IOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0x363}, {0x0, 0xffffffffffffffea}, {&(0x7f0000000000)=""/62, 0x13}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x2c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/user\x00') ptrace$cont(0x9, r1, 0x2, 0x0) 01:07:58 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) uname(&(0x7f0000000100)=""/115) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fchmodat(r6, &(0x7f0000000180)='./file0\x00', 0x2) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000000)=0x8, 0x4) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0, 0x0, &(0x7f0000000800)=[@txtime={{0x18, 0x2}}], 0x18}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r3, 0x0, 0x1d, &(0x7f00000001c0)='-vmnet1posix_acl_access.ppp0\x00', 0xffffffffffffffff}, 0x30) ptrace$setsig(0x4203, r7, 0x400, &(0x7f0000000240)={0x22, 0x1, 0x3}) [ 2506.285423][T19626] device nr0 entered promiscuous mode [ 2506.371169][T19623] debugfs: File 'dropped' in directory 'loop0' already present! 01:07:59 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x480100, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000100)=0xffffffffffffffb7, 0x8) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) [ 2506.421454][T19623] debugfs: File 'msg' in directory 'loop0' already present! 01:07:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f00000001c0)={0x0, 0x0, {0xe, 0x2, 0x2005, 0x1, 0xa, 0x7, 0x2, 0x2748202630a72ab7}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) io_uring_setup(0x547, &(0x7f0000000140)={0x0, 0x0, 0x1, 0x0, 0x89}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0x363}, {0x0, 0xffffffffffffffea}, {&(0x7f0000000000)=""/62, 0x13}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x2c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x0, 0x26000) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f0000000300)) ptrace$cont(0x9, r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGSOFTCAR(r5, 0x5419, &(0x7f0000000240)) [ 2506.476472][T19623] debugfs: File 'trace0' in directory 'loop0' already present! 01:07:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r2, &(0x7f0000000d00), 0x1bdd307, 0x0) 01:07:59 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x8000, 0x0, 0x0, 0x0, 0x101, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x1, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2507.078569][T19958] debugfs: File 'dropped' in directory 'loop0' already present! [ 2507.088331][T19958] debugfs: File 'msg' in directory 'loop0' already present! [ 2507.097989][T19958] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x3) 01:08:00 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x12, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:00 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0, 0x0, &(0x7f0000000800)=[@txtime={{0x18, 0x2}}], 0x18}, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40803, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x70, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={r5, 0x1}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={r6, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, &(0x7f0000000240)=0x84) 01:08:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000700)="8c2fb074d782b99a4ebb28bd49ca9d8f70aca1f2e24e7dc4636db1607852800ad7239bfbb123065f680fcd8bd0da6e13b662424ccd67943bc81a1d56defee801abbb295542689614ad3cf075062ecc8f45aa7708f05b4a75cd21c51a0cdf5c1d22ec6c88b2f328c35d2284ce37375165fc7b892d92b8d60d65de6a11b376b8379dea0e24d9d54997f9b0c35fdbb691b6a85b1dd235877eaf2c6b56cdebc12feefd6c32891969cc07ec80aa29bcc95a7fa0866e97a784c0ac21edab15d06cfb51b0f47e5f4404000000", 0xc9}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000006840)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/62, 0x3e}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/38, 0x26}, {&(0x7f0000000a80)=""/108, 0x6c}], 0x2}}], 0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x11, 0x0, 0x0) 01:08:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x2, 0x10000, 0xfffffffe, 0x4, 0x0, 0x1}, 0x1c) timer_create(0x7, &(0x7f0000000100)={0x0, 0x3e, 0x3}, &(0x7f0000000140)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(r1, 0x1, &(0x7f0000000200)={{r2, r3+30000000}, {r4, r5+10000000}}, &(0x7f0000000240)) recvmmsg(r0, &(0x7f0000002440)=[{{&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/157, 0x9d}, {&(0x7f00000003c0)=""/233, 0xe9}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=""/53, 0x35}], 0x4, &(0x7f0000000580)=""/162, 0xa2}, 0xffffffff}, {{&(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000006c0)=""/23, 0x17}, {&(0x7f0000000700)=""/72, 0x48}, {&(0x7f0000000780)=""/178, 0xb2}, {&(0x7f0000000840)=""/204, 0xcc}, {&(0x7f0000000940)=""/121, 0x79}], 0x5, &(0x7f0000000a40)=""/4096, 0x1000}, 0x92b}, {{&(0x7f0000001a40)=@xdp, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001ac0)=""/78, 0x4e}, {&(0x7f0000001b40)=""/99, 0x63}, {&(0x7f0000001bc0)=""/120, 0x78}], 0x3, &(0x7f0000001c80)=""/152, 0x98}, 0x5}, {{&(0x7f0000001d40)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001dc0)=""/208, 0xd0}, {&(0x7f0000001ec0)=""/191, 0xbf}, {&(0x7f0000001f80)=""/174, 0xae}, {&(0x7f0000002040)=""/40, 0x28}], 0x4, &(0x7f00000020c0)=""/32, 0x20}, 0x7fffffff}, {{&(0x7f0000002100)=@nfc, 0x80, &(0x7f0000002400)=[{&(0x7f0000002180)=""/236, 0xec}, {&(0x7f0000002280)=""/180, 0xb4}, {&(0x7f0000002340)}, {&(0x7f0000002380)=""/120, 0x78}], 0x4}, 0x8}], 0x5, 0x100, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r6, 0x0, 0x2a, &(0x7f0000002580)={0x9, {{0x2, 0x4e22, @loopback}}}, 0x88) sendmsg$sock(r0, &(0x7f0000000000)={&(0x7f0000000080)=@caif=@rfm={0x25, 0x3, "c81c8177c2ec3e92e3b1f779dd848391"}, 0x80, 0x0}, 0x60) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm-monitor\x00', 0x20000, 0x0) ioctl$KDGKBENT(r7, 0x4b46, &(0x7f0000002340)={0x4, 0x4, 0x1}) 01:08:00 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000200)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$NBD_SET_BLKSIZE(r2, 0xab01, 0x1f) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req3={0x10001, 0x3, 0x7fffffff, 0x3ff, 0x4, 0x1, 0x7fffffff}, 0x8b4a889bbdc6a210) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x800c0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000200)={@hyper}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() getgroups(0x3, &(0x7f0000000500)=[r6, r6, 0x0]) fchownat(r4, &(0x7f0000000100)='./file0\x00', r5, r6, 0x0) sendmsg$sock(r3, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) [ 2507.542673][T20076] device nr0 entered promiscuous mode [ 2507.672921][T20073] debugfs: File 'dropped' in directory 'loop0' already present! [ 2507.717778][T20073] debugfs: File 'msg' in directory 'loop0' already present! 01:08:00 executing program 4: sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r0, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000280)={0xc246, "89752ac7b7ec98367a468f30d2205829d10082b16bd17395954a65b48f29a41e", 0x3}) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc008561c, &(0x7f0000000000)={0x8000006, 0x9, @value}) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r3 = dup2(r1, r2) ioctl$PPPIOCDISCONN(r3, 0x7439) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000440)={0x8, 0x1, 0x6}) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') ptrace$setsig(0x4203, 0x0, 0x4245, &(0x7f0000000140)={0x2c, 0x200, 0x3f}) r4 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)=""/64, &(0x7f0000000100)=0x40) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100, 0x10000, 0x1, 0x0, 0x7, 0x8}, 0x17) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = accept4$inet(r11, &(0x7f0000000200)={0x2, 0x0, @empty}, &(0x7f0000000240)=0x10, 0x800) getsockopt$inet_IP_XFRM_POLICY(r12, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xfffffffffffffec3) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000300)={'vxcan0\x00', r13}) sendmsg$sock(r4, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0, 0xfffffffffffffff3, &(0x7f0000000800)=[@txtime={{0x18, 0x2}}], 0xfffffffffffffef3}, 0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={0x0}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r8, 0x84, 0xa, &(0x7f0000000400)={0x0, 0xfffe, 0x200, 0x5, 0x1850, 0x2cc71000, 0x9, 0x0, r14}, 0x20) [ 2507.760480][T20073] debugfs: File 'trace0' in directory 'loop0' already present! [ 2507.824267][T20158] debugfs: File 'dropped' in directory 'loop0' already present! [ 2507.848423][T20158] debugfs: File 'msg' in directory 'loop0' already present! 01:08:00 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000940)='net/sockstat6\x00\xcf\xb7Pg\xdb\x88j\x17\xad\x9f\xd9#\x01\xddWs\xfdF#]\xf9\x97\xad\xa6%./B\xb3E\x05V\x97\xebZQ_\xc4\x06]N\x11\xbeyu_\xc4\xedx]V\"\x06\xcd\x8f\xca\xbb \xc7o1\t5dl\xb0\xcaE\xb8\xceS;\\\xe2Lt\x9e\",\xdc\xbe$\x1e3:I_\v\x8d\xdas\x9e\x1bA\tC\xc5\xdf\xdb\xb8\xf2\x84\xf9$t\xf8}HX\x8b=7\x18\xce') sendfile(r3, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r4, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)=0x8) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) perf_event_open(&(0x7f00000012c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0, 0xc995c76cdda916eb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x485}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001240)={0x4, 0x70, 0x0, 0x80, 0x3f, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000240), 0x8}, 0x9800, 0x0, 0x0, 0x5, 0xfffffffffffffffc, 0xffffffff}, 0x0, 0x9, 0xffffffffffffffff, 0x8) syz_open_dev$loop(&(0x7f0000000640)='[\b)\xb4\"\x16p#\x00', 0x0, 0x2) mount(0x0, &(0x7f0000000380)='./bus\x00', &(0x7f00000001c0)='f2fs\x00', 0x0, &(0x7f00000007c0)='net/sockstat6\x00\xcf\xb7Pg\xdb\x88j\x17\xad\x9f\xd9#\x01\xddWs\xfdF#]\xf9\x97\xad\xa6%./B\xb3E\x05V\x97\xebZQ_\xc4\x06]N\x11\xbeyu_\xc4\xedx]V\"\x06\xcd\x8f\xca\xbb \xc7o1\t5dl\xb0\xcaE\xb8\xceS;\\\xe2Lt\x9e\",\xdc\xbe$\x1e3:I_\v\x8d\xdas\x9e\x1bA\tC\xc5\xdf\xdb\xb8\xf2\x84\xf9$t\xf8}HX\x8b=7\x18\xce') socket(0x12, 0x1a6273f2b2e289f7, 0x0) socket(0x1, 0x0, 0x0) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) close(0xffffffffffffffff) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r5, 0x7ffffc, 0x0) r6 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x578b73438318286d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000800, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2000000000000e0f}, r6, 0xf7fffff7ffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x0, @empty}, &(0x7f0000000700)=0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@initdev}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xffffffffffffff8a) getgroups(0x2, &(0x7f0000000740)=[0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) socket$unix(0x1, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@initdev}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0x205) [ 2507.874622][T20158] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:00 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x14, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:00 executing program 2: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2, 0x40000000, 0x689}, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x38, 0x2f, 0x0, @remote={0xfe, 0x80, [0x2, 0x543, 0xff7f, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x0, 0x8dffffff00000000, 0x8dffffff00000000, 0xfe03, 0x0, 0xfffffff5, 0xffffca88], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[@routing={0x2f}], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x5, 0x1, [0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @rand_addr="a17a3b38f611dce28dcda0ed9d053148"}}}}}}}, 0x0) [ 2508.171068][T20300] debugfs: File 'dropped' in directory 'loop0' already present! [ 2508.195926][T20300] debugfs: File 'msg' in directory 'loop0' already present! 01:08:00 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x80000000000000a, 0x2, 0x0) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac604ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, &(0x7f0000000000)) [ 2508.221098][T20300] debugfs: File 'trace0' in directory 'loop0' already present! [ 2508.500871][T20469] device nr0 entered promiscuous mode 01:08:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x4) 01:08:01 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f0000000200)='pkcs\x1b_-\xf0st\x00\x14\f\xf7\x9c\x91K{\xeb\xd1PEs', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000000)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:01 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10800, 0x100000001, 0x95e2, 0x8}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2, 0x4}, 0x80, 0x0, 0x0, &(0x7f0000000800)}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x103000, 0x0) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f0000000380)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$IMADDTIMER(r4, 0x80044940, &(0x7f0000000340)=0xfffffffffff0bd8d) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r7, 0x40045542, &(0x7f0000000300)=0x3) r8 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r8, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) keyctl$set_reqkey_keyring(0xe, 0x4) ioctl$FS_IOC_FSSETXATTR(r8, 0x401c5820, &(0x7f0000000200)={0x20, 0x95, 0x3, 0x7, 0x31c}) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000140)={0x0, 0x1, 0x9, [], &(0x7f0000000100)=0x1f}) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) r9 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r9, 0x4014563c, &(0x7f00000002c0)={0xc, {0x5, 0x7, 0x0, 0x290}}) 01:08:01 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r3, 0xfffffffffffffe54, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r4}, 0x30) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000180), &(0x7f0000000200)=0xb) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r4}, 0xc) r6 = semget$private(0x0, 0x20000000107, 0x0) semctl$IPC_RMID(r6, 0x0, 0x0) semctl$GETPID(r6, 0x2, 0xb, &(0x7f0000000000)=""/30) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) 01:08:01 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000003f, 0x0) 01:08:01 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x19c, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2509.144008][T20623] debugfs: File 'dropped' in directory 'loop0' already present! [ 2509.152702][T20623] debugfs: File 'msg' in directory 'loop0' already present! [ 2509.162010][T20623] debugfs: File 'trace0' in directory 'loop0' already present! [ 2509.234424][T20633] device nr0 entered promiscuous mode 01:08:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$bt_cmtp(0x1f, 0x3, 0x5) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x0, 0x70bd26, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x44048000}, 0x4028814) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0xfffffffffffffde8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000c19e0000000000000000", @ANYRES32=r8, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00', r8}) sendmsg$sock(r4, &(0x7f0000000240)={&(0x7f0000000080)=@ll={0x11, 0xd, r9, 0x1, 0x5, 0x6, @random="3149fef1a209"}, 0x376, 0x0, 0xfffffc99, &(0x7f0000000800)=[@txtime={{0x18, 0x2}}], 0xa}, 0x0) [ 2509.311834][T20635] debugfs: File 'dropped' in directory 'loop0' already present! [ 2509.346412][T20635] debugfs: File 'msg' in directory 'loop0' already present! 01:08:02 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x300, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf99756155d2513886658ca05135e6db381b6f90de095fc4405b52cbc10100000000000000c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c00", 0xfffffee5, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)='\x00') r10 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)='\x00') keyctl$instantiate_iov(0x14, r10, &(0x7f0000000340)=[{&(0x7f0000000d80)="cdf2496db05f9cbd72c35562132cf5b2bac9bb2a26c081bb003ce465ba0c4ba0c18180e4e85b31441c34064218ca72b48af49dde07933fc3c8b8265894bc21648947e990e0bca534b94119d74964949c87c2f81fd5df4210c517d70d7462dddaec86dc765e1cf042aba86c8c1332b73745f2910f499b65580dfd50e34fb6b738d31976a3fe3d8f9c9c706b451182c8e90e1f1fa7d5be90ab8218cab102fc956332ce4fadc2f7031625d5e9d09a3b529f0af6f58583fc531418e15f8618d700c413e65ef34de59260818db3b20b1e055b339f6b0f0d8d906df87ca4d541eda76bf2e674c7c181d6673769cdd09e99", 0xee}, {&(0x7f0000000000)="61ebea02a55e7179323a737356c1c9139b82b6c5535d7fa6e44e9609cbb1a7b6d0fe685f7ac04650b6029313031e64eb81dfb95f8cff4a829a57d47a1b60", 0x3e}, {&(0x7f0000000200)='a', 0x1}, {&(0x7f0000001b80)="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", 0x1000}, {&(0x7f0000000e80)="87cf9404f2955918f2f0ce0682ad1c1c31ed29e0837a546ed7d4cfc7f65006e24c8cdc286b529276998c93ff427122bd4d97f565d22f3066dd3819f0828078741d643bc17e142bd00de4f0b9d0ddf5fd6740af37a152029f5bfa0d4ff5ee9d0414dcf089456b8c02f6870ef35ca3c4f4d9dd0f3d4e0828bc4ecea8b1b40dc02412fa2491423d6ec531fae9a415b32e7b64d4ff0812ef0a1328b8a563b2a78057589f921c59c0335650af0941a34021b3efa7adc97857672e92e25dc981032d8f1ae1743fb05c0e1e44c7dc0f39a4a42ddcbe916d90e8e649ed496d15c04f57163b", 0xe1}, {&(0x7f0000000780)="a685f5cfe146c7a6a3d222ab4b3237873bd931884dffbe58a39373296f715880339e9ee225a53772d92beba4296f6af1ee293356592252ab327fc08c31ceda3fd5e98ca7e6553705a7d528bcb3408a4986615cbcce8e3758ca7856d76ffce197d4c38cd9a6a3d19847f1fbb283d40989cb84ac4db29f8e696a9acfbb846ee89956dd36cb1e9aa467bbb5fae312284a724fa1d46e7248f27cc9aa5067a5", 0x9d}, {&(0x7f0000000240)="079f4914e61668e68d31bda4dba5e014ba0d0f0d55", 0x15}], 0x7, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2509.386091][ C0] net_ratelimit: 12 callbacks suppressed [ 2509.386100][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2509.398044][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:08:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x97, 0x7, 0x1, 0x8}, 0xfffffffffffffcf8) r1 = dup(r0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000100)) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x6) sendmsg$sock(r4, &(0x7f0000000140)={&(0x7f0000000180)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x2, 0x3, 0x1}}, 0x80, 0x0, 0x19f, 0x0, 0x30b}, 0x40000) [ 2509.467647][T20635] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:02 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r6 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r6, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r7 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x7d}) r8 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) [ 2509.679563][T20839] debugfs: File 'dropped' in directory 'loop0' already present! [ 2509.713363][T20839] debugfs: File 'msg' in directory 'loop0' already present! [ 2509.751713][T20839] debugfs: File 'trace0' in directory 'loop0' already present! [ 2509.946091][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2509.952007][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2509.974720][T20792] bond0: (slave bridge21): Enslaving as an active interface with an up link 01:08:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2001}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r3, 0x4, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20001840}, 0x2e60907ac480f06a) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r4, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) 01:08:02 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x40, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'sy\x9a', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2510.186911][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2510.193680][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2510.202140][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2510.208762][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2510.308650][T21063] device nr0 entered promiscuous mode [ 2510.427136][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2510.434154][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2510.472012][T21064] debugfs: File 'dropped' in directory 'loop0' already present! [ 2510.500392][T21064] debugfs: File 'msg' in directory 'loop0' already present! [ 2510.522949][T21064] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0xe) 01:08:03 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x38c, 0x349140) statx(r1, &(0x7f0000000380)='./file0\x00', 0x400, 0xfff, &(0x7f0000000540)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="94000000", @ANYRES16=r8, @ANYBLOB="0700000000000000000001000000000000000c410000007800140c771992237fdd8e75afbc85abbe1fd833d3255b47e64cfc37a297f853d782fc5ff8447eefebfa9e01272b0bab5be160be8a42f7beeb9dd53a7f456a41258ab8327dae40746736c54b0d426f20bcbb01cf23ffe419e9653965e2517d0f38dd31efd59ecf9bfbc11c07c1843944986d2fc3000000"], 0x94}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1800000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r8, 0x400, 0x70bd25, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x400}, 0x800) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r6, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x82010000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r8, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x4, @media='ib\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x2008014) r9 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet6_MCAST_JOIN_GROUP(r9, 0x29, 0x2a, &(0x7f0000000100)={0x6064, {{0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x17}}}}, 0x88) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0, 0x0, &(0x7f0000000800)=[@txtime={{0x18, 0x2}}], 0x18}, 0x0) 01:08:03 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x1bc, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'os2.', 'trusted.overlay.origin\x00'}) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) 01:08:03 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r6 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r6, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r7 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x7d}) r8 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) 01:08:03 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) r8 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$TIOCSCTTY(r8, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r9 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r10) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2511.067301][T21079] debugfs: File 'dropped' in directory 'loop0' already present! [ 2511.075515][T21079] debugfs: File 'msg' in directory 'loop0' already present! [ 2511.086447][T21079] debugfs: File 'trace0' in directory 'loop0' already present! [ 2511.123548][T21084] device nr0 entered promiscuous mode [ 2511.132678][T21083] debugfs: File 'dropped' in directory 'loop0' already present! 