2603d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac64832"], 0x48}}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x1d, r4}, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=@can={{}, 0x0, 0x2, 0x0, 0x0, "05ad35c5df014733"}, 0x10}}, 0x20008010) 22:21:25 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r3, @ANYBLOB="0000400000000005280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6e6b090000a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863829b9ace6afe217b151889f478b7a2603d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac64832"], 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x1d, r3}, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=@can={{}, 0x0, 0x0, 0x0, 0x0, "05ad35c5df014733"}, 0x10}}, 0x0) 22:21:25 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000100)=0x7, 0x4) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect(r0, &(0x7f0000000000)=@ethernet={0x0, @multicast}, 0x80) 22:21:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000cde8000000010799adc7c29444374bee910bff2afba7df962d4b2bcce3bf3d781bda992ee6de737828a4f581187ccbcd1421f54b3e6d01be048bd351e7321c96c24c39fde25cc834001f682b5a1cc324780ef9df4fedc36d"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x179, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r3, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2000000011000100000000000000000000000020", @ANYRES32=r3, @ANYBLOB="e8ffffffffffffff"], 0x20}}, 0x0) 22:21:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) 22:21:26 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r4, 0x1, 0x0, 0x0, {0x2}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}]}, 0x1c}}, 0x0) 22:21:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000100)=0x7, 0x4) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect(r0, &(0x7f0000000000)=@ethernet={0x0, @multicast}, 0x80) 22:21:26 executing program 2: r0 = socket(0x10, 0x3, 0x0) recvmsg$can_j1939(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1}, 0x0) write(r0, &(0x7f000018efdc)="1400000052001f0214f9f4070009040081000710", 0x14) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0}}], 0x344, 0x10122, 0x0) 22:21:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") socket(0x18, 0x0, 0x3) 22:21:26 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r3, @ANYBLOB="0000400000000005280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6e6b090000a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863829b9ace6afe217b151889f478b7a2603d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac64832"], 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x1d, r3}, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=@can={{}, 0x0, 0x0, 0x0, 0x0, "05ad35c5df014733"}, 0x10}}, 0x0) 22:21:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockname(r1, &(0x7f0000000040)=@xdp, &(0x7f00000000c0)=0x80) 22:21:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) 22:21:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000100)=0x7, 0x4) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect(r0, &(0x7f0000000000)=@ethernet={0x0, @multicast}, 0x80) 22:21:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) 22:21:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket(0x18, 0x0, 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 22:21:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'caif0\x00', @broadcast}) 22:21:26 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r3, @ANYBLOB="0000400000000005280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6e6b090000a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863829b9ace6afe217b151889f478b7a2603d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac64832"], 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x1d, r3}, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=@can={{}, 0x0, 0x0, 0x0, 0x0, "05ad35c5df014733"}, 0x10}}, 0x0) 22:21:26 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x3a) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000180)={&(0x7f00000001c0)=@nl=@unspec={0x0, 0x0, 0x0, 0x8dffffff}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000240)="82c2178d", 0xfc9e}], 0x1}, 0x0) 22:21:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000100)=0x7, 0x4) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect(r0, &(0x7f0000000000)=@ethernet={0x0, @multicast}, 0x80) 22:21:26 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000001d40)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000c00)=""/235, 