01:08:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) 01:08:03 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000000100)) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) lookup_dcookie(0x4, &(0x7f0000000180)=""/75, 0x4b) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0, 0x0, &(0x7f0000000800)=[@txtime={{0x18, 0x2}}], 0x18}, 0x0) [ 2511.164698][T21083] debugfs: File 'msg' in directory 'loop0' already present! [ 2511.204257][T21083] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:04 executing program 3: socket$can_j1939(0x1d, 0x2, 0x7) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10003, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) 01:08:04 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$vhci(r2, &(0x7f0000000100)=@HCI_ACLDATA_PKT={0x2, "c189689e9df7460fc4a5b87586cbbcbccd74f573efe09f3d5e046ff656826601fc932e64510d5a474f1d79b80e6dcc2599274279f849adc0057526f853139aa58f432b496c928424bacfc7623f33cb5f704305ab33aea8ee9b9b87bf22eb398e49fc556a87548089fb61ae4ecb599fb600bf5c16e1bb141578f79a6b09adc7515617e4bdcf87ceed93996c1edeeb81d8516bb08ada8b1e"}, 0x98) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000040)=@req={0x0, 0x4, 0x4, 0x1}, 0x4) sendmsg$sock(r3, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000001c0)="be3d7ce63ba1a064ce1a89d1f08d7afaac7ab8b6a17339fccd82770d72322f446adedc57289358c39137200e52a93c4cb954b1c1ce97837ac76cddd0db13697aa1251fe32185ba4cad6e83272cd320a88d5341a69b6bdd17db04891d0f260591fb32baeae16abd1cc900befc2eee33a28e703f6ec5a4b80c1825d0c4965307762d4bb9b14701eccaa110c8aeea5140afef25d3e4b13e3bef9dc6be13d24fc5fe68977bd43fba3a187c3c5a7e820f5c5749922ac8695a30ffe1afb9f77bf2ccddc74cbadad48de0faa8658af163d653b2f470b5ffd18861aa876c70d1eefde0b0adbf98df21e6e67ed42decb18e95dff1f7", 0xf1) 01:08:04 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2511.795065][T21512] debugfs: File 'dropped' in directory 'loop0' already present! [ 2511.823874][T21512] debugfs: File 'msg' in directory 'loop0' already present! [ 2511.833735][T21512] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0xfdef) 01:08:05 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x230, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:05 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@ethernet={0x7, @local}, 0x80, 0x0, 0xfffffffffffffe60, 0x0, 0x24d}, 0x61) ioctl$VFIO_IOMMU_UNMAP_DMA(0xffffffffffffffff, 0x3b72, &(0x7f0000000000)={0x20, 0x0, 0x9, 0xcfbf, 0xffffffff}) 01:08:05 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0x0, 0xa0012101, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket(0x4a20bfd1efd7342b, 0x80002, 0x3) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040), 0x4) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)={0xfffffffb}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x84f6f96cdc1ea4c5, 0x0) clock_adjtime(0x6, &(0x7f0000000500)={0x1, 0x2000000, 0x1, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x200, 0x5, 0x100000001, 0x0, 0x3, 0x1000000000008001, 0x6, 0x1000, 0xfffffffffffffffe, 0x6, 0x80000001, 0xa3f5, 0x7ffd, 0x0, 0x7, 0x8, 0x6, 0x7ff}) ioctl$VFIO_IOMMU_MAP_DMA(r5, 0x3b71, 0x0) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x388, 0xb8) r6 = semget$private(0x0, 0x4, 0x0) semop(r6, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r5, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x3, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000000200)={0x2, 0xc, 0x0, 0x52}, &(0x7f0000000240)=0xb6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x3}}, 0x10) ptrace$pokeuser(0x6, r2, 0x388, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') fstat(r7, &(0x7f0000000380)) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4621, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') r9 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r9, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) sendfile(r9, r8, 0x0, 0x6f0a77bd) 01:08:05 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:05 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x39f, 0x0, 0x0, &(0x7f0000000800)=[@txtime={{0x18, 0x2}}], 0x18}, 0x0) 01:08:05 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0, 0x0, &(0x7f0000000800)=[@txtime={{0x18, 0x2}}], 0x18}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000100)={0x2, 'ip6gretap0\x00', {0x4}, 0xbcf}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f00000001c0)=""/170, &(0x7f0000000280)=0xaa) r3 = fcntl$dupfd(r2, 0x0, r1) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0xa18e}, &(0x7f0000000180)=0x8) [ 2512.627811][T21636] device nr0 entered promiscuous mode [ 2512.717464][T21632] debugfs: File 'dropped' in directory 'loop0' already present! [ 2512.742904][T21632] debugfs: File 'msg' in directory 'loop0' already present! [ 2512.782727][T21632] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:05 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xffffffffffffff93) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r12 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r12, 0x7d}) r13 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r13, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r14 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r15 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r14) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r15) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:05 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x2, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2513.235014][T21853] debugfs: File 'dropped' in directory 'loop0' already present! [ 2513.266379][T21853] debugfs: File 'msg' in directory 'loop0' already present! 01:08:05 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0x0, 0xa0012101, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket(0x4a20bfd1efd7342b, 0x80002, 0x3) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040), 0x4) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)={0xfffffffb}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x84f6f96cdc1ea4c5, 0x0) clock_adjtime(0x6, &(0x7f0000000500)={0x1, 0x2000000, 0x1, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x200, 0x5, 0x100000001, 0x0, 0x3, 0x1000000000008001, 0x6, 0x1000, 0xfffffffffffffffe, 0x6, 0x80000001, 0xa3f5, 0x7ffd, 0x0, 0x7, 0x8, 0x6, 0x7ff}) ioctl$VFIO_IOMMU_MAP_DMA(r5, 0x3b71, 0x0) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x388, 0xb8) r6 = semget$private(0x0, 0x4, 0x0) semop(r6, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r5, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x3, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000000200)={0x2, 0xc, 0x0, 0x52}, &(0x7f0000000240)=0xb6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x3}}, 0x10) ptrace$pokeuser(0x6, r2, 0x388, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') fstat(r7, &(0x7f0000000380)) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4621, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') r9 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r9, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) sendfile(r9, r8, 0x0, 0x6f0a77bd) [ 2513.286200][T21853] debugfs: File 'trace0' in directory 'loop0' already present! [ 2513.362469][T21854] debugfs: File 'dropped' in directory 'loop0' already present! 01:08:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r6 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x58, r6, 0x21, 0x0, 0x0, {}, [{{0x8, 0x1, r5}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0xfffffffffffffde8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000c19e0000000000000000", @ANYRES32=r10, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r12, 0x0, r11) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0xfffffffffffffde8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r16}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000c19e0000000000000000", @ANYRES32=r16, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r11, 0x8933, &(0x7f0000000100)={'vxcan1\x00', r16}) r18 = socket$netlink(0x10, 0x3, 0x0) r19 = socket$nl_route(0x10, 0x3, 0x0) r20 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r20, &(0x7f00000001c0)={0x0, 0xfffffffffffffde8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r20, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r19, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r21}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000c19e0000000000000000", @ANYRES32=r21, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@empty}}, &(0x7f0000000280)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r26 = fcntl$dupfd(r25, 0x0, r24) ioctl$PERF_EVENT_IOC_ENABLE(r26, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r26, 0x0, 0x10, &(0x7f0000000640)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) r28 = socket$netlink(0x10, 0x3, 0x0) r29 = socket$nl_route(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0xfffffffffffffde8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r31}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r28, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000c19e0000000000000000", @ANYRES32=r31, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) r32 = socket$netlink(0x10, 0x3, 0x0) r33 = socket$nl_route(0x10, 0x3, 0x0) r34 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r34, &(0x7f00000001c0)={0x0, 0xfffffffffffffde8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r34, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r33, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r35}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r32, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000c19e0000000000000000", @ANYRES32=r35, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) r36 = socket$netlink(0x10, 0x3, 0x0) r37 = socket$nl_route(0x10, 0x3, 0x0) r38 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r38, &(0x7f00000001c0)={0x0, 0xfffffffffffffde8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r38, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r37, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r39}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r36, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000c19e0000000000000000", @ANYRES32=r39, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001900)={{{@in6, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000880)=0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r43 = fcntl$dupfd(r42, 0x0, r41) ioctl$PERF_EVENT_IOC_ENABLE(r43, 0x8912, 0x400200) getsockname(r43, &(0x7f0000005b40)=@hci={0x1f, 0x0}, &(0x7f0000005bc0)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006340)={'nlmon0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000006440)={0x11, 0x0, 0x0}, &(0x7f0000006480)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006580)={'vcan0\x00', 0x0}) r48 = socket$netlink(0x10, 0x3, 0x0) r49 = socket$nl_route(0x10, 0x3, 0x0) r50 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r50, &(0x7f00000001c0)={0x0, 0xfffffffffffffde8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r50, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r49, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r51}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r48, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000c19e0000000000000000", @ANYRES32=r51, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r54 = fcntl$dupfd(r53, 0x0, r52) ioctl$PERF_EVENT_IOC_ENABLE(r54, 0x8912, 0x400200) accept4$packet(r54, &(0x7f00000065c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006600)=0x14, 0x1000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r58 = fcntl$dupfd(r57, 0x0, r56) ioctl$PERF_EVENT_IOC_ENABLE(r58, 0x8912, 0x400200) getsockopt$inet_pktinfo(r58, 0x0, 0x8, &(0x7f0000006640)={0x0, @local, @dev}, &(0x7f0000006680)=0xc) r60 = socket$netlink(0x10, 0x3, 0x0) r61 = socket$nl_route(0x10, 0x3, 0x0) r62 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r62, &(0x7f00000001c0)={0x0, 0xfffffffffffffde8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r62, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r61, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r63}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r60, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000c19e0000000000000000", @ANYRES32=r63, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000009000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009040)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r67 = fcntl$dupfd(r66, 0x0, r65) ioctl$PERF_EVENT_IOC_ENABLE(r67, 0x8912, 0x400200) getsockopt$inet_pktinfo(r67, 0x0, 0x8, &(0x7f0000009080)={0x0, @broadcast, @multicast1}, &(0x7f00000090c0)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r71 = fcntl$dupfd(r70, 0x0, r69) ioctl$PERF_EVENT_IOC_ENABLE(r71, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r71, 0x0, 0x10, &(0x7f0000009180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000009280)=0xe8) r73 = socket$netlink(0x10, 0x3, 0x0) r74 = socket$nl_route(0x10, 0x3, 0x0) r75 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r75, &(0x7f00000001c0)={0x0, 0xfffffffffffffde8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r75, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r74, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r76}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r73, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000c19e0000000000000000", @ANYRES32=r76, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000009300)={0x0, @sco={0x1f, {0x81, 0xc1, 0x2, 0x79, 0x80, 0x9}}, @sco={0x1f, {0x6, 0xfa, 0x8, 0x2, 0x96, 0xfe}}, @hci={0x1f, r76}, 0xfffb, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffff800, 0xfff, 0x7}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r80 = fcntl$dupfd(r79, 0x0, r78) ioctl$PERF_EVENT_IOC_ENABLE(r80, 0x8912, 0x400200) getsockopt$inet_pktinfo(r80, 0x0, 0x8, &(0x7f0000009380)={0x0, @multicast1, @local}, &(0x7f00000093c0)=0xc) r82 = socket$netlink(0x10, 0x3, 0x0) r83 = socket$nl_route(0x10, 0x3, 0x0) r84 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r84, &(0x7f00000001c0)={0x0, 0xfffffffffffffde8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r84, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r83, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r85}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r82, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000c19e0000000000000000", @ANYRES32=r85, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000094c0)={'team0\x00', r85}) r87 = socket$netlink(0x10, 0x3, 0x0) r88 = socket$nl_route(0x10, 0x3, 0x0) r89 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r89, &(0x7f00000001c0)={0x0, 0xfffffffffffffde8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r89, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r88, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r90}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r87, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000c19e0000000000000000", @ANYRES32=r90, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000009c00)={'sit0\x00', r90}) r92 = socket$netlink(0x10, 0x3, 0x0) r93 = socket$nl_route(0x10, 0x3, 0x0) r94 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r94, &(0x7f00000001c0)={0x0, 0xfffffffffffffde8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r94, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r93, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r95}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r92, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000c19e0000000000000000", @ANYRES32=r95, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) r96 = socket$netlink(0x10, 0x3, 0x0) r97 = socket$nl_route(0x10, 0x3, 0x0) r98 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r98, &(0x7f00000001c0)={0x0, 0xfffffffffffffde8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r98, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r97, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r99}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r96, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000c19e0000000000000000", @ANYRES32=r99, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f000000a8c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000000a880)={&(0x7f0000009c40)={0xc20, r6, 0x1, 0x70bd29, 0x25dfdbfe, {}, [{{0x8, 0x1, r10}, {0x138, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r23}, {0x198, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x93, 0x7, 0x3, 0x6}, {0x2, 0xfc, 0x1, 0xfffffffe}, {0x0, 0x0, 0x9, 0x400}, {0xfffe, 0xec, 0x0, 0x8000}, {0x0, 0x20, 0xad, 0x40}]}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x3, 0x7, 0x9, 0x9}, {0x1a, 0x6, 0xc0, 0x2}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffd}}, {0x8, 0x6, r27}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r35}, {0x1a4, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xa1ac}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xa7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8, 0x6, r39}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r40}}}]}}, {{0x8, 0x1, r44}, {0x19c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r45}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r46}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r47}}}]}}, {{0x8, 0x1, r51}, {0xb4, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x5, 0x40, 0x9, 0x1}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r55}}}]}}, {{0x8, 0x1, r59}, {0x1e4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r63}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x5, 0xf9, 0x5}, {0x1ff, 0x62, 0x9, 0xa9}, {0x40, 0x2b, 0x5, 0x3}, {0x8, 0xf7, 0xf8, 0x8}, {0x6, 0x0, 0x8, 0x1}, {0x12d, 0x6, 0x4, 0x1}, {0xfff, 0x9, 0xc8, 0x3}]}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x7, 0x40, 0x9f, 0x800}, {0x2, 0x81, 0x0, 0x1f}, {0xd4, 0x1, 0x8, 0x400}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x573}}, {0x8, 0x6, r64}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r68}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r72}}}]}}, {{0x8}, {0x1ec, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r77}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r81}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x532, 0x8, 0xc6, 0x140}, {0x1000, 0x3, 0x6, 0x10000}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r86}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffff8}}}]}}, {{0x8, 0x1, r91}, {0xf4, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80}}, {0x8, 0x6, r95}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r99}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}}]}}]}, 0xc20}}, 0x40008008) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) [ 2513.407705][T21854] debugfs: File 'msg' in directory 'loop0' already present! [ 2513.441874][T21854] debugfs: File 'trace0' in directory 'loop0' already present! [ 2513.556723][T21873] device bridge13 entered promiscuous mode [ 2513.564656][T21873] bond0: (slave bridge13): Enslaving as an active interface with an up link 01:08:06 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0xfff, 0x18d2, 0xe979, 0x8}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x1, 0xc2db, 0x5}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000140)={r4, 0x2, 0x3, [0x8, 0x93, 0x800]}, &(0x7f0000000180)=0xe) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0, 0x0, &(0x7f0000000800)=[@txtime={{0x18, 0x2}}], 0x18}, 0x0) [ 2513.782728][T21972] device nr0 entered promiscuous mode 01:08:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x2000916d) 01:08:06 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0x10321) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000cc0)) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r9 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r9, 0x7d}) r10 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r11 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r12 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r11) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r12) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:06 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/user\x00') sched_setparam(r1, &(0x7f0000000000)=0x552) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0, 0x0, &(0x7f0000000800)=[@txtime={{0x18, 0x2}}], 0x18}, 0x0) 01:08:06 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0x0, 0xa0012101, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket(0x4a20bfd1efd7342b, 0x80002, 0x3) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040), 0x4) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)={0xfffffffb}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x84f6f96cdc1ea4c5, 0x0) clock_adjtime(0x6, &(0x7f0000000500)={0x1, 0x2000000, 0x1, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x200, 0x5, 0x100000001, 0x0, 0x3, 0x1000000000008001, 0x6, 0x1000, 0xfffffffffffffffe, 0x6, 0x80000001, 0xa3f5, 0x7ffd, 0x0, 0x7, 0x8, 0x6, 0x7ff}) ioctl$VFIO_IOMMU_MAP_DMA(r5, 0x3b71, 0x0) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x388, 0xb8) r6 = semget$private(0x0, 0x4, 0x0) semop(r6, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r5, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x3, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000000200)={0x2, 0xc, 0x0, 0x52}, &(0x7f0000000240)=0xb6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x3}}, 0x10) ptrace$pokeuser(0x6, r2, 0x388, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') fstat(r7, &(0x7f0000000380)) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4621, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') r9 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r9, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) sendfile(r9, r8, 0x0, 0x6f0a77bd) 01:08:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20, 0x0) inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x20) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) 01:08:06 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x109, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2514.472628][T22238] device nr0 entered promiscuous mode 01:08:07 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x18, 0x6, 0x7, 0x8}, 0x10) openat$audio1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio1\x00', 0x4f080, 0x0) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0, 0x0, &(0x7f0000000800)=[@txtime={{0x18, 0x2}}], 0x18}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x80000, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000140)={0x18, 0xf, 0x1, {{0x46, 0x3, 0x1}, 0x4}}, 0x18) 01:08:07 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0x0, 0xa0012101, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket(0x4a20bfd1efd7342b, 0x80002, 0x3) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040), 0x4) r2 = getpid() r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x16, &(0x7f0000000100)={0xfffffffb}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x84f6f96cdc1ea4c5, 0x0) clock_adjtime(0x6, &(0x7f0000000500)={0x1, 0x2000000, 0x1, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x200, 0x5, 0x100000001, 0x0, 0x3, 0x1000000000008001, 0x6, 0x1000, 0xfffffffffffffffe, 0x6, 0x80000001, 0xa3f5, 0x7ffd, 0x0, 0x7, 0x8, 0x6, 0x7ff}) ioctl$VFIO_IOMMU_MAP_DMA(r5, 0x3b71, 0x0) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x388, 0xb8) r6 = semget$private(0x0, 0x4, 0x0) semop(r6, &(0x7f0000000680)=[{0x0, 0x0, 0x1000}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r5, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x3, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000000200)={0x2, 0xc, 0x0, 0x52}, &(0x7f0000000240)=0xb6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x3}}, 0x10) ptrace$pokeuser(0x6, r2, 0x388, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') fstat(r7, &(0x7f0000000380)) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4621, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') r9 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r9, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) sendfile(r9, r8, 0x0, 0x6f0a77bd) [ 2514.573613][T22199] debugfs: File 'dropped' in directory 'loop0' already present! [ 2514.586088][ C0] net_ratelimit: 18 callbacks suppressed [ 2514.586096][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2514.597826][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2514.625362][T22199] debugfs: File 'msg' in directory 'loop0' already present! 01:08:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) syz_open_dev$ttys(0xc, 0x2, 0x1) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) [ 2514.679342][T22199] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:07 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x1f6, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)=""/157, &(0x7f0000000000)=0x9d) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) 01:08:07 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x4, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0, 0x0, &(0x7f0000000800)=[@txtime={{0x18, 0x2}}], 0x18}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x100200, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40808022}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="d000000058391702391edc257a1e60b61db22a7179b89ca28625e0787226faea2425c257b25874da08396dd510c524dd28d429b2d8e76f40f925377243336350f9fae6606561c15e5f660e31689ab73ca68bb7be867d9b1586bd1cf7f3404fc1076f33c546aa63c2c0e080e857f498b6fbbc41f0f653738072bb", @ANYRES16=r4, @ANYBLOB="200029bd7000fedbdf250a00000008000400df0000000c000200080006008100000034000200080008000200000008000d000100000008000600ff010000080002004e200000080003000100000008000d00010000005800020008000600030000000800030002000000080003000200000008000e004e24000008000b000a000000080002004e210000080003000200000014000100ff02000000000006000000000000000108000800000c00001c000100080004004e200000080002003c0000000800080007000000"], 0xd0}, 0x1, 0x0, 0x0, 0x804}, 0x4) r5 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000440)=ANY=[@ANYBLOB="02000000b51c585511f0e855e3f07c31b10a69d4739373f0e236bed7d6dd88d4574bf8bb1bb1802b46283aa39542adac241234e433c4e09d2086d0ec5ebe969f90e13f14d976528459f452e8433ea0557e69cf69c661524cd611fbb02114dddbc82b6e292b3849dfd5e9928d0ecb074d83e4edb93b40c2eea5236fab04e408c047ad436453b6b0eee60d95c8e9b89c2384e48a466dd3122b69d67a3ee3020a2dc15876edb9b84814485f802d7c976b99015bb615c5323b02b8f3ba2711827907a0513a22f8dbc3fd2efcafea1cbbc4e4de0000000000000000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x70, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={r9, 0x2}, &(0x7f0000000100)=0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = socket$inet(0x2, 0x4000000805, 0x0) r15 = socket$inet_sctp(0x2, 0x5, 0x84) r16 = dup3(r14, r15, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r15, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r16, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r15, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r15, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r16, 0x84, 0x70, &(0x7f000059aff8)={r17}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r13, 0x84, 0x72, &(0x7f0000000180)={r17, 0x2, 0x30}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r5, 0x84, 0x79, &(0x7f0000000140)={r10, 0x1, 0x3ff}, 0x8) [ 2515.155248][T22622] debugfs: File 'dropped' in directory 'loop0' already present! [ 2515.192844][T22622] debugfs: File 'msg' in directory 'loop0' already present! [ 2515.210113][T22622] debugfs: File 'trace0' in directory 'loop0' already present! [ 2515.626107][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2515.632050][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:08:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0xfffffdef) 01:08:08 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x7, 0xc1b}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:08:08 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:08 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0, 0x0, &(0x7f0000000800)=[@txtime={{0x18, 0x2}}], 0x18}, 0x0) 01:08:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x8, 0x8001, 0x5, 0x7, 0x2, 0x5, 0x5}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000640)=0xa0, 0x2) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/attr/current\x00', 0x2, 0x0) pwritev(r0, &(0x7f00000005c0)=[{&(0x7f0000000100)="c16b32ecf80b0760fd44bb928475f828da4910bf771a4b04250e52b4207d509ab24c27e12d783393b441b1ac45db31bb5dab5b5cbdedbfc5de2ea4d510293d4b5fc116220f376b74263cb64470a068881cf45cf184e2ea752c045c35652f2051cdd87899b61b0f21aefd8d225c1874ab777cab8acfc1b7dfd915be922f4fc4e52682cfd10d7f7e3cc921c3023c8ef5485bb2c82f720db6", 0x97}, {&(0x7f00000001c0)="84058892e687330156f34d31b4afc83ec4a548f316acbca8925127bbfd4175cf418c2548d69bf06832491ebcdb246332a7411740bb18b1ff42af73d5630b3ff48736d038524fae9cc5188f6e816fd0b2ba0e6c10e258b2d543cf7fb1f6201cdba98c32c4f5805b53aae876b13a276be7e8e700498b7159a696f466416b8272d35f68ffc1f8f1dc3eb15d0bac9d2d3ce429a7f685c5583c33d64a0fd4c2b317dfb43993510e4546d49218095fac520834ef8d14a39890b43fb090a7f6b3412f18", 0xc0}, {&(0x7f0000000280)="7a0f73577f03250d2596d4cdd8fc8d910f1ad97ca4b468b89cb7b8cb24eaec7d07addc4c9ec486cfaef726ea51e108ed77ddddc747f6270b3415ccd24a1c99cd7c2b1dcdc55198221b59f9322b5ff4537307a47a8f6991d9a5509fddb7a9be04ef00cd2b5946ccfb9163550f8d659f7e436e6500ac07384b9c44eb1fced4813b4fc1da856118a60e0bb68e9fc44a0ab0703acd99d4e6ab4c76d2a14898e0fb3166984abad95ce14ce4c1aa5b7b9d5810cb2d8b152fd6461df7dcfaab2ebf9cb2f7a523f3c05dc9ea674b4bcdf5f0065f4e71ca3b669606b0a31b803302291533ff7fb4546f2fe2daf52c7ed475a0c7f8bdab84295d09d3ff8f", 0xf9}, {&(0x7f0000000040)="f2003109a83a5afce72ca99bae56b085ebab8eb6f1a2e9bd673f7b4059", 0x1d}, {&(0x7f0000000380)="1f8d1c0be2a9cc25a385e2e1ec2f6bf97cd02fc7aec20a87a8fa82748f73d5548f27f1322ac33c9fde6a055e76a83b08888e8c3a3605481129b7d67a0c9185fd8e60c42374c5d57cf32920ade9c6fe9d6ad905d7789b7849d6e4158db3713d6bce2094ef432895e8d07e15b8cad90d0ce3d1100f30981d8d4e918bb4c5fc224f23cad29c97f76dceefc833dd01269ae00c3e29ef481254f34c2b849c4a25377a9c08c3a1e6661ef34778f402f81b402c526fd7dd6d1056233670d09e4e728a40542cc03eb29e1f66017f25753213eb33ee1195261558328a973faf93d015495a7e01d3", 0xe3}, {&(0x7f0000000480)="07d8d4457f843ab63cac06d9007b9419930092db93ea0630c883e453aa4fafe27f286ec44b28dd8766a00cc783a2d13ae6fffcee94b7a39f464baeb564", 0x3d}, {&(0x7f00000004c0)="09df1ac004e121e27c09431c3b94cbbb787c4f6e11fb11b7d85412c9870749a95cc7154fc4fb11e15e5ef91cf1d43e4d4179315be1bc64a292238757560c8454e7160e5db3c384d95b8e4cd60d0ccc20f0dddef78949cd96ab58287c9f8d3a4d65e3dfe6b3a60dbe2f4dae171e45a43b71fd3880a2d82da1035289ca4218f0153dad3918261500a035c4df3c86060f4c67cbfb80c49146e43b0f00d3ab269e4896b83cdc7fdc55dd114f8a5fdc31787f37f44daccb9c47d35c8313ea42fcbf60120ce6788b93557b70c5f8d6129fb9795336ae1a63766134626a6ca28bf820b80d545e5cc5fa3652fdbe73eab3f9c0791ee6be74", 0xf4}], 0x7, 0x7) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x60) 01:08:08 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x240, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:08 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xe0, 0x4000) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x184, r10, 0xb03, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x2c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_BEARER={0x108, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, {0x14, 0x2, @in={0x2, 0x0, @multicast1}}}}]}, @TIPC_NLA_SOCK={0x67, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_MEDIA={0x70, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x184}}, 0x0) sendmsg$TIPC_NL_PUBL_GET(r8, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20001000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x130, r10, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0xb0, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x280}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa23}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffff25b}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x72f3d610}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x6c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffe00}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc6d5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x40000}, 0x40084) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$USBDEVFS_RESETEP(r8, 0x80045503, &(0x7f0000000200)={0xd, 0x1}) r11 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$packet_int(r11, 0x107, 0x0, &(0x7f00000001c0)=0x1d0, 0x4) timerfd_settime(r1, 0x1f082f41579507f0, &(0x7f0000000140)={{r2, r3+10000000}}, &(0x7f0000000180)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10002, 0x100000001, 0xbace, 0x1}, 0xfffffffffffffd61) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x1}, 0x80, 0x0}, 0x60) prctl$PR_GET_SECUREBITS(0x1b) [ 2515.938780][T22745] device nr0 entered promiscuous mode [ 2515.987426][T22742] debugfs: File 'dropped' in directory 'loop0' already present! [ 2516.032645][T22742] debugfs: File 'msg' in directory 'loop0' already present! [ 2516.051287][T22764] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2516.088596][T22742] debugfs: File 'trace0' in directory 'loop0' already present! [ 2516.102307][T22764] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. 01:08:08 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2516.197422][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2516.204299][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:08:08 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x1}], 0xab}, 0x44000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:09 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x244, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2516.388486][T22802] debugfs: File 'dropped' in directory 'loop0' already present! [ 2516.426054][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2516.431951][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:08:09 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2516.437855][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2516.443694][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2516.446882][T22802] debugfs: File 'msg' in directory 'loop0' already present! [ 2516.464731][T22802] debugfs: File 'trace0' in directory 'loop0' already present! [ 2516.611541][T23151] debugfs: File 'dropped' in directory 'loop0' already present! [ 2516.644367][T23151] debugfs: File 'msg' in directory 'loop0' already present! [ 2516.689385][T23151] debugfs: File 'trace0' in directory 'loop0' already present! [ 2516.732829][T23171] debugfs: File 'dropped' in directory 'loop0' already present! [ 2516.745559][T23171] debugfs: File 'msg' in directory 'loop0' already present! [ 2516.767388][T23171] debugfs: File 'trace0' in directory 'loop0' already present! [ 2516.809255][T23174] debugfs: File 'dropped' in directory 'loop0' already present! [ 2516.817960][T23174] debugfs: File 'msg' in directory 'loop0' already present! [ 2516.846557][T23174] debugfs: File 'trace0' in directory 'loop0' already present! [ 2517.093043][T22745] device nr0 entered promiscuous mode 01:08:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0xfffffffffffffdef) 01:08:10 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x2, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x44800, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000200)={'TPROXY\x00'}, &(0x7f0000000240)=0x1e) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x400000, 0x0) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) flistxattr(r3, &(0x7f0000000280)=""/120, 0x78) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000100)={{0x2, 0x55}, 'port1\x00', 0x10, 0x40000, 0x40000000, 0x6, 0x7f, 0x9, 0x2, 0x0, 0x7, 0x400}) 01:08:10 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0xb4d20200, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:10 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x264, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:10 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x6f0a77bd) fstat(r3, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x100, r2, r4, 0x0, r4}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:10 executing program 2 (fault-call:4 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f7ff"], 0x90ad) [ 2517.647050][T23391] debugfs: File 'dropped' in directory 'loop0' already present! [ 2517.656410][T23392] device nr0 entered promiscuous mode [ 2517.684023][T23392] FAULT_INJECTION: forcing a failure. [ 2517.684023][T23392] name failslab, interval 1, probability 0, space 0, times 0 [ 2517.697401][T23391] debugfs: File 'msg' in directory 'loop0' already present! [ 2517.710755][T23397] device nr0 entered promiscuous mode [ 2517.719091][T23391] debugfs: File 'trace0' in directory 'loop0' already present! [ 2517.724908][T23392] CPU: 0 PID: 23392 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 2517.741303][T23392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2517.751532][T23392] Call Trace: [ 2517.754841][T23392] dump_stack+0x197/0x210 [ 2517.759194][T23392] should_fail.cold+0xa/0x15 [ 2517.763806][T23392] ? fault_create_debugfs_attr+0x180/0x180 [ 2517.769637][T23392] ? ___might_sleep+0x163/0x2c0 [ 2517.774502][T23392] __should_failslab+0x121/0x190 [ 2517.779456][T23392] should_failslab+0x9/0x14 [ 2517.783968][T23392] kmem_cache_alloc_node+0x268/0x740 [ 2517.789261][T23392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2517.795624][T23392] __alloc_skb+0xd5/0x5e0 [ 2517.799964][T23392] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2517.805673][T23392] ? __kasan_check_read+0x11/0x20 [ 2517.810712][T23392] ? __lock_acquire+0x16f2/0x4a00 [ 2517.815783][T23392] alloc_skb_with_frags+0x93/0x590 [ 2517.815798][T23392] ? find_held_lock+0x35/0x130 [ 2517.815815][T23392] ? __might_fault+0x12b/0x1e0 [ 2517.815836][T23392] sock_alloc_send_pskb+0x7ad/0x920 01:08:10 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r9, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r8, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r9, 