0xeb}], 0x1, &(0x7f0000000d40)=""/4096, 0x1000}, 0x40000020) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000002c0)=@generic={0x10, "b9ded4cbb553084e3c69fc8f3738fcf3d52dcbfe003b190b3c8bc1b2331cafca25cea4b0eb0e3500c01dd71555256425990e69365550b99fb71d4fd6c2d654fec0e7b1e4fa490705a5d91ae7750223de55410a855055376ace43ccffaa78b3d85fd26211de906d702ae577c0cbaf4e196100dabd9afb501c76ab6d3b18e4"}, 0x80, &(0x7f00000007c0)=[{0x0}, {&(0x7f0000000500)="4d671549fe99647d446034de37fa8d06c1a027800b93616d846645c9d693396a565bb75cafcf4b539db4d276f2fa490bd9b9f282f8f585367a563e7e9192c4117a07d6c250f7ac29decf2f39e91ad92a84526b898ca4d85831f1499786e716ae75876fc4153554241ab0484c68ee6e5ffc77ce94684c0c5e90bafb822588ced1cb5a17876d52a4d95436729308bd9e4ba9fb1d78c01b65ae40ac00c82b960736fe2c", 0xa2}, {0x0}, {&(0x7f0000000680)="7e386e8120612062e5eb596d39dec3fa715a7cdc3cc0566f6d0fa718cd7030f521da98f6cca4d2585364eaa5ba23850928595cc148c802bd7049dc46ba0c0416635cab67984deb1fd90e1104441506414f8bde8c2b6b434c087244", 0x5b}, {&(0x7f0000000700)="cfe4ab75dc7c586dc74e0e671df06d0d963a1257a516dc490f3eba2005c45dbf8abf98dc2e00d676e618d9bf34acb7f153b89d0fac2e88c8bb1ad6ba434118d1776969b9ee7a1073", 0x48}], 0x5, &(0x7f0000003480)=ANY=[@ANYBLOB="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"], 0x364}, 0x220000c1) socketpair(0xf, 0x2, 0x0, &(0x7f0000001d80)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000003100)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000001e40)}, {&(0x7f0000001f40)="403de969ef7d5470905f1afdbfb0cc843d0b32cfbbe86ef041380b48e3a513c6c19d4a97206006536da9c5801cd39701db49ffe92867b718030a3e642e4bf822a0afc613bfc0578ce732564f1f6e18b52672f35cc98dd814dc656dba623ad16f11429d644e2df4932b211b20b1ff9ed82f304a9e64fd2edbbdcffde3e273c6dc5e00b17452a5f24e125942e99a7a61d850878b398b2e9eb177795d54d4b90d0b5063b63bfeef5308bfe01366951e393e2845b814", 0xb4}], 0x2}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa078b25db4cb904e473730e55cff26d1b0e001d00140000005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000033c0)={0xffffffffffffffff, 0x10, &(0x7f0000003380)={&(0x7f0000003280)=""/235, 0xeb, 0xffffffffffffffff}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(0xffffffffffffffff) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) bpf$PROG_LOAD(0x5, 0x0, 0x0) 22:21:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000c00)="480e003f0000007e5bc5795e8064", 0x0, 0x55, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000240)=r2) r3 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x70, 0x7f, 0x40, 0x7f, 0x3, 0x0, 0x0, 0x400a, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x6, 0x8}, 0x10001, 0x1000, 0x6, 0x7, 0x1, 0xe0000000, 0x6}, r1, 0xd, r0, 0x8) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x3, 0x2, 0x9, 0x4, 0x0, 0x4, 0x30, 0xc, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x5, 0x5, 0x0, 0x100000001, 0x5, 0x17}, 0x0, 0x8, r3, 0x1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) write$cgroup_int(r5, &(0x7f0000000200)=0x4, 0x1fff0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={0x0}, 0x10) 22:21:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000200000db0000000000000000850000002c0000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000c00)="480e003f0000007e5bc5795e8064", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 272.226625][T10504] device caif0 entered promiscuous mode 22:21:27 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$can_raw(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x1d, r2}, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=@can={{}, 0x0, 0x0, 0x0, 0x0, "05ad35c5df014733"}, 0x10}}, 0x0) 22:21:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0xfea3) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r4, @ANYBLOB="0000400000000005280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6e6b090000a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863829b9ace6afe217b151889f478b7a2603d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac64832"], 0x48}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000240)={0x0, 0xffffffffffffff4a, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000001600010a000010300000000000000000"], 0x18}}, 0x0) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 272.275997][T10517] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 272.311132][T10517] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 