0x84, 0x70, &(0x7f000059aff8)={r10}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000380)={r10, 0x28, 0x1, [0x65]}, &(0x7f00000003c0)=0xa) write$capi20(r3, &(0x7f0000000340)={0x10, 0x0, 0x41, 0x107, 0x1, 0xdc}, 0x10) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = socket$nl_generic(0x10, 0x3, 0x10) r15 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r16 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r16, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r17 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r17, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) sendmsg$TIPC_CMD_RESET_LINK_STATS(r14, &(0x7f0000000300)={0x0, 0x78aff642fc93e567, &(0x7f0000000400)={&(0x7f00000006c0)=ANY=[@ANYRESOCT=r16, @ANYRESDEC=r17, @ANYBLOB="0700000000000000000001000000000000000c410000007800140c771992237fdd8e75afbc23a4c8281795abbe1fd833d3255b47e64cfc37a297f853d782fc5ff8447eefebfa9e01272b0bab5be160be8a42f7beeb9dd53a7f456a41258ab8327dae40746736c54b0d426f20bcbb01cf23ffe419e9653965e2517d0f380431efd59ecf9bfbc11c07c1843944986d2fc3000000"], 0x3}, 0x1, 0x0, 0x0, 0xda9e0cb53fa7d993}, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1800000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r15, 0x400, 0x70bd25, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x400}, 0x800) sendmsg$TIPC_CMD_GET_NODES(r13, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x84000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r15, 0x65d5df0fc93155c5, 0x70bd29, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r18 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r19, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r20 = semget$private(0x0, 0x20000000107, 0x0) semtimedop(r20, &(0x7f0000000080)=[{0x0, 0xffff}], 0x1, 0x0) sendmsg$sock(r18, &(0x7f00000008c0)={&(0x7f0000000080)=@llc={0x1a, 0x310, 0x1f, 0x1f, 0x3, 0x81, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x80, 0x0}, 0x60) [ 2517.815857][T23392] ? iov_iter_advance+0x29a/0xe20 [ 2517.815876][T23392] ? sock_wmalloc+0x120/0x120 [ 2517.815895][T23392] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2517.815908][T23392] ? iov_iter_advance+0x29a/0xe20 [ 2517.815921][T23392] ? _copy_from_iter_full+0x255/0x870 [ 2517.815947][T23392] tun_get_user+0xb07/0x3fc0 [ 2517.815960][T23392] ? __kasan_check_read+0x11/0x20 [ 2517.815988][T23392] ? tun_build_skb.isra.0+0x1470/0x1470 [ 2517.816007][T23392] ? lock_downgrade+0x920/0x920 [ 2517.816023][T23392] ? rcu_read_lock_held+0x9c/0xb0 [ 2517.816038][T23392] ? __kasan_check_read+0x11/0x20 [ 2517.816058][T23392] tun_chr_write_iter+0xbd/0x156 [ 2517.816075][T23392] new_sync_write+0x4d3/0x770 [ 2517.816093][T23392] ? new_sync_read+0x800/0x800 [ 2517.816117][T23392] ? __fget+0x37f/0x550 [ 2517.816139][T23392] ? apparmor_file_permission+0x27/0x30 [ 2517.816154][T23392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2517.816169][T23392] ? security_file_permission+0x8f/0x380 [ 2517.816182][T23392] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2517.816199][T23392] __vfs_write+0xe1/0x110 [ 2517.816217][T23392] vfs_write+0x268/0x5d0 [ 2517.816237][T23392] ksys_write+0x14f/0x290 [ 2517.816254][T23392] ? __ia32_sys_read+0xb0/0xb0 [ 2517.816272][T23392] ? do_syscall_64+0x26/0x790 [ 2517.816288][T23392] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2517.816302][T23392] ? do_syscall_64+0x26/0x790 [ 2517.816328][T23392] __x64_sys_write+0x73/0xb0 [ 2517.816345][T23392] do_syscall_64+0xfa/0x790 [ 2517.816364][T23392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2517.816377][T23392] RIP: 0033:0x45a6f9 [ 2517.816393][T23392] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2517.816401][T23392] RSP: 002b:00007f3dc8186c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2517.816415][T23392] RAX: ffffffffffffffda RBX: 00007f3dc8186c90 RCX: 000000000045a6f9 [ 2517.816424][T23392] RDX: 00000000000090ad RSI: 00000000200000c0 RDI: 0000000000000003 [ 2517.816432][T23392] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2517.816441][T23392] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dc81876d4 [ 2517.816450][T23392] R13: 00000000004cbc29 R14: 00000000004e5900 R15: 0000000000000005 [ 2517.839390][T23393] debugfs: File 'dropped' in directory 'loop0' already present! [ 2517.839568][T23393] debugfs: File 'msg' in directory 'loop0' already present! [ 2517.840858][T23393] debugfs: File 'trace0' in directory 'loop0' already present! [ 2517.851719][T23400] debugfs: File 'dropped' in directory 'loop0' already present! [ 2517.851743][T23400] debugfs: File 'msg' in directory 'loop0' already present! 01:08:11 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000100)={0x3f, "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"}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r1, &(0x7f00000008c0)={&(0x7f0000000080)=@caif, 0x80, 0x0, 0x0, 0x0, 0x110}, 0x60) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000340)={@multicast1, @multicast2}, &(0x7f0000000380)=0x8) 01:08:11 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x265, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2517.877145][T23418] debugfs: File 'dropped' in directory 'loop0' already present! [ 2517.877171][T23418] debugfs: File 'msg' in directory 'loop0' already present! [ 2517.877443][T23418] debugfs: File 'trace0' in directory 'loop0' already present! [ 2518.599871][T23397] device nr0 entered promiscuous mode 01:08:11 executing program 4 (fault-call:11 fault-nth:0): prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:08:11 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:11 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) bind$rds(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x22}}, 0x10) [ 2518.900159][T23719] debugfs: File 'dropped' in directory 'loop0' already present! [ 2518.917756][T23719] debugfs: File 'msg' in directory 'loop0' already present! [ 2518.959623][T23719] debugfs: File 'trace0' in directory 'loop0' already present! [ 2519.025138][T23727] debugfs: File 'dropped' in directory 'loop0' already present! [ 2519.046454][T23727] debugfs: File 'msg' in directory 'loop0' already present! [ 2519.068892][T23727] debugfs: File 'trace0' in directory 'loop0' already present! [ 2519.251462][T23732] debugfs: File 'dropped' in directory 'loop0' already present! [ 2519.264900][T23732] debugfs: File 'msg' in directory 'loop0' already present! [ 2519.282046][T23732] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:11 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'veth0_to_bond\x00', 0x4009}) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20c001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1001}) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\xd1\x00\x00\x00\x00\x00\x00\x00\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x5) 01:08:11 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r3, 0xc1004111, &(0x7f0000000100)={0x5, [[0x76, 0x6, 0x9, 0xa437, 0x0, 0x4, 0x5, 0x1], [0x80000000, 0x1, 0x2, 0x6ac, 0x4, 0x100, 0x7], [0x9, 0x9, 0xfffffff9, 0x5, 0x929, 0xfffffff9, 0x4d4c3af2, 0x1f]], [{0x81}, {0x8, 0x5, 0x1}, {0x1, 0x0, 0xfff}, {0x0, 0x0, 0x20}, {0x400, 0xfffffff8, 0x6b5}, {0x6, 0xfffffffc, 0xa2e0}, {0x7, 0x1ff, 0xd5e}, {0xffff, 0x6, 0x1}, {0x6e00, 0x7, 0x4}, {0x4, 0x9, 0x1ff}, {0x10000, 0x9}, {0x0, 0x6, 0x8}], 0x3}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x5, 0xfffff801}, 0xc) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) 01:08:11 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x280, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:11 executing program 2 (fault-call:4 fault-nth:1): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f7ff"], 0x90ad) 01:08:12 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffd7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffc000/0x4000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r7 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r7, 0x2285, 0x0) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x3, 0x1, 0x7fffffff, 0x9, 0x3}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2519.429175][T23844] device nr0 entered promiscuous mode [ 2519.442952][T23844] FAULT_INJECTION: forcing a failure. [ 2519.442952][T23844] name failslab, interval 1, probability 0, space 0, times 0 [ 2519.482456][T23844] CPU: 1 PID: 23844 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 2519.491362][T23844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2519.491377][T23844] Call Trace: [ 2519.504762][T23844] dump_stack+0x197/0x210 [ 2519.509240][T23844] should_fail.cold+0xa/0x15 [ 2519.513849][T23844] ? fault_create_debugfs_attr+0x180/0x180 [ 2519.519672][T23844] ? ___might_sleep+0x163/0x2c0 [ 2519.524677][T23844] __should_failslab+0x121/0x190 [ 2519.529627][T23844] should_failslab+0x9/0x14 [ 2519.534138][T23844] kmem_cache_alloc_node_trace+0x274/0x750 [ 2519.540010][T23844] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2519.540024][T23844] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2519.540043][T23844] __kmalloc_node_track_caller+0x3d/0x70 [ 2519.551055][T23841] debugfs: File 'dropped' in directory 'loop0' already present! [ 2519.551939][T23844] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2519.551960][T23844] __alloc_skb+0x10b/0x5e0 [ 2519.551986][T23844] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2519.565069][T23841] debugfs: File 'msg' in directory 'loop0' already present! [ 2519.565404][T23844] ? __kasan_check_read+0x11/0x20 [ 2519.565418][T23844] ? __lock_acquire+0x16f2/0x4a00 [ 2519.565440][T23844] alloc_skb_with_frags+0x93/0x590 [ 2519.573937][T23841] debugfs: File 'trace0' in directory 'loop0' already present! [ 2519.575202][T23844] ? find_held_lock+0x35/0x130 [ 2519.575221][T23844] ? __might_fault+0x12b/0x1e0 [ 2519.575242][T23844] sock_alloc_send_pskb+0x7ad/0x920 [ 2519.575261][T23844] ? iov_iter_advance+0x29a/0xe20 [ 2519.575281][T23844] ? sock_wmalloc+0x120/0x120 [ 2519.612980][T23854] debugfs: File 'dropped' in directory 'sg0' already present! [ 2519.615642][T23844] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2519.615658][T23844] ? iov_iter_advance+0x29a/0xe20 [ 2519.615677][T23844] ? _copy_from_iter_full+0x255/0x870 [ 2519.632458][T23854] debugfs: File 'msg' in directory 'sg0' already present! [ 2519.635394][T23844] tun_get_user+0xb07/0x3fc0 [ 2519.635409][T23844] ? __kasan_check_read+0x11/0x20 [ 2519.635435][T23844] ? tun_build_skb.isra.0+0x1470/0x1470 01:08:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_UNIQUE(r4, 0xc0106401, &(0x7f0000000040)={0x1, &(0x7f0000000000)=""/1}) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x90ad) [ 2519.681538][T23844] ? lock_downgrade+0x920/0x920 [ 2519.686411][T23844] ? rcu_read_lock_held+0x9c/0xb0 [ 2519.691552][T23844] ? __kasan_check_read+0x11/0x20 [ 2519.691579][T23844] tun_chr_write_iter+0xbd/0x156 [ 2519.691597][T23844] new_sync_write+0x4d3/0x770 [ 2519.691614][T23844] ? new_sync_read+0x800/0x800 [ 2519.691638][T23844] ? __fget+0x37f/0x550 [ 2519.691659][T23844] ? apparmor_file_permission+0x27/0x30 [ 2519.691676][T23844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2519.691691][T23844] ? security_file_permission+0x8f/0x380 [ 2519.691705][T23844] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2519.691723][T23844] __vfs_write+0xe1/0x110 [ 2519.691740][T23844] vfs_write+0x268/0x5d0 [ 2519.691759][T23844] ksys_write+0x14f/0x290 [ 2519.691776][T23844] ? __ia32_sys_read+0xb0/0xb0 [ 2519.691794][T23844] ? do_syscall_64+0x26/0x790 [ 2519.691811][T23844] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2519.691824][T23844] ? do_syscall_64+0x26/0x790 [ 2519.691844][T23844] __x64_sys_write+0x73/0xb0 [ 2519.691861][T23844] do_syscall_64+0xfa/0x790 [ 2519.691879][T23844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2519.691890][T23844] RIP: 0033:0x45a6f9 [ 2519.691906][T23844] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2519.691914][T23844] RSP: 002b:00007f3dc8186c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2519.691929][T23844] RAX: ffffffffffffffda RBX: 00007f3dc8186c90 RCX: 000000000045a6f9 [ 2519.691938][T23844] RDX: 00000000000090ad RSI: 00000000200000c0 RDI: 0000000000000003 [ 2519.691946][T23844] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2519.691955][T23844] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dc81876d4 01:08:12 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x2c0, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:12 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000040)=@req3={0x81, 0x1b, 0x10000, 0x0, 0x40000, 0x40000003, 0x3ff}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) [ 2519.691964][T23844] R13: 00000000004cbc29 R14: 00000000004e5900 R15: 0000000000000005 [ 2519.789913][ C0] net_ratelimit: 12 callbacks suppressed [ 2519.789923][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2519.790014][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:08:12 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='t\x00\xfc\xa7!\xb1^(\x9b\xcc\xd8') sendfile(0xffffffffffffffff, r3, 0x0, 0x6f0a77bd) fstat(r3, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, 0x0, r4, 0x0, r4}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940), &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2520.203766][T24275] debugfs: File 'dropped' in directory 'loop0' already present! [ 2520.212672][T24275] debugfs: File 'msg' in directory 'loop0' already present! [ 2520.223217][T24275] debugfs: File 'trace0' in directory 'loop0' already present! [ 2520.346112][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2520.352031][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2520.477883][T24073] device nr0 entered promiscuous mode [ 2520.540076][T24279] debugfs: File 'dropped' in directory 'loop0' already present! [ 2520.551788][T24279] debugfs: File 'msg' in directory 'loop0' already present! [ 2520.562368][T24279] debugfs: File 'trace0' in directory 'loop0' already present! [ 2520.586098][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2520.592704][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2520.599864][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2520.606706][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2520.826093][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2520.831997][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:08:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:08:14 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x300, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:14 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) r2 = getegid() getgroups(0x3, &(0x7f0000000500)=[r2, r2, 0x0]) getgroups(0x8, &(0x7f0000000240)=[0xee00, 0xee01, 0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee01, r2]) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r1, r3, 0x0) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) 01:08:14 executing program 2 (fault-call:4 fault-nth:2): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f7ff"], 0x90ad) 01:08:14 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = fcntl$dupfd(r13, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = fcntl$dupfd(r16, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = fcntl$dupfd(r19, 0x0, r18) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0x3b6) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r21 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r21, 0x7d}) r22 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r22, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d37) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'\x05yz', 0x1}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r23 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r24 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r23) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r24) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/\x02\x00\x00\x00\x00\x00\x00\x00tun\x00', 0x8c240, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000080"], 0x90ad) [ 2521.855457][T24291] device nr0 entered promiscuous mode [ 2521.895385][T24291] FAULT_INJECTION: forcing a failure. 01:08:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="004afc4d26"], 0x90ad) syz_open_dev$vivid(&(0x7f0000000240)='/dev/video#\x00', 0x1, 0x2) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80800, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xc8, 0x1e, 0x400, 0x70bd27, 0x25dfdbfb, {0x1a}, [@typed={0x8, 0x6d, @u32=0x2}, @generic="8262c24629ce485361a2d9f16388aa75912fa8b65f41579801c447d12fbc9528c2dbdb6ad5cf96c8e1368c1c07c16176c0ae2b4e7d3d285ce4032eb4e975c69898466b3b37adb6d26b2db575d185b04fb9f78cf46fed38bcae33baf2b1cdc7a0014390b621d1efb1d55ca5f7eb6d96090322078cf387b2073df4c202235ce0a9d46089b6d1e6e7b707beee4dab4831b4101b61fc978582024308d5bc5215ac16252a8b", @typed={0x8, 0x4b, @ipv4=@local}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4000}, 0x4) 01:08:14 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_GETOSPACE(r3, 0x8010500c, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000000140)=0xfffffffe, 0x4) [ 2521.895385][T24291] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2521.950375][T24291] CPU: 1 PID: 24291 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 2521.959109][T24291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2521.969207][T24291] Call Trace: [ 2521.969235][T24291] dump_stack+0x197/0x210 [ 2521.969261][T24291] should_fail.cold+0xa/0x15 [ 2521.969283][T24291] ? fault_create_debugfs_attr+0x180/0x180 [ 2521.969301][T24291] ? ___might_sleep+0x163/0x2c0 [ 2521.969327][T24291] should_fail_alloc_page+0x50/0x60 [ 2521.969342][T24291] __alloc_pages_nodemask+0x1a1/0x910 [ 2521.969356][T24291] ? kasan_kmalloc+0x9/0x10 [ 2521.969372][T24291] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2521.969403][T24291] ? __alloc_skb+0x3d0/0x5e0 [ 2521.969424][T24291] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2521.969444][T24291] alloc_pages_current+0x107/0x210 [ 2521.969463][T24291] alloc_skb_with_frags+0x1a5/0x590 [ 2521.969475][T24291] ? find_held_lock+0x35/0x130 01:08:14 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREMOVE(r2, &(0x7f0000000000)={0xffffffffffffff92, 0x7b, 0x1}, 0x7) fcntl$dupfd(r2, 0x0, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self\x00', 0x10040, 0x0) syz_open_dev$usbmon(&(0x7f0000000480)='\x00\x00\x00\x12\x10\x00', 0xffffffffffffff8d, 0x0) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r4, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) r7 = getegid() getgroups(0x4, &(0x7f0000000500)=[0x0, r7, 0x0, 0x0]) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) r9 = getegid() getgroups(0x4, &(0x7f0000000500)=[0x0, r9, 0x0, 0x0]) r10 = getegid() getgroups(0x4, &(0x7f0000000500)=[0x0, r10, 0x0, 0x0]) r11 = getegid() getgroups(0x3, &(0x7f0000000500)=[r11, r11, 0x0]) r12 = getegid() getgroups(0x4, &(0x7f0000000500)=[0x0, r12, 0x0, 0x0]) r13 = getegid() getgroups(0x3, &(0x7f0000000500)=[r13, r13, 0x0]) r14 = getegid() getgroups(0x4, &(0x7f0000000500)=[0x0, r14, 0x0, 0x0]) getresgid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000340)) fsetxattr$system_posix_acl(r2, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="02000400"/16, @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="040003000000000008000100", @ANYRES32=r7, @ANYBLOB="08000400", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="08000400", @ANYRES32=r10, @ANYBLOB="08000500", @ANYRES32=r11, @ANYBLOB="08000200", @ANYRES32=r12, @ANYBLOB="08000200", @ANYRES32=r13, @ANYBLOB="08000400", @ANYRES32=r14, @ANYBLOB="08000500", @ANYRES32=r15, @ANYBLOB="10000400000000002000bbed00000000"], 0x84, 0x1) sendmsg$sock(r1, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x5}, 0x80, 0x0, 0xffffffffffffffd5}, 0x60) [ 2521.969490][T24291] ? __might_fault+0x12b/0x1e0 [ 2521.969515][T24291] sock_alloc_send_pskb+0x7ad/0x920 [ 2521.969536][T24291] ? iov_iter_advance+0x29a/0xe20 [ 2521.969555][T24291] ? sock_wmalloc+0x120/0x120 [ 2521.969572][T24291] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2521.969584][T24291] ? iov_iter_advance+0x29a/0xe20 [ 2521.969596][T24291] ? _copy_from_iter_full+0x255/0x870 [ 2521.969620][T24291] tun_get_user+0xb07/0x3fc0 [ 2521.969632][T24291] ? __kasan_check_read+0x11/0x20 [ 2521.969663][T24291] ? tun_build_skb.isra.0+0x1470/0x1470 [ 2521.969683][T24291] ? lock_downgrade+0x920/0x920 [ 2521.969700][T24291] ? rcu_read_lock_held+0x9c/0xb0 [ 2521.969716][T24291] ? __kasan_check_read+0x11/0x20 [ 2521.969739][T24291] tun_chr_write_iter+0xbd/0x156 [ 2521.969756][T24291] new_sync_write+0x4d3/0x770 [ 2521.969772][T24291] ? new_sync_read+0x800/0x800 [ 2521.969795][T24291] ? __fget+0x37f/0x550 [ 2521.969817][T24291] ? apparmor_file_permission+0x27/0x30 01:08:15 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x340, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2521.969832][T24291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2521.969846][T24291] ? security_file_permission+0x8f/0x380 [ 2521.969859][T24291] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2521.969875][T24291] __vfs_write+0xe1/0x110 [ 2521.969893][T24291] vfs_write+0x268/0x5d0 [ 2521.969913][T24291] ksys_write+0x14f/0x290 [ 2521.969929][T24291] ? __ia32_sys_read+0xb0/0xb0 [ 2521.969946][T24291] ? do_syscall_64+0x26/0x790 [ 2521.969961][T24291] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2521.969975][T24291] ? do_syscall_64+0x26/0x790 [ 2521.969994][T24291] __x64_sys_write+0x73/0xb0 [ 2521.970010][T24291] do_syscall_64+0xfa/0x790 [ 2521.970028][T24291] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2521.970041][T24291] RIP: 0033:0x45a6f9 [ 2521.970057][T24291] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2521.970064][T24291] RSP: 002b:00007f3dc8186c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2521.970078][T24291] RAX: ffffffffffffffda RBX: 00007f3dc8186c90 RCX: 000000000045a6f9 [ 2521.970088][T24291] RDX: 00000000000090ad RSI: 00000000200000c0 RDI: 0000000000000003 [ 2521.970096][T24291] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2521.970105][T24291] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dc81876d4 [ 2521.970112][T24291] R13: 00000000004cbc29 R14: 00000000004e5900 R15: 0000000000000005 [ 2521.991611][T24295] debugfs: File 'dropped' in directory 'loop0' already present! [ 2521.991905][T24295] debugfs: File 'msg' in directory 'loop0' already present! [ 2521.994737][T24295] debugfs: File 'trace0' in directory 'loop0' already present! [ 2522.063108][T24307] device nr0 entered promiscuous mode [ 2522.660211][T24591] debugfs: File 'dropped' in directory 'loop0' already present! [ 2522.779258][T24591] debugfs: File 'msg' in directory 'loop0' already present! [ 2522.787972][T24591] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:15 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) [ 2523.023398][T24307] device nr0 entered promiscuous mode 01:08:15 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2523.319733][T24831] debugfs: File 'dropped' in directory 'loop0' already present! [ 2523.346980][T24831] debugfs: File 'msg' in directory 'loop0' already present! [ 2523.354487][T24831] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0xe, 0x0) 01:08:17 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x380, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:17 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x1, 0x400, 0x8, 0x1}, 0x10) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) 01:08:17 executing program 2 (fault-call:4 fault-nth:3): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f7ff"], 0x90ad) 01:08:17 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xfffffffffffffff2) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r7 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x7d}) r8 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='\t\x00@\x02 \x00\x00\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r9 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r10) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f00000001c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @local, 'erspan0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000380)={0x18, 0x0, {0x3, @local, 'ip6_vti0\x00'}}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000001300)='/Tevc\xf3a\x00', 0x62ae42, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$netlink_NETLINK_RX_RING(r6, 0x10e, 0x6, &(0x7f00000000c0)={0x800, 0x8, 0x4, 0x6}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r7, 0x8983, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200a447554fb9192965bcafff0f00000000000000"], 0x90ad) [ 2524.954810][T24850] device nr0 entered promiscuous mode [ 2524.986580][ C0] net_ratelimit: 18 callbacks suppressed [ 2524.986622][ C0] protocol 88fb is buggy, dev hsr_slave_0 01:08:17 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x12bfddee02b78858) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x5b0, 0x138, 0x138, 0x248, 0x0, 0x3d0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x5, &(0x7f0000000100), {[{{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x1a, @ipv4=@dev={0xac, 0x14, 0x14, 0x10}, @ipv4=@multicast1, @port=0x4e21, @icmp_id=0x68}}}, {{@ipv6={@local, @rand_addr="1a0efd3647145c3a72795bbac14dd99e", [0xffffffff, 0xff000000, 0xffffffff, 0xffffffff], [0x0, 0xff, 0xff000000, 0xff], 'team_slave_0\x00', 'ip6erspan0\x00', {0xff}, {0xff}, 0x0, 0x9, 0x2, 0x6c}, 0x0, 0xc8, 0x110}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x16}, @ipv6=@loopback, @icmp_id=0x68, @icmp_id=0x67}}}, {{@uncond, 0x0, 0x140, 0x188, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x7fffffff, 0x2, 0x0, [0x1, 0x2, 0x9, 0xfeff, 0x200, 0x1ff, 0x1f, 0x1, 0x20, 0x4, 0xf5, 0x3ff, 0x800, 0x9c4c, 0x40], 0x7}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x3a, 0x6, 0x8, 0x0, 0xff, 0x2, 0xab1}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x10, @ipv6=@empty, @ipv6=@remote, @icmp_id=0x67, @icmp_id=0x65}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0xbaa9f8a637e08055, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @gre_key=0x5, @icmp_id=0x67}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x610) openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) [ 2525.001055][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2525.039323][T24856] device nr0 entered promiscuous mode [ 2525.048808][T24843] debugfs: File 'dropped' in directory 'loop0' already present! [ 2525.058384][T24843] debugfs: File 'msg' in directory 'loop0' already present! [ 2525.071707][T24843] debugfs: File 'trace0' in directory 'loop0' already present! [ 2525.115378][T24848] debugfs: File 'dropped' in directory 'loop0' already present! [ 2525.155660][T24848] debugfs: File 'msg' in directory 'loop0' already present! 01:08:17 executing program 3: r0 = syz_open_dev$char_usb(0xc, 0xb4, 0xef) finit_module(r0, &(0x7f0000000000)='\x00', 0x1) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$fb(r4, &(0x7f00000001c0)="00d3fe0c4ecdbbaf538d055231845448d465b1b4bd7677bbedaa210c00803d62843a1199602c03e43174fb26c6be0e9ce80b", 0x32) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10001, 0x100000001, 0x10000, 0x1}, 0x1c) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x101000, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f0000000180)=0x100, 0x4) sendmsg$sock(r1, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) [ 2525.267743][T24848] debugfs: File 'trace0' in directory 'loop0' already present! [ 2525.402315][T25027] debugfs: File 'dropped' in directory 'loop0' already present! [ 2525.464285][T25027] debugfs: File 'msg' in directory 'loop0' already present! [ 2525.472946][T25027] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:18 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x3c0, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:18 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xa0, 0x0) recvfrom$inet(r4, 0x0, 0xffffffffffffffd8, 0xc0, 0x0, 0x336) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r8, 0x0, 0x6f0a77bd) fstat(r8, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r10 = getpgid(0x0) shmctl$IPC_SET(r6, 0x1, &(0x7f0000000840)={{0x100, r7, r9, 0x0, r9}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r10, 0x7d}) r11 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) ioctl$BLKTRACESETUP(r11, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r5, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r12 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r13 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r12) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r13) io_setup(0xa7e7, &(0x7f0000000580)) memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2525.834561][T25177] debugfs: File 'dropped' in directory 'loop0' already present! [ 2525.843723][T25177] debugfs: File 'msg' in directory 'loop0' already present! [ 2525.853478][T25177] debugfs: File 'trace0' in directory 'loop0' already present! [ 2525.937042][T25181] debugfs: File 'dropped' in directory 'loop0' already present! [ 2525.993549][T25181] debugfs: File 'msg' in directory 'loop0' already present! [ 2526.005633][T25181] debugfs: File 'trace0' in directory 'loop0' already present! [ 2526.026061][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2526.031940][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2526.175330][T24856] device nr0 entered promiscuous mode [ 2526.512535][T25290] debugfs: File 'dropped' in directory 'loop0' already present! [ 2526.521169][T25290] debugfs: File 'msg' in directory 'loop0' already present! [ 2526.529331][T25290] debugfs: File 'trace0' in directory 'loop0' already present! [ 2526.586082][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2526.591930][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2526.695663][T25291] debugfs: File 'dropped' in directory 'loop0' already present! [ 2526.704486][T25291] debugfs: File 'msg' in directory 'loop0' already present! [ 2526.715584][T25291] debugfs: File 'trace0' in directory 'loop0' already present! [ 2526.826084][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2526.832004][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2526.838356][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2526.844283][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:08:18 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x10003, 0x4800) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x100, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r10 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r10, 0x7d}) r11 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r11, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_bp={&(0x7f0000000480), 0x4}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d36) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r12 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r12) r13 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r13, &(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)='\x00') r14 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r14, &(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)='\x00') r15 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r15, &(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)='\x00') r16 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, r15) keyctl$instantiate_iov(0x14, r16, &(0x7f0000000440)=[{0x0}], 0x1, r12) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:19 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x402, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x7e, 0x0) 01:08:20 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f7ff"], 0x90ad) 01:08:20 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) r1 = socket$inet6_sctp(0xa, 0x3, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000002c0), 0x1) 01:08:20 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x8) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xfffffffffffffec2) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r9 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r9, 0x7d}) r10 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r11 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r12 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r11) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r12) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r0], 0x17) 01:08:20 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x403, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2527.957684][T25403] device nr0 entered promiscuous mode 01:08:20 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x204000, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000100)) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@rfm={0x25, 0x6, "cd44fa960bdc367f3ecbab27144add53"}, 0x37f, 0x0}, 0x60) [ 2528.138408][T25410] debugfs: File 'dropped' in directory 'loop0' already present! [ 2528.160606][T25410] debugfs: File 'msg' in directory 'loop0' already present! [ 2528.181357][T25410] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:20 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x522c93213653cf7e}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x10001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}, r4}}, 0x30) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r5, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) r6 = getpid() sched_getscheduler(r6) 01:08:21 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000100)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x2a}, 0x60) 01:08:21 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff39, 0xa0002141, 0x0, 0xfffffffffffffdab) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x2000, 0xa08, &(0x7f0000ffe000/0x2000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) syz_open_procfs$namespace(r4, &(0x7f0000000000)='ns/user\x00') r5 = getpgid(r4) r6 = syz_open_procfs(r5, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x6f0a77bd) fstat(r6, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r8 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x20000103, r3, r7, 0x0, r7}, 0xb, 0xffc, 0x0, 0x8000, 0x0, r8, 0x7d}) r9 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r9, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x8f, 0x40, 0x0, 0x3, 0x7, 0x0, 0x8, 0x0, 0xe, 0x0, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r10 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r11 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r10) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r11) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:21 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x404, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2528.757596][T25830] device nr0 entered promiscuous mode 01:08:21 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x10001, 0x1, 0x4, 0x3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_GETTRIGGER(r3, 0x80045010, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x48880, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000000)=@req={0x14c, 0x8001, 0x0, 0x1000}, 0x10) r7 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r7, 0x2285, 0x0) ioctl$SG_GET_REQUEST_TABLE(r7, 0x2286, &(0x7f0000000140)) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) [ 2529.054425][T25834] debugfs: File 'dropped' in directory 'loop0' already present! [ 2529.064725][T25834] debugfs: File 'msg' in directory 'loop0' already present! [ 2529.087767][T25834] debugfs: File 'trace0' in directory 'loop0' already present! [ 2530.186142][ C0] net_ratelimit: 12 callbacks suppressed [ 2530.186150][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2530.197886][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2530.746161][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2530.752049][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:08:23 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x482100, 0x0) ioctl$SNDRV_PCM_IOCTL_XRUN(r1, 0x4148, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) 01:08:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0xe00, 0x0) 01:08:23 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r5) write$P9_RGETATTR(r4, &(0x7f0000000000)={0xa0, 0x19, 0x2, {0x1010, {0x0, 0x1, 0x8}, 0x80, r5, 0xffffffffffffffff, 0x9, 0xfffffffffffffff8, 0x80000001, 0x2, 0x7, 0x4, 0x3d860d8e, 0x1, 0x8000, 0x3, 0x80000000, 0xffffffffffffff80, 0x84, 0xffff, 0x9}}, 0xa0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f7ff"], 0x90ad) 01:08:23 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x800}) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/wireless\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)='md5sumselinuxtrusted:vmnet1!\x95ppp0{\x00') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x90ad) 01:08:23 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x405, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:23 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)=0x13d) r9 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r9, 0x7d}) r10 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r11 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r12 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r11) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r12) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2530.986098][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2530.992100][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2530.999181][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2531.005090][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2531.062728][T26057] device nr0 entered promiscuous mode 01:08:23 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) symlinkat(&(0x7f0000000000)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00') 01:08:23 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x40000, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0xfffffffffffffde8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000c19e0000000000000000", @ANYRES32=r4, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x4000, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000003c0)={&(0x7f0000000300)=""/152, 0x98, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x2, 0xc, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4afb5a07, 0x0, 0x0, 0x0, 0x90}, [@alu={0x7, 0x0, 0xa, 0x0, 0x8, 0x18}, @ldst={0x2, 0x6, 0x6, 0x2, 0x0, 0xfffffffffffffffc, 0xfffffffffffffff0}, @exit, @exit, @jmp={0x5, 0x0, 0x4, 0x6, 0xa, 0xfffffffffffffff0, 0x10}, @exit, @generic={0x1, 0x9, 0x2, 0x800, 0xffffffff}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000180)='GPL\x00', 0x10001, 0x22, &(0x7f00000001c0)=""/34, 0x40f00, 0x2, [], r4, 0x25, r5, 0x8, &(0x7f0000000240)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x7, 0x7ea, 0x2}, 0x10, r6, r9}, 0x78) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r11 = socket$kcm(0x29, 0x2, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.syz\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r10, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x90ad) [ 2531.195085][T26060] debugfs: File 'dropped' in directory 'loop0' already present! [ 2531.219124][T26060] debugfs: File 'msg' in directory 'loop0' already present! [ 2531.236076][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2531.239181][T26060] debugfs: File 'trace0' in directory 'loop0' already present! [ 2531.241924][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:08:24 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x406, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:24 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, r3, 0x0) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x6f0a77bd) fstat(r7, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xfe68) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$sock_cred(r11, 0x1, 0x11, 0x0, &(0x7f0000000000)) r12 = getpgid(0x0) r13 = getegid() getgroups(0x3, &(0x7f0000000500)=[r13, r13, 0x0]) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x100, r6, r8, 0x0, r13}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r12, 0x7d}) r14 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) ioctl$BLKTRACESETUP(r14, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r4, 0x434c6ec92bcd5d3e) r15 = request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r16 = add_key$keyring(&(0x7f0000000940)='\x00\x00\x00\x00\x00\xe9\xff\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r15, &(0x7f0000000240), 