22:21:27 executing program 1: socket$kcm(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3d}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x4000a0, 0x23, 0x5ac484bb51fa106a, &(0x7f0000000040)="4d50b441e692763513ef874565020007000112bbf32d9fd0880f892fd398e4000000001375bc847d142d1523389037a1d4f5631813cf7037fd584b4af7507a849ce80deea1a57733a5e3730fbef42ab9bedd390775bf809fbcf2a71f32d41a1f7ff3b5483107766a8bd0033d44e6ef7b526c8c67aa9847e283c6cdccbd627ad1094342b1840b506814cb319132533f6d740d9643d0c6dc8481d0c9643dd3e0aa6e1be581aca3ea9377136ce8dd480207fba7af225672c63802beb9647a5fbe90781e147e92eae8d9d79d0d", 0x0, 0x23, 0x0, 0x22d, 0x1000000}, 0x28) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1a}, 0x40) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 272.392210][T10511] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 22:21:27 executing program 2: socket$kcm(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3d}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x4000a0, 0x17, 0x5ac484bb51fa106a, &(0x7f0000000040)="4d50b441e692763513ef874565020007000112bbf32d9fd0880f892fd398e4000000001375bc847d142d1523389037a1d4f5631813cf7037fd584b4af7507a849ce80deea1a57733a5e3730fbef42ab9bedd390775bf809fbcf2a71f32d41a1f7ff3b5483107766a8bd0033d44e6ef7b526c8c67aa9847e283c6cdccbd627ad1094342b1840b506814cb319132533f6d740d9643d0c6dc8481d0c9643dd3e0aa6e1be581aca3ea9377136ce8dd480207fba7af225672c63802beb9647a5fbe90781e147e92eae8d9d79d0d", 0x0, 0x23, 0x0, 0x22d, 0x1000000}, 0x28) 22:21:27 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'caif0\x00', @broadcast}) 22:21:27 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$can_raw(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x1d, r2}, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=@can={{}, 0x0, 0x0, 0x0, 0x0, "05ad35c5df014733"}, 0x10}}, 0x0) 22:21:27 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)={[{0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2d, 'cpu'}, {0x2b, 'pids'}, {0x0, 'rdma'}]}, 0x25) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x2) close(0xffffffffffffffff) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2d, 'io'}, {0x2b, 'cpu'}, {0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'io'}, {0x2d, 'memory'}]}, 0x2f) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x0, 0x0, 0x1, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0xab, &(0x7f0000000040), &(0x7f00000003c0)=""/171, 0x10001, 0x0, 0xf6, 0x8c, &(0x7f0000000480)="db86fbb809fb16c7fc97437cac58bf2d681073b85d259d61aa1c1e47a23647093ddf94b6c322576c2b69668bb5a71961609e49bb7b6f5d5ccd83fc892db28c1d3db25a4b40fe84bcfd75ca812f69ff2544cba70cc8b2c96c6aa08e57964314648adfe1b777d3ebacb0aa041e639577016be990de5f4a5d828adfc0c7a1e0c8782b8ea8393e58aa47f89ee4e2ab37b03050c45963c7f9dbaa055ed106683c9adbac13d29803588b5ce98290775bba9524c0258d1fb71e558290a46fd9449528eeb4b14069025ec468a0974c6736e36ad7a0ab64255c94e2ffe213606e078acb6909e5c860c22abc6a4d3f7c52e10f9dbc9413a5bd8f96", &(0x7f0000000580)="531ac333e3a73793307437cd1cfca8ff425b4cbe38d67df887f0306a41442583505310cc634c3ca818841a8430f7837010b0b1768e2186eb37a5feea03eec2aa305e6b0dedd3ac4267618ffd961677eecc6304f7b2791050e953c68d31b0e0bdeeb7878d4126ea3131e2dc1fc38f524afe01f8fc45774f91c1692bbf4754a1ff3486b0db863bc57ee615618b"}, 0x40) perf_event_open(0x0, 0x0, 0x0, r1, 0x2) 22:21:27 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$can_raw(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x1d, r2}, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=@can={{}, 0x0, 0x0, 0x0, 0x0, "05ad35c5df014733"}, 0x10}}, 0x0) 22:21:27 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'caif0\x00', @broadcast}) [ 272.782252][T10546] ------------[ cut here ]------------ [ 272.787950][T10546] hsr_addr_subst_dest: Unknown node [ 272.794109][T10546] WARNING: CPU: 1 PID: 10546 at net/hsr/hsr_framereg.c:321 hsr_addr_subst_dest+0x36c/0x440 [ 272.804092][T10546] Kernel panic - not syncing: panic_on_warn set ... [ 272.810687][T10546] CPU: 1 PID: 10546 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 272.820597][T10546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.830649][T10546] Call Trace: [ 272.833997][T10546] dump_stack+0x188/0x20d [ 272.838336][T10546] ? hsr_addr_subst_dest+0x320/0x440 [ 272.843658][T10546] panic+0x2e3/0x75c [ 272.847560][T10546] ? add_taint.cold+0x16/0x16 [ 272.852321][T10546] ? __probe_kernel_read+0x188/0x1d0 [ 272.857612][T10546] ? __warn.cold+0x14/0x35 [ 272.862039][T10546] ? hsr_addr_subst_dest+0x36c/0x440 [ 272.867329][T10546] __warn.cold+0x2f/0x35 [ 272.871576][T10546] ? hsr_addr_subst_dest+0x36c/0x440 [ 272.876861][T10546] report_bug+0x27b/0x2f0 [ 272.881263][T10546] do_error_trap+0x12b/0x220 [ 272.885858][T10546] ? hsr_addr_subst_dest+0x36c/0x440 [ 272.891154][T10546] do_invalid_op+0x32/0x40 [ 272.895578][T10546] ? hsr_addr_subst_dest+0x36c/0x440 [ 272.900959][T10546] invalid_op+0x23/0x30 [ 272.906165][T10546] RIP: 0010:hsr_addr_subst_dest+0x36c/0x440 [ 272.912064][T10546] Code: 89 de e8 87 5e bb f9 84 db 75 d4 e8 4e 5d bb f9 48 c7 c6 80 a4 fa 88 48 c7 c7 40 a3 fa 88 c6 05 21 44 ca 02 01 e8 ac 28 8d f9 <0f> 0b eb b1 e8 2b 5d bb f9 0f b6 1d 0d 44 ca 02 31 ff 89 de e8 4b [ 272.931672][T10546] RSP: 0018:ffffc900016074f0 EFLAGS: 00010282 [ 272.937749][T10546] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 272.945731][T10546] RDX: 000000000000bb0c RSI: ffffffff815c4e91 RDI: fffff520002c0e90 [ 272.953731][T10546] RBP: 00000000019fbbf3 R08: ffff88804e0c82c0 R09: ffffed1015ce45c9 [ 272.961704][T10546] R10: ffffed1015ce45c8 R11: ffff8880ae722e43 R12: 0000000001000700 [ 272.969678][T10546] R13: ffff888055b30ba0 R14: 000000000000bb12 R15: ffff888055b30ba0 [ 272.977772][T10546] ? vprintk_func+0x81/0x17e [ 272.982422][T10546] hsr_forward_skb+0x134b/0x1d00 [ 272.987398][T10546] hsr_dev_xmit+0x78/0xd0 [ 272.991813][T10546] dev_hard_start_xmit+0x1a4/0x9b0 [ 272.996954][T10546] __dev_queue_xmit+0x259c/0x3070 [ 273.002084][T10546] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 273.007909][T10546] ? kmem_cache_alloc_node_trace+0x240/0x790 [ 273.013909][T10546] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 273.019281][T10546] ? skb_release_data+0x128/0x8a0 [ 273.024381][T10546] ? skb_headers_offset_update+0x15a/0x2a0 [ 273.030196][T10546] ? pskb_expand_head+0x558/0x1020 [ 273.035372][T10546] ? __bpf_redirect+0x769/0xc60 [ 273.040230][T10546] __bpf_redirect+0x769/0xc60 [ 273.044926][T10546] ? skb_ensure_writable+0xe5/0x450 [ 273.050152][T10546] bpf_clone_redirect+0x2b7/0x430 [ 273.055191][T10546] bpf_prog_f9bdc51a988dbf58+0x6c/0x1000 [ 273.060841][T10546] ? __free_zapped_classes+0x2c0/0x2e0 [ 273.066319][T10546] ? __lock_acquire+0x827/0x5270 [ 273.071275][T10546] ? find_held_lock+0x2d/0x110 [ 273.076106][T10546] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 273.081583][T10546] ? lockdep_hardirqs_on+0x417/0x5d0 [ 273.086880][T10546] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 273.092425][T10546] ? smp_apic_timer_interrupt+0x1b6/0x600 [ 273.098294][T10546] ? retint_kernel+0x2b/0x2b [ 273.102910][T10546] ? bpf_prog_f9bdc51a988dbf58+0x10/0x1000 [ 273.108826][T10546] bpf_test_run+0x3c4/0xc70 [ 273.113394][T10546] ? __phys_addr+0x9a/0x110 [ 273.117917][T10546] ? bpf_test_finish.isra.0+0x4f0/0x4f0 [ 273.123472][T10546] ? __build_skb+0x53/0x60 [ 273.127908][T10546] bpf_prog_test_run_skb+0xa6c/0x1480 [ 273.133299][T10546] ? bpf_test_init.isra.0+0x230/0x230 [ 273.138769][T10546] ? fput_many+0x2f/0x1a0 [ 273.143124][T10546] ? bpf_test_init.isra.0+0x230/0x230 [ 273.148599][T10546] __do_sys_bpf+0xbac/0x3f10 [ 273.153205][T10546] ? lock_acquire+0x197/0x420 [ 273.157950][T10546] ? __might_fault+0xef/0x1d0 [ 273.162723][T10546] ? bpf_prog_load+0x15f0/0x15f0 [ 273.167681][T10546] ? __might_fault+0x190/0x1d0 [ 273.172618][T10546] ? _copy_to_user+0x107/0x150 [ 273.177467][T10546] ? put_timespec64+0xcb/0x120 [ 273.182350][T10546] ? ns_to_kernel_old_timeval+0x100/0x100 [ 273.188164][T10546] ? __ia32_sys_clock_settime+0x260/0x260 [ 273.193945][T10546] ? trace_hardirqs_off_caller+0x55/0x230 [ 273.199686][T10546] do_syscall_64+0xf6/0x790 [ 273.204209][T10546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.210109][T10546] RIP: 0033:0x45c849 [ 273.214007][T10546] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.233614][T10546] RSP: 002b:00007fd586aa2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 273.242032][T10546] RAX: ffffffffffffffda RBX: 00007fd586aa36d4 RCX: 000000000045c849 [ 273.250010][T10546] RDX: 0000000000000028 RSI: 0000000020000740 RDI: 000000000000000a [ 273.257987][T10546] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 273.265965][T10546] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 273.273942][T10546] R13: 0000000000000059 R14: 00000000004c2f70 R15: 000000000076bf0c [ 273.283509][T10546] Kernel Offset: disabled [ 273.287978][T10546] Rebooting in 86400 seconds..