0x1, r16) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2531.649708][T26178] bond0: (slave bridge21): Enslaving as an active interface with an up link 01:08:24 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:24 executing program 1: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0xa7, 0x4, 0x9, "2b7e7560dcfbb8e2374795413c0551dd", "b17b34102235cfa3ae5bd41bdc647cfca6eb951f6bd6f3877ec04e841f3722b76941d5cd66b275a7bd8c7fe21620dd8bfc2e2576b3d1495d6c0b9018b16d9e450dfd37edc865db8cbcdecc971a88fafafe290e1689dec7a6448636753f5aa9bd8349b75f5f869c72d8c1017747ad5411929867ab5aa48c178e047b72f73a39842ea5fc646bf3b8143f5594216590f2068ca8"}, 0xa7, 0x3) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x6, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x90ad) 01:08:24 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x207}, 0x40) [ 2531.797783][T26303] debugfs: File 'dropped' in directory 'loop0' already present! [ 2531.833632][T26303] debugfs: File 'msg' in directory 'loop0' already present! [ 2531.884282][T26303] debugfs: File 'trace0' in directory 'loop0' already present! [ 2531.936267][T26459] debugfs: File 'dropped' in directory 'loop0' already present! [ 2531.953015][T26459] debugfs: File 'msg' in directory 'loop0' already present! [ 2531.980619][T26459] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:24 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=0x1, 0x4) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r1, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000100)={0x8001007, 0x7, 0x2}) 01:08:26 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x4000, 0x0) 01:08:26 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x407, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:26 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') r5 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r5, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r6, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) sendfile(r4, r6, 0x0, 0xffffffffffff188d) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xfd21) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r8 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r7, 0x0, r7}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r8, 0x7d}) r9 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r9, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='F\x00\x00\x00\x00\x00\x00\x00\x00\xac\xc8`\x96\xd6\x89I\xb6\n\xd5Y4\x84\xcaI\xe0\x94', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r10 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r10) r11 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r11, &(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)='\x00') keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000280), 0x0, r11) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x90ad) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000100)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r6, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) fstat(r6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() getgroups(0x3, &(0x7f0000000500)=[r8, r8, 0x0]) r9 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r9, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) fstat(r9, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getegid() r12 = getegid() getgroups(0x4, &(0x7f0000000500)=[0x0, r12, 0x0, 0x0]) r13 = getegid() getgroups(0x3, &(0x7f0000000500)=[r13, r13, 0x0]) r14 = getegid() getgroups(0x4, &(0x7f0000000500)=[0x0, r14, 0x0, 0x0]) r15 = getegid() getgroups(0x4, &(0x7f0000000500)=[0x0, r15, 0x0, 0x0]) r16 = getegid() getgroups(0x4, &(0x7f0000000500)=[0x0, r16, 0x0, 0x0]) r18 = getegid() getgroups(0x4, &(0x7f0000000500)=[0x0, r18, 0x0, 0x0]) getgroups(0x1, &(0x7f00000005c0)=[r14, r10, r18, r16, r17]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r21 = fcntl$dupfd(r20, 0x0, r19) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) r23 = getgid() lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r25 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r25, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) fstat(r25, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000540)={{}, {0x1, 0x1}, [{0x2, 0x0, r5}], {0x4, 0x2}, [{0x8, 0x0, r7}, {0x8, 0x2, r8}, {0x8, 0x1, r10}, {0x8, 0x4, 0xee01}, {0x8, 0x4, r11}, {0x8, 0x2, r22}, {0x8, 0x4, r23}, {0x8, 0x4, r24}, {0x8, 0x4, r26}], {0x10, 0x5}, {0x20, 0x4}}, 0x74, 0x3) 01:08:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r4, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r5 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r5, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r6, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r7 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r7, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r8 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r8, 0xc008561c, &(0x7f0000000040)={0x0, 0x2, @value=0xfffffffffffffff6}) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYRES16=r0, @ANYRES16=r2, @ANYRESHEX=r0, @ANYRESHEX=r8, @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYPTR64, @ANYBLOB="69352e35825488acf360682bacdcb599cc575683fcfd4ce818e767688262885795ee3637f976f89656df280b38cd94fd5b9778057f3751f5e68ee635d9fb35e2b011431bb1123c7a0edf37f1f49f559c2a29d7d915e7d789ce41c66f5b3fc113", @ANYRES32=r3, @ANYRES16=r4, @ANYRESOCT=r5, @ANYPTR64], @ANYRES16=0x0, @ANYPTR, @ANYRES16, @ANYRES64=r6, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRESOCT=r7, @ANYRES16=r2, @ANYRES64, @ANYRESHEX, @ANYBLOB="c39850182e8e50dbc71956eaa174c2d4df3a4bf534116c9e21e1af81906cbebf22d6b282329c7a12f7450333c509d9240bde87b5f4bfcb315dbbadcaec05d2546c1f937c0319d16ff4167d366cf6b52545ffc1ff7097b3bd030d3e59d628121016db5aa9545a62d4d476833b8a3234050cef1864de958d550e6f1f8ef93027166639cc471fc977be4065380e3fb090d2e566c776097281f3c0", @ANYRES32, @ANYBLOB="36cb52a3d87501bf4330525a3fb75a734c89f363315ccfa05525ea792dc4a649097b287d0425c335dfefbe2ba4937e30526b21018e5a0fcd32d6c7dfe43e9678af479599a43b41d2d59877e599c26676e7d78537b17a7bf52950216df91226d0b0f2723d4f310d81d4deb07100de779253452ef6", @ANYRES32], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT, @ANYRES64, @ANYRES64, @ANYRESDEC=0x0, @ANYPTR]]], 0x185) 01:08:26 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg$sock(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000080)=@caif=@dgm={0x25, 0x2}, 0x80, 0x0}, 0x60) 01:08:26 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x20d, 0x8, 0x7, 0x401}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0xfffffffe, 0x42c7, 0x1, 0x1}, 0x10) fcntl$dupfd(r2, 0x0, r1) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x0, 0x0, 0x3, 0x0, {0xa, 0x4e20, 0x4, @remote, 0x8}}}, 0x80, 0x0}, 0x60) [ 2534.130963][T26721] device nr0 entered promiscuous mode [ 2534.186456][T26714] debugfs: File 'dropped' in directory 'loop0' already present! [ 2534.189206][T26718] device nr0 entered promiscuous mode [ 2534.211459][T26714] debugfs: File 'msg' in directory 'loop0' already present! [ 2534.231180][T26714] debugfs: File 'trace0' in directory 'loop0' already present! [ 2534.252964][T26719] debugfs: File 'dropped' in directory 'loop0' already present! [ 2534.263686][T26719] debugfs: File 'msg' in directory 'loop0' already present! [ 2534.277603][T26719] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:27 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x408, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:27 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000000)={&(0x7f0000000080)=@tipc=@nameseq={0x1e, 0x1, 0x1, {0x41, 0x4, 0x4}}, 0xfffffffffffffeb4, 0x0, 0x6}, 0x60) 01:08:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000100)) 01:08:27 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000002e00815be00f80ecdb4cb9040e486516080003001000000e000004140e000a001500cd5edc2976d153b4", 0x235}], 0x1}, 0x0) 01:08:27 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0x40, &(0x7f0000ffc000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r7 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x7d}) r8 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xc, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r9 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r10) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2535.070205][T26718] device nr0 entered promiscuous mode [ 2535.166113][T27053] debugfs: File 'dropped' in directory 'loop0' already present! [ 2535.174409][T27053] debugfs: File 'msg' in directory 'loop0' already present! [ 2535.192450][T27053] debugfs: File 'trace0' in directory 'loop0' already present! [ 2535.326865][T27054] debugfs: File 'dropped' in directory 'loop0' already present! [ 2535.342581][T27054] debugfs: File 'msg' in directory 'loop0' already present! [ 2535.354349][T27054] debugfs: File 'trace0' in directory 'loop0' already present! [ 2535.397280][ C0] net_ratelimit: 18 callbacks suppressed [ 2535.397381][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2535.409667][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2536.426106][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2536.431942][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2536.986110][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2536.992923][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:08:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x7e00, 0x0) 01:08:29 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100) 01:08:29 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) gettid() r7 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0xee01, r6, 0x8}, 0xb8fb, 0x4000000000ffc, 0x0, 0x8000, 0x0, r7, 0x7d}) r8 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x402, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x100000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x7, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r9 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000940), &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, r9) r10 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)='\x00') keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001140)=[{&(0x7f0000000d80)="c5dfc085ded64c96becfca15cab9d8312b3cbbf2ca63213f19d5e18162ebc44de3ce79401acd8b6134e330dd5e9f2b6e2f50fcad5c22ded424fb8e47df77e5122b8f9a0d1b3616c027a00bf202a3ce4c2e839f456cb071afe9ed7aeccdfb366065ea4382387b2c2f0cf8a64f19ff6f509050770476bd79b39c607b2b7d7b54f1c481d562bef6768e4247fdab957f7a0fe22dfaf4f54d62222612013502a957a28fc4c83e0d2516b4e9bbecf55bd61bbddf144500fa65324b4dc4318673e87a7bb80b2b31558e95fa9118185064fcafc4acd6335b0a7601b02791e63fb24bc035826b6efb6178a222d867dd49558d94bd5e72e959ea", 0xd0}, {&(0x7f00000012c0)="bc42d39748edae6cdf510482503f7684045ae21542821e16d36582023358eced0899ecbb3e55dccb3d4e802e02b5db8946b70b478b3d2b0242f05c066f4c57a2bd1a0602ce6b3a237ea694280229c31fd2a0a4054d60a8d0210967020da1ad2c19c7ceacfb290da88a243a073c19410bad9b76084e92cd148cb3a49613ebed39ab5491c73f59bb305460a4d61b7eb261aa92de321abada6be5ebc6e366e7e3a04162a617720ae971cf54adeb89faaf05c2bad8f7f77880b4aa9027416e220e3e9ad5e6d541b22dfaec88a308ec7a3b30023b550dafd4a8648fa7ed02addab1774d5e5c0ab1d46660f2", 0xe9}, {&(0x7f0000000f80)="6a4402dd1a1ac7b586d99879c9d9c6f15855405f91dc049c122caf0cc5db50bb225ef923be3297ebfe5fffb0a74459f7d5c7ea0e1de0a28cf4cabc9262652a24822daeae96ca3a566b6cea4724483ecb427d629d0000c96521db90b1bdcaa47de098bcf1f22cec9da14a4aa3e58085f049e1fa684942961ea949556eb0e18e45d95a376cfbe4dd9866d35b38e44517046b5d585ae18f1dd9f312dfb1e206f3be649f4c221cdc32f0676ac7ea81500e00f8fa53d65c39dabeaa00cc06fb80f9e21a7ca80b414c54a8bb415717f46f9a199cfbaa98f23ca6a5f32dd8e59fed125fbd9b521b3741917d", 0xe8}, {&(0x7f0000001200)="04c56de56509acf92468f4be4b0af1892be3498dec3a7443cd6729f01b4fc95fde7c283e9217d3166e092a1a7dd160722dea8e210bdc4b2155a947e7f0b90bd379dab8bbd376ae856bc27c2635310789a48f686895c1359a84ded53f7d09eca12ba26cb29244a043e59f3a04dd4a1ff2b598ef24a7248ec050817934c5c3358b50b72af5e902d530c0", 0x89}, {&(0x7f0000001b80)="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", 0x1000}, {&(0x7f0000000780)="e18f8042dd350b9a03cd6a1c62f1366e836b7d186a8473454383913d1d05f235784954222a798714b970267c30bd205e9c7052023c6ead8ee02fb51841e880830286d685bc63f487cc53748b69edab25257b6025d355437886882c07d9432e2b348126007b2eb03d990a02c05730da9f1eda963d2e09d81e032a0c45565386513675d2c4eecfa024ec6fdfb1d1f02ed2596ed2a90acbbfa09020eb83ee0c5d0614a74eb4e3667cb4b0327f8bfc8b7cda853116", 0xb3}, {&(0x7f00000013c0)="3e8ae66a6688f58b41acf4a6f8ab553502ad623a31cd0350e4671104b862ffc24a26c602880c46065cfb1d808d42c46e07f9d40939cedf3fd5e35562053444ff03a2a85ec33d424a77070fb9053c9f0d5996677dbc9cb416b1cfc7d5b34f99340f45b9738baca227c11a508c43c508da2da38adf3f8605e62ed32f828685fa7aa321afdb163a8131cda4090247f9f374a3c2eb26c04310ddc11a1f92e61ed4ed4bc29bab6e6ff9da57518f5b3f6ccd55e91c6be854b131", 0x89}, {&(0x7f0000000340)="1c46f948a91a523b91a36be658ed3d5487b61dc9d38c4285dd3dd89de6e7f9ba0adfcd837758a33112eaf557dd2c4f64f58be467095991ecf63893fce78557d54dbf69531e93960112671e2cc2b8603ea2a243364ed2ecebee28fb3f367724", 0x5f}, {&(0x7f0000001080)="3a81d575caf388c9e93bdd6054067b64d187ffa91203773dd0125817be67f767ccd164ea35c69d4b504fee7684558292bebc7e4558d1b71c5ad0ef510b0ff6bfcba7dd2bb6048097b7cb4d54610c433ce09924c86a9609053575f3a41e0b96a1bc53d21952b700bfaee5c81d75b52c11c8606e9780d098b418e4b557af1de459736fb835c2242d983a6e5dbeb260b5eb4865143988c9a350b3a8f4f0d2d897", 0x9f}], 0x8, r10) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:29 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETLINK(r4, 0x400454cd, 0x202) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f7ff"], 0x90ad) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:traceroute_exec_t:s0\x00', 0x27, 0x1) 01:08:29 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x40a, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r5, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r6, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r7 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r7, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000040)=[0xffffffffffffffff, r5, r6, r7], 0x4) ioctl$TIOCSPTLCK(r4, 0x40045431, &(0x7f0000000000)) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x90ad) [ 2537.218404][T27271] device nr0 entered promiscuous mode [ 2537.236057][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2537.241956][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2537.247824][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2537.253626][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2537.310337][T27272] device nr0 entered promiscuous mode 01:08:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) close(r0) [ 2537.360237][T27274] debugfs: File 'dropped' in directory 'loop0' already present! [ 2537.383110][T27274] debugfs: File 'msg' in directory 'loop0' already present! [ 2537.410886][T27274] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet6(r1, &(0x7f00000034c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)="f6", 0x1}, {&(0x7f00000003c0)="0382745e1e9b1626", 0x5000}], 0x2}}], 0x500, 0x0) 01:08:30 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x448, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:30 executing program 3: syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000100)=0x9) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff], 0x1f004}) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000400)={[0x0, 0xffffffffffffffff, 0x0, 0x0, 0x20]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2537.849502][T27277] debugfs: File 'dropped' in directory 'loop0' already present! [ 2537.864545][T27277] debugfs: File 'msg' in directory 'loop0' already present! [ 2537.876666][T27277] debugfs: File 'trace0' in directory 'loop0' already present! [ 2537.951233][T27497] debugfs: File 'dropped' in directory 'loop0' already present! [ 2537.975960][T27497] debugfs: File 'msg' in directory 'loop0' already present! [ 2537.998850][T27497] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:30 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$BLKTRACETEARDOWN(r10, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r11 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r12 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r11) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r12) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:30 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') r5 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r5, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r6, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) sendfile(r4, r6, 0x0, 0xffffffffffff188d) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xfd21) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r8 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r7, 0x0, r7}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r8, 0x7d}) r9 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r9, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='F\x00\x00\x00\x00\x00\x00\x00\x00\xac\xc8`\x96\xd6\x89I\xb6\n\xd5Y4\x84\xcaI\xe0\x94', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r10 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r10) r11 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r11, &(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)='\x00') keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000280), 0x0, r11) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2538.330120][T27622] debugfs: File 'dropped' in directory 'loop0' already present! [ 2538.366123][T27622] debugfs: File 'msg' in directory 'loop0' already present! [ 2538.373963][T27622] debugfs: File 'trace0' in directory 'loop0' already present! [ 2538.484445][T27620] debugfs: File 'dropped' in directory 'loop0' already present! [ 2538.516662][T27620] debugfs: File 'msg' in directory 'loop0' already present! [ 2538.528412][T27620] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x1000000, 0x0) 01:08:32 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x44c, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x5d90ff1530a38a9) 01:08:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'Qr0\x01\x00', 0x200}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f7ff"], 0x90ad) 01:08:32 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000200)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:32 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x300, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2540.374637][T27728] device nr0 entered promiscuous mode [ 2540.448972][T27727] debugfs: File 'dropped' in directory 'loop0' already present! [ 2540.460521][T27727] debugfs: File 'msg' in directory 'loop0' already present! [ 2540.479470][T27727] debugfs: File 'trace0' in directory 'loop0' already present! [ 2540.532294][T27731] debugfs: File 'dropped' in directory 'loop0' already present! [ 2540.542475][T27731] debugfs: File 'msg' in directory 'loop0' already present! [ 2540.563774][T27731] debugfs: File 'trace0' in directory 'loop0' already present! [ 2540.586068][ C0] net_ratelimit: 12 callbacks suppressed [ 2540.586076][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2540.598280][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2540.649185][T27730] debugfs: File 'dropped' in directory 'loop0' already present! [ 2540.701162][T27730] debugfs: File 'msg' in directory 'loop0' already present! [ 2540.765210][T27730] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:33 executing program 3 (fault-call:23 fault-nth:0): pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) 01:08:33 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x468, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:33 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xffffff19) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:33 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb], 0x12000}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r6, 0x4004ae8b, &(0x7f0000000000)={0x22, "ee17b2ccb333215da928714e25884ae9f7cbe017b31d9cb5aeb9bd8bcad425703b05"}) r7 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$cgroup_subtree(r7, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x2) [ 2541.062582][T28054] FAULT_INJECTION: forcing a failure. [ 2541.062582][T28054] name failslab, interval 1, probability 0, space 0, times 0 [ 2541.088550][T28054] CPU: 1 PID: 28054 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2541.097985][T28054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2541.097992][T28054] Call Trace: [ 2541.098017][T28054] dump_stack+0x197/0x210 [ 2541.098041][T28054] should_fail.cold+0xa/0x15 [ 2541.098064][T28054] ? fault_create_debugfs_attr+0x180/0x180 [ 2541.098087][T28054] ? ___might_sleep+0x163/0x2c0 [ 2541.133810][T28054] __should_failslab+0x121/0x190 [ 2541.139251][T28054] should_failslab+0x9/0x14 [ 2541.144109][T28054] __kmalloc+0x2e0/0x770 [ 2541.148635][T28054] ? mark_held_locks+0xf0/0xf0 [ 2541.153427][T28054] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2541.159469][T28054] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2541.165040][T28054] ? tomoyo_path_number_perm+0x193/0x520 [ 2541.170884][T28054] tomoyo_path_number_perm+0x1dd/0x520 [ 2541.176570][T28054] ? tomoyo_path_number_perm+0x193/0x520 [ 2541.181070][T28052] debugfs: File 'dropped' in directory 'loop0' already present! [ 2541.182224][T28054] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2541.182241][T28054] ? __f_unlock_pos+0x19/0x20 [ 2541.182281][T28054] ? __fget+0x37f/0x550 [ 2541.196060][T28054] ? ksys_dup3+0x3e0/0x3e0 [ 2541.196077][T28054] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2541.196097][T28054] ? fput_many+0x12c/0x1a0 [ 2541.196117][T28054] tomoyo_file_ioctl+0x23/0x30 [ 2541.196136][T28054] security_file_ioctl+0x77/0xc0 [ 2541.221462][T28054] ksys_ioctl+0x57/0xd0 [ 2541.221479][T28054] __x64_sys_ioctl+0x73/0xb0 [ 2541.221501][T28054] do_syscall_64+0xfa/0x790 [ 2541.236568][T28052] debugfs: File 'msg' in directory 'loop0' already present! [ 2541.240833][T28054] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2541.240846][T28054] RIP: 0033:0x45a6f9 [ 2541.240862][T28054] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2541.240870][T28054] RSP: 002b:00007efc51b2ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2541.240884][T28054] RAX: ffffffffffffffda RBX: 00007efc51b2ec90 RCX: 000000000045a6f9 [ 2541.240892][T28054] RDX: 00000000200000c0 RSI: 0000000000008991 RDI: 0000000000000009 [ 2541.240900][T28054] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2541.240907][T28054] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efc51b2f6d4 [ 2541.240922][T28054] R13: 00000000004c709a R14: 00000000004dda88 R15: 000000000000000c [ 2541.259564][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2541.259637][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2541.265191][T28052] debugfs: File 'trace0' in directory 'loop0' already present! [ 2541.366414][T28054] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2541.386088][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2541.392082][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2541.398406][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2541.404594][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2541.528731][T27728] device nr0 entered promiscuous mode [ 2541.626058][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2541.632052][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:08:34 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x46c, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:34 executing program 3 (fault-call:23 fault-nth:1): pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) [ 2541.948894][T28268] debugfs: File 'dropped' in directory 'loop0' already present! [ 2541.966429][T28268] debugfs: File 'msg' in directory 'loop0' already present! [ 2542.004046][T28273] FAULT_INJECTION: forcing a failure. [ 2542.004046][T28273] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2542.020134][T28273] CPU: 0 PID: 28273 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2542.030020][T28273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2542.040525][T28273] Call Trace: [ 2542.042934][T28268] debugfs: File 'trace0' in directory 'loop0' already present! [ 2542.044556][T28273] dump_stack+0x197/0x210 [ 2542.044583][T28273] should_fail.cold+0xa/0x15 [ 2542.044606][T28273] ? fault_create_debugfs_attr+0x180/0x180 [ 2542.044622][T28273] ? __kasan_check_read+0x11/0x20 [ 2542.044635][T28273] ? mark_lock+0xc2/0x1220 [ 2542.044663][T28273] should_fail_alloc_page+0x50/0x60 [ 2542.083178][T28273] __alloc_pages_nodemask+0x1a1/0x910 [ 2542.088576][T28273] ? __kasan_check_read+0x11/0x20 [ 2542.093967][T28273] ? mark_lock+0xc2/0x1220 [ 2542.098503][T28273] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2542.104344][T28273] ? __kasan_check_read+0x11/0x20 [ 2542.109406][T28273] ? fault_create_debugfs_attr+0x180/0x180 [ 2542.115431][T28273] cache_grow_begin+0x90/0xc60 [ 2542.120314][T28273] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2542.126271][T28273] ? trace_hardirqs_off+0x62/0x240 [ 2542.131750][T28273] __kmalloc+0x6b2/0x770 [ 2542.136324][T28273] ? mark_held_locks+0xf0/0xf0 [ 2542.141121][T28273] ? mark_lock+0xc2/0x1220 [ 2542.146490][T28273] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2542.152621][T28273] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2542.158619][T28273] ? tomoyo_path_number_perm+0x193/0x520 [ 2542.164631][T28273] tomoyo_path_number_perm+0x1dd/0x520 [ 2542.170660][T28273] ? tomoyo_path_number_perm+0x193/0x520 [ 2542.176659][T28273] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2542.182621][T28273] ? __f_unlock_pos+0x19/0x20 [ 2542.188028][T28273] ? __fget+0x37f/0x550 [ 2542.192665][T28273] ? ksys_dup3+0x3e0/0x3e0 [ 2542.197191][T28273] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2542.203848][T28273] ? fput_many+0x12c/0x1a0 [ 2542.208544][T28273] tomoyo_file_ioctl+0x23/0x30 [ 2542.213701][T28273] security_file_ioctl+0x77/0xc0 [ 2542.218745][T28273] ksys_ioctl+0x57/0xd0 [ 2542.223317][T28273] __x64_sys_ioctl+0x73/0xb0 [ 2542.228207][T28273] do_syscall_64+0xfa/0x790 [ 2542.233163][T28273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2542.239581][T28273] RIP: 0033:0x45a6f9 [ 2542.243659][T28273] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2542.265095][T28273] RSP: 002b:00007efc51b2ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2542.274729][T28273] RAX: ffffffffffffffda RBX: 00007efc51b2ec90 RCX: 000000000045a6f9 [ 2542.283762][T28273] RDX: 00000000200000c0 RSI: 0000000000008991 RDI: 0000000000000009 [ 2542.292280][T28273] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2542.301070][T28273] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efc51b2f6d4 [ 2542.309543][T28273] R13: 00000000004c709a R14: 00000000004dda88 R15: 000000000000000c 01:08:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0xe000000, 0x0) 01:08:36 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x400) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:36 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x474, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$USBDEVFS_CLEAR_HALT(0xffffffffffffffff, 0x80045515, &(0x7f0000000000)={0x9, 0x1}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x90ad) 01:08:36 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000674d"], 0x90ad) 01:08:36 executing program 3 (fault-call:23 fault-nth:2): pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) [ 2543.443862][T28382] device nr0 entered promiscuous mode [ 2543.484186][T28389] device nr0 entered promiscuous mode [ 2543.520562][T28395] debugfs: File 'dropped' in directory 'loop0' already present! [ 2543.549920][T28395] debugfs: File 'msg' in directory 'loop0' already present! [ 2543.552769][T28394] FAULT_INJECTION: forcing a failure. [ 2543.552769][T28394] name failslab, interval 1, probability 0, space 0, times 0 [ 2543.558670][T28395] debugfs: File 'trace0' in directory 'loop0' already present! [ 2543.587035][T28394] CPU: 0 PID: 28394 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2543.596053][T28394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2543.606313][T28394] Call Trace: [ 2543.609873][T28394] dump_stack+0x197/0x210 [ 2543.614542][T28394] should_fail.cold+0xa/0x15 [ 2543.619274][T28394] ? fault_create_debugfs_attr+0x180/0x180 [ 2543.625116][T28394] ? ___might_sleep+0x163/0x2c0 [ 2543.630007][T28394] __should_failslab+0x121/0x190 [ 2543.635288][T28394] should_failslab+0x9/0x14 [ 2543.639910][T28394] __kmalloc+0x2e0/0x770 [ 2543.644272][T28394] ? snprintf+0xbb/0xf0 [ 2543.648540][T28394] ? vsprintf+0x40/0x40 [ 2543.652998][T28394] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2543.658775][T28394] tomoyo_encode2.part.0+0xf5/0x400 [ 2543.665476][T28394] tomoyo_encode+0x2b/0x50 [ 2543.670224][T28394] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 2543.676182][T28394] ? tomoyo_path_number_perm+0x193/0x520 [ 2543.682207][T28394] tomoyo_path_number_perm+0x1dd/0x520 [ 2543.688044][T28394] ? tomoyo_path_number_perm+0x193/0x520 [ 2543.693925][T28394] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2543.699958][T28394] ? __f_unlock_pos+0x19/0x20 [ 2543.705170][T28394] ? __fget+0x37f/0x550 [ 2543.709686][T28394] ? ksys_dup3+0x3e0/0x3e0 [ 2543.714238][T28394] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2543.720643][T28394] ? fput_many+0x12c/0x1a0 [ 2543.725186][T28394] tomoyo_file_ioctl+0x23/0x30 [ 2543.730498][T28394] security_file_ioctl+0x77/0xc0 [ 2543.737203][T28394] ksys_ioctl+0x57/0xd0 [ 2543.741674][T28394] __x64_sys_ioctl+0x73/0xb0 [ 2543.746559][T28394] do_syscall_64+0xfa/0x790 [ 2543.751261][T28394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2543.757165][T28394] RIP: 0033:0x45a6f9 [ 2543.761072][T28394] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2543.781312][T28394] RSP: 002b:00007efc51b2ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2543.789754][T28394] RAX: ffffffffffffffda RBX: 00007efc51b2ec90 RCX: 000000000045a6f9 [ 2543.797862][T28394] RDX: 00000000200000c0 RSI: 0000000000008991 RDI: 0000000000000009 [ 2543.805941][T28394] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2543.814018][T28394] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efc51b2f6d4 [ 2543.822292][T28394] R13: 00000000004c709a R14: 00000000004dda88 R15: 000000000000000c [ 2543.835187][T28394] ERROR: Out of memory at tomoyo_realpath_from_path. 01:08:36 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000e80)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:36 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x47a, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2544.276757][T28580] debugfs: File 'dropped' in directory 'loop0' already present! [ 2544.285496][T28580] debugfs: File 'msg' in directory 'loop0' already present! [ 2544.305854][T28580] debugfs: File 'trace0' in directory 'loop0' already present! [ 2544.483842][T28608] debugfs: File 'dropped' in directory 'loop0' already present! [ 2544.501698][T28608] debugfs: File 'msg' in directory 'loop0' already present! [ 2544.522314][T28608] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:37 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) 01:08:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40602, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x2e08}) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000000)=0x1) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @name="7444bc3f2eaafa4ffce1f738a5b72a0fb5457ca04e8fad59750339a05cd4b3ad"}) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYMENU(r4, 0xc008561c, &(0x7f0000000140)={0x100000008000005, 0x89, @value}) ioctl$VIDIOC_QUERYMENU(r4, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r5 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r5, 0xc008561c, &(0x7f0000000180)={0x100000008000005, 0x9, @name="784954b36bc7d35be27378abbb080020b041f9e9937a4e9761d0074171cc7bf2"}) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r6, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r7 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r7, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r8 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$TIPC_SRC_DROPPABLE(r11, 0x10f, 0x80, &(0x7f0000000080)=0xe1c9, 0x4) ioctl$VIDIOC_QUERYMENU(r8, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = fcntl$dupfd(r13, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) r15 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r15, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r16 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r16, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) write$cgroup_subtree(r14, &(0x7f0000000300)=ANY=[], 0x0) 01:08:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'veth1_to_team\x00', 0x100}) r7 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x90ad) 01:08:37 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x20, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100, 0x9}, 0x100, 0x8, 0x8, 0x0, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2545.133434][T28728] debugfs: File 'dropped' in directory 'loop0' already present! [ 2545.148083][T28728] debugfs: File 'msg' in directory 'loop0' already present! [ 2545.160796][T28728] debugfs: File 'trace0' in directory 'loop0' already present! [ 2545.866149][ C0] net_ratelimit: 18 callbacks suppressed [ 2545.866158][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2545.877873][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:08:39 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x500, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x40000000, 0x0) 01:08:39 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00c6e01875"], 0x90ad) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) r2 = msgget(0x3, 0x2) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000040)=""/75) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000100)=""/211) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r4, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r5 = dup3(r3, r4, 0x0) ioctl$BLKSECDISCARD(r5, 0x127d, &(0x7f0000000000)=0xffffffffffff7fff) 01:08:39 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x90ad) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x17) 01:08:39 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:39 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x2, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) [ 2546.559514][T28747] device nr0 entered promiscuous mode [ 2546.603641][T28744] device nr0 entered promiscuous mode [ 2546.669808][T28743] debugfs: File 'dropped' in directory 'loop0' already present! [ 2546.686653][T28743] debugfs: File 'msg' in directory 'loop0' already present! [ 2546.701723][T28743] debugfs: File 'trace0' in directory 'loop0' already present! [ 2546.826075][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2546.832275][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:08:39 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_bp={&(0x7f0000000240), 0xb}, 0x20040, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:39 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x600, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:40 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x10, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) [ 2547.353209][T28964] debugfs: File 'dropped' in directory 'loop0' already present! [ 2547.407084][T28964] debugfs: File 'msg' in directory 'loop0' already present! [ 2547.425192][T28964] debugfs: File 'trace0' in directory 'loop0' already present! [ 2547.466067][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2547.472157][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2547.510625][T28973] debugfs: File 'dropped' in directory 'loop0' already present! [ 2547.523546][T28973] debugfs: File 'msg' in directory 'loop0' already present! [ 2547.535185][T28973] debugfs: File 'trace0' in directory 'loop0' already present! [ 2547.606823][T28747] device nr0 entered promiscuous mode [ 2547.626107][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2547.632206][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2547.639110][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2547.648397][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:08:40 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x700, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:40 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x100, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb], 0x12000}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_X86_SET_MCE(r5, 0x4040ae9e, &(0x7f0000000000)={0x2000000000000000, 0x10000, 0x5, 0x2, 0x1a}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f7ff"], 0x90ad) 01:08:40 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = shmget(0x2, 0x4000, 0x54000550, &(0x7f0000ffc000/0x4000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x6f0a77bd) fstat(r3, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000840)={{0x100, r2, r4, 0x0, r4}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x241}], 0x1}, 0x40040) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x1af, 0x43, 0x1, 0x3, 0x3ff, 0x0, 0x8, 0x20210, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100, 0x5e}, 0x8104, 0x8, 0x8, 0x1, 0x0, 0x8, 0xc1f}, 0x0, 0xe, 0xffffffffffffffff, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2548.173888][T29081] debugfs: File 'dropped' in directory 'loop0' already present! [ 2548.190759][T29081] debugfs: File 'msg' in directory 'loop0' already present! [ 2548.208076][T29081] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x90ad) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x6, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000040)) [ 2548.270774][T29158] debugfs: File 'dropped' in directory 'loop0' already present! [ 2548.350476][T29158] debugfs: File 'msg' in directory 'loop0' already present! [ 2548.384457][T29194] device nr0 entered promiscuous mode [ 2548.408698][T29158] debugfs: File 'trace0' in directory 'loop0' already present! [ 2548.892845][T29194] device nr0 entered promiscuous mode 01:08:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x7e000000, 0x0) 01:08:42 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x4c01, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) 01:08:42 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, 0x0) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='syz', 0x7) 01:08:42 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r4, 0xb}, 0x10) ioctl$SNDRV_PCM_IOCTL_FORWARD(r4, 0x40084149, &(0x7f0000000040)=0x5) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f7ff"], 0x90ad) 01:08:42 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x1200, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:42 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000886441931791a4d8ed4bc1a414fdfb97a8a3bdd7bf770c98ae1e8e9f22e3b6cc740474001a71e10e231f36024a52f56a2f68defd26436d7b486d373b495f68037c75a1245aaad732f2ffb75f53363e7402dad335a3014ccdd8218e15edcc3f008aecb018361259a3a9bf1871d8ac8bd31cb29215aaac2c16054015cd33b51438a7"], 0x90ad) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000100)={0x0, @bt={0x5, 0x4, 0x1, 0x2, 0x8, 0x5f, 0x0, 0x800, 0x81, 0x1, 0x1, 0x10000, 0x4, 0xa018, 0x2, 0x4}}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb], 0x12000}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_GET_LAPIC(r5, 0x8400ae8e, &(0x7f0000000440)={"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"}) [ 2549.675862][T29315] device nr0 entered promiscuous mode [ 2549.704879][T29318] debugfs: File 'dropped' in directory 'loop0' already present! [ 2549.743353][T29311] device nr0 entered promiscuous mode [ 2549.746636][T29318] debugfs: File 'msg' in directory 'loop0' already present! [ 2549.765719][T29318] debugfs: File 'trace0' in directory 'loop0' already present! [ 2549.819606][T29313] debugfs: File 'dropped' in directory 'loop0' already present! [ 2549.834553][T29313] debugfs: File 'msg' in directory 'loop0' already present! [ 2549.863444][T29313] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:42 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2550.368885][T29533] debugfs: File 'dropped' in directory 'loop0' already present! [ 2550.390725][T29533] debugfs: File 'msg' in directory 'loop0' already present! 01:08:43 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x5421, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) [ 2550.423094][T29533] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:43 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x1400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2550.653438][T29543] device nr0 entered promiscuous mode 01:08:43 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x6f0a77bd) fstat(r3, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xfffffffffffffcf8) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000200)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r8 = getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x100, r2, r4, 0x0, r4}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r8, 0x7d}) r9 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r9, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r10 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r11 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r10) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r11) io_setup(0x8, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2550.791788][T29541] debugfs: File 'dropped' in directory 'loop0' already present! [ 2550.800697][T29541] debugfs: File 'msg' in directory 'loop0' already present! [ 2550.813845][T29541] debugfs: File 'trace0' in directory 'loop0' already present! [ 2550.987025][ C0] net_ratelimit: 12 callbacks suppressed [ 2550.987096][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2550.999270][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:08:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x6, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') fchdir(r1) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="00f70000002f4be52d161a3713d15c84a5a79b5ffac44a3bd4dfc4b24605af5ee1b041413713befc36add27e9aa88ab1a8cb0db224ed5971cae348aeeec2813184b3808dd338d6884bcd7653"], 0x90ad) [ 2551.296708][T29541] debugfs: File 'dropped' in directory 'loop0' already present! [ 2551.304432][T29541] debugfs: File 'msg' in directory 'loop0' already present! 01:08:44 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x5450, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) [ 2551.467304][T29541] debugfs: File 'trace0' in directory 'loop0' already present! [ 2551.626172][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2551.632061][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2551.786131][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2551.792235][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2551.798145][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2551.803954][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2552.106114][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2552.112164][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:08:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x100000000000000, 0x0) 01:08:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_inet6_udp_SIOCOUTQ(r6, 0x5411, &(0x7f0000000100)) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f0000000140), &(0x7f0000a8a000)=0xfffffffffffffcec) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x70, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x2}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={r13, 0x2, 0x1ff, 0x8001, 0x80000000}, 0x14) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r14 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r14, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x90ad) 01:08:45 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0x1, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x800, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d2f) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:45 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x4000, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:45 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4TyR\x83\x95Y \xbb\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06eP\v\nN\xbb\x10\x92\xa3\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'], 0x90ad) 01:08:45 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x5451, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) [ 2552.755787][T29771] device nr0 entered promiscuous mode [ 2552.856684][T29781] debugfs: File 'dropped' in directory 'loop0' already present! [ 2552.883701][T29781] debugfs: File 'msg' in directory 'loop0' already present! [ 2552.891931][T29781] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0xe00000000000000, 0x0) [ 2552.900499][T29780] debugfs: File 'dropped' in directory 'loop0' already present! [ 2552.911268][T29780] debugfs: File 'msg' in directory 'loop0' already present! [ 2552.944386][T29780] debugfs: File 'trace0' in directory 'loop0' already present! [ 2553.065033][T29785] device nr0 entered promiscuous mode 01:08:46 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:46 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x5452, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) [ 2553.702894][T29949] debugfs: File 'dropped' in directory 'loop0' already present! 01:08:46 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$USBDEVFS_DISCARDURB(r0, 0x550b, &(0x7f0000000040)=0x401) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000440)='nodevsecuritysecurityGPL!vmnet0\x00') r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x150, r3, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_1\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xce0}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffff7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3f}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3000000}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xf65cddce633c3f0b}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x62}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x17}}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4045}, 0x4) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[], 0xfffffffffffffd80) [ 2553.769941][T29949] debugfs: File 'msg' in directory 'loop0' already present! [ 2553.808219][T29949] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:46 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0xff00, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:08:46 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000040)={'vcan0\x00', @local}) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_inet_SIOCSARP(r6, 0x8955, &(0x7f0000000140)={{0x2, 0x4e21, @multicast2}, {0x306, @broadcast}, 0x2, {0x2, 0x4e23, @loopback}, 'hs\xb5=\x00\x1d\xee\x15\xb5\xb0\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r9, 0x800442d4, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000002c0)='/dev/net/tun\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = fcntl$dupfd(r14, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) r16 = socket$netlink(0x10, 0x3, 0x0) r17 = socket$nl_route(0x10, 0x3, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0xfffffffffffffde8, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r17, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r19}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000c19e0000000000000000", @ANYRES32=r19, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) bind$packet(r15, &(0x7f00000000c0)={0x11, 0x31, r19, 0x1, 0x8, 0x6, @random="6b776df185b7"}, 0x14) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="000000f7ff21e7fc4e92ee338196782520e60b9149ea4e31b78b6912db530c792d1fe293e1f5925a15abe439b4f12fcb997f0ea27778a96b99c54cb8405346de1cbd62ca61c07ee3422783e948f559b2a334d716ae168d0898fe0f4589a0ed994194c6fdc65f60957f96fb75c31920d5ad75e8b2e543c8c893a7c55d1eda2f4a90709f43b264e28227ed2c63199964e46faeb479946f"], 0x90ad) [ 2554.160257][T30115] bond0: (slave bridge20): Enslaving as an active interface with an up link 01:08:46 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2554.250770][T30116] debugfs: File 'dropped' in directory 'loop0' already present! [ 2554.259100][T30116] debugfs: File 'msg' in directory 'loop0' already present! [ 2554.278965][T30116] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x90ad) [ 2554.446879][T30122] debugfs: File 'dropped' in directory 'loop0' already present! [ 2554.458622][T30122] debugfs: File 'msg' in directory 'loop0' already present! [ 2554.486193][T30122] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:47 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x5460, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) [ 2554.597747][T30228] device nr0 entered promiscuous mode [ 2554.936975][T30332] debugfs: File 'dropped' in directory 'loop0' already present! [ 2554.944865][T30332] debugfs: File 'msg' in directory 'loop0' already present! [ 2554.977643][T30332] debugfs: File 'trace0' in directory 'loop0' already present! 01:08:47 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/user\x00') r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/user\x00') r3 = clone3(&(0x7f00000009c0)={0x800, &(0x7f0000000100), &(0x7f00000005c0), &(0x7f0000000780), 0x2c, 0x0, &(0x7f00000007c0)=""/34, 0x22, &(0x7f0000000800)=""/33, &(0x7f0000000900)=[r1, r2], 0x2}, 0x50) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40, 0x7, @perf_bp={0x0}, 0x8000}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') r7 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r7, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) sendfile(r0, r7, 0x0, 0xf3) r8 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r8, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) fstat(r8, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r10 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x100, r6, r9, 0x0, r9}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r10, 0x7d}) r11 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) ioctl$BLKTRACESETUP(r11, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) request_key(&(0x7f0000000240)='pkcs7_test\x00U \xb0\x9em6\xb1\xb7{\xa5\xcaL\xf8\xb3', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r12 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r13 = add_key$keyring(&(0x7f0000000940)='\x00_\x9dzg\x93\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r12) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r13) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000280)='Fvmnet1/\x00', 0x0) 01:08:47 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x82d0300, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2555.240442][T30337] debugfs: File 'dropped' in directory 'loop0' already present! [ 2555.268742][T30337] debugfs: File 'msg' in directory 'loop0' already present! [ 2555.301852][T30337] debugfs: File 'trace0' in directory 'loop0' already present! [ 2555.325672][T30228] device nr0 entered promiscuous mode 01:08:48 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x400000, 0x0) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x2b) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r4, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r5 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r5, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r6, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYBLOB="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", @ANYRESDEC=r3, @ANYRESHEX, @ANYPTR64=&(0x7f0000000040)=ANY=[], @ANYRES16=0x0, @ANYPTR, @ANYBLOB="6a82a5a273d7ea096d6046829f1b14ba784259cb8193f558fca0c71d58961eaabaeafe238d01453c24c9f4f38fd095d4ab28ee5d23b857812134ef9558e1a93164d6ce7effc299e923018812a9fb6bd22516a13f738e23cc27572761d5d6", @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRESDEC], @ANYPTR], @ANYBLOB="2297748d4727c96304d82ecf198d2cd183758193c2ff496e086b81a0997497a97e7ffccde399c7537c7b0d13e92f8b70982c5fa06905e1892450fe776392e71eaf9422fef1af147bd2dc71517ba381445789eea0ebabb673796b330d267b783113d714378ed31bb7210b", @ANYRESOCT=r4, @ANYRES32, @ANYRES64=r5, @ANYRES32=r6], 0x99) [ 2555.401171][T30339] debugfs: File 'dropped' in directory 'loop0' already present! [ 2555.412684][T30339] debugfs: File 'msg' in directory 'loop0' already present! 01:08:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x4000000000000000, 0x0) 01:08:48 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x6364, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) 01:08:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x20002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000840)={'vlan0\x00', 0x400}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x4e24, @broadcast}, {0x303}, 0x8, {0x2, 0x4e22, @rand_addr=0x3}, 'bcsf0\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r4 = socket$kcm(0x29, 0x2, 0x0) fchmod(r0, 0x8) r5 = epoll_create1(0x0) r6 = epoll_create1(0x0) close(r5) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$USBDEVFS_CLAIMINTERFACE(r9, 0x8004550f, &(0x7f0000000800)=0x67f) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886408"], 0x90ad) r10 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg(r10, &(0x7f00000007c0)={&(0x7f0000000100)=@in6={0xa, 0x4e20, 0x2, @mcast1, 0x400}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000180)="970aaf7fb2cfccac073f0c5f963c238ef394720ef0f8f1b40b87785e8af864771e88c96c1ad56bb08c704d8ec68a0d12d2147e11d2085cfd69438d1f5fe7a9d677e798040fbd28ef25515a3c349677b275f1804cee159e60a7cd3da228c60069c52e923fc60d033aeb87b37f8cda4114a1096e0980df1778ce5c9dec4ab0", 0x7e}, {&(0x7f0000000080)="f12f19117ff09585f051", 0xa}, {&(0x7f00000002c0)="072b472e4c92c6533a071dd0bca6d047dfd46b87ce3949c833c6a6392dd22d68f0da36264aebf9514b758dc36f9f726bbfb1626b4aeab9d408416d6be8f9c8c9351a48e1d46a9d2e665bfa4812d8f814d02f86d681fdabde6040233c6af33220b1b413b26ca0aacac71eccb82048db9affff9afaba29e627a8045061608968537d50cd45f821f4f71718b9168b349ab91564c3d196f1afd06a86dc8ebdeb2ace83222f9d33f827954000ab2cd641612b307aa9fe4736ad9b99c223bb80532d90ff51b0e2b3b06c1f406b967f62", 0xcd}, {&(0x7f0000000440)="ca3dcf28afa43446693f38411766f8e1b8d80ed2fb52d3b523d26f261361919d5ba4b484600745121bc05f4b414f014bb4eec4e6432123648b54bc892a7377eabf729b048b8c99db70739f38b00b4e5bc3bf41ee7c7c05e6d610b7e4b7dd7c00af7a4a3e9cf4478d8108884bc4d942007bc0e708db74474a919463b6fea2b3c1ea15b7788d5b016ffccaa31bc5886e22579437a242c837b089c7659f278984af87bca53d66f554b11eab73ee44dbcfe77f7ec0ca71e114321ed8ce3b31", 0xbd}, {&(0x7f0000000200)="a5d6340558b7e5f9eb1eeb6ffd557c3119ef0cb2990d4b760454c3bc24724995d3e1d1644929ffb9049d12be086b48a3e62b5b43fcd0bd7f8bf9a8ec87f02d6f0e965c5f61657f38cc48aba3dff9568b4bbdd241379f9c26fb75c7b0a0a25f5c59d761d73f", 0x65}, {&(0x7f00000003c0)="66af42bcb4d9eb9faf2db93296330fa2108403ec6aa037ab212bd65cea53de4c54b1a517c65e09ee9d34641c5179a2373b1841dddbd9d24fc589eed32e4289", 0x3f}, {&(0x7f0000000500)="976b6343b8be155183b8481cd35e064f6426380f89a4a985b11621ecf438df1784b54d0070bbed3144030a54ae3b77199a60c195d04ef7c31c05db8b916b773001927155f1748abee3f0295f47a027ab6fe28db7478f98e2ea0bb52bb51d748b44b735f9a27180eeb80870f5e64c54e567fe48f5694c609fc58db045ebacb628912eb05693fb4ae6933e05f4f3c6d7d0553206e30647a38125156de3f76583dc5b0875ef44abbfdcdc5480565c9751855e37d77ab26bef0f8f6833e77006acd80385", 0xc2}], 0x7, &(0x7f0000000680)=[{0x50, 0x88, 0x9, "12db19fe15041c19582b016943cea86533408340983136fdd20e8a0c56721fb8eb3008312d1cd42b6c5d13c086bf0b7774595943d3bb8a28d35be92602f8acdb"}, {0xe8, 0x110, 0x8, "e4c08e2fef1e659aa6753a5a3e936d6cf53745517f8c9ba1af28c4ea2f2d8936cf90a42f1faf17524b6b10f1930e38b29982e072687b2e14b870ee55a1efd4fc7fe470edc8a8b0f733bccfb7c24f7feac67ffd7547b1d741425ae9bb8d87386745637165e216f8012c86b718c1e198410755e8f675741cc7b8b734061bb7f023f93459a611724bbf9a0ed6ca85c6634c96f78115163e52188ce1b255ea81f4e1340b664f48b63cf55b8c54abcb5bfbc228757f5d745b6f9427f7e66144c350edbebdce20af0752d0e38446b9eb47759b28d126c25a"}], 0x138}, 0x40000) 01:08:48 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x8003, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x1) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000013c0)={0x0, 0x0}) recvmmsg(r4, &(0x7f00000012c0)=[{{&(0x7f0000000100)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000180)=""/124, 0x7c}, {&(0x7f00000002c0)=""/164, 0xa4}, {&(0x7f0000000200)=""/113, 0x71}, {&(0x7f0000000440)=""/247, 0xf7}, {&(0x7f0000000540)=""/168, 0xa8}], 0x5, &(0x7f0000000600)=""/233, 0xe9}, 0x3a9}, {{&(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/85, 0x55}, {&(0x7f0000000800)=""/238, 0xee}, {&(0x7f0000000900)=""/90, 0x5a}], 0x3, &(0x7f00000009c0)=""/156, 0x9c}, 0x2}, {{&(0x7f0000000a80)=@tipc=@id, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b00)=""/56, 0x38}, {&(0x7f0000001b80)=""/4096, 0x1000}, {&(0x7f0000000b40)}, {&(0x7f0000000b80)=""/36, 0x24}], 0x4, &(0x7f0000000c00)=""/216, 0xd8}, 0x5}, {{&(0x7f0000000d00)=@nfc_llcp, 0x80, &(0x7f00000014c0)=[{&(0x7f0000002b80)=""/4096, 0x1000}, {&(0x7f0000000d80)=""/206, 0xce}, {&(0x7f0000000e80)=""/63, 0x3f}, {&(0x7f0000000ec0)=""/31, 0x1f}, {&(0x7f0000000f00)=""/55, 0x37}, {&(0x7f0000000f40)=""/239, 0xffffffffffffff06}, {&(0x7f0000003b80)=""/4096, 0x1000}, {&(0x7f0000001040)=""/247, 0xf7}], 0x8, &(0x7f00000011c0)=""/252, 0xfc}, 0x8}], 0x4, 0x1, &(0x7f0000001400)={r5, r6+30000000}) accept$inet6(r7, &(0x7f0000001440)={0xa, 0x0, 0x0, @local}, &(0x7f0000001480)=0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xfea7) r8 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) write$P9_RATTACH(r4, &(0x7f0000000b40)={0x14, 0x69, 0x1, {0x20, 0x4, 0x2}}, 0x14) openat$cgroup_subtree(r4, &(0x7f0000001140)='cgroup.subtree_control\x00', 0x2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000001580)='/dev/autofs\x00', 0x8713772f6da04789, 0x0) ioctl$VIDIOC_QUERYMENU(r8, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) r9 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r9, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = fcntl$dupfd(r14, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r15, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$packet_fanout_data(r16, 0x107, 0x16, &(0x7f0000001700)={0x2, &(0x7f00000016c0)=[{0x9, 0x3f, 0x20, 0xffffffff}, {0x13, 0x3, 0xe5, 0x5}]}, 0x10) r17 = openat$cgroup_type(r12, &(0x7f00000015c0)='cgroup.type\x00', 0x2, 0x0) sendfile(r9, r17, &(0x7f0000001600)=0xffffffff80000001, 0xfffffffffffffffd) r18 = dup3(0xffffffffffffffff, r8, 0xc0000) write$P9_RSTAT(r18, &(0x7f0000001640)=ANY=[@ANYBLOB="5b0000e3411c31000054000400ff0f0000f0020000000100a032c53d84045e488fc5000000000000000000400900000000000000650600000000000007006b657972696e67002b2126a772696e6700"/101], 0x5b) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001540)='/dev/ubi_ctrl\x00', 0x88080, 0x0) [ 2556.231067][T30597] device nr0 entered promiscuous mode [ 2556.266091][ C0] net_ratelimit: 18 callbacks suppressed [ 2556.266100][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2556.278137][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:08:48 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x8901, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) 01:08:49 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000006c40)='/dev/sequencer2\x00', 0x2bd1e42a36cc19b1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000080)={0x7c, 0x7, 0x20, 0x1f, 0x8, 0x5a, 0x9, 0x1, 0x3f, 0x0, 0xff}, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f7ff"], 0x90ad) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$can_j1939(r5, &(0x7f0000000040)={0x1d, 0x0, 0x0, {0x1, 0x0, 0x8a0dcd9664876314}, 0x2}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r4, 0x81785501, &(0x7f00000002c0)=""/68) r8 = fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$USBDEVFS_BULK(r13, 0xc0185502, &(0x7f0000000380)={{0xb, 0x1}, 0x81, 0x55, 0xc, 0x4f, &(0x7f0000000340)="69bb31bcd627fd2aa6c6af12"}) r14 = fcntl$dupfd(r10, 0x0, r9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f00000003c0)=0xe8) sendmmsg(r8, &(0x7f0000006cc0)=[{{&(0x7f0000000540)=@hci={0x1f, r15}, 0x80, &(0x7f0000000680)=[{&(0x7f00000005c0)="abed03d4e82e90621f9ce7885a7973f25a8e7662eeb1acede612a3969461a9eab7592a03e57c66c353b591ca3b9cc190f709f4d0f860ccb08bc2ce7363338dafffb189c944adc3b72c734498ac3fb75da02ad27f175165b9f319d01d84b5f9829d9fface0e64f0bf9633ecae6e9e8d302ecf67e2a95e3635d7e4dc66ad2f1a94ff152b8defaba3d9ea4cad3b8c9e381bb70f1d8a357b94c45531f792ef135e", 0x9f}], 0x1, &(0x7f0000001b80)=[{0x78, 0xff, 0x7, "b169717575ae434e4b04e500b96fc85fb405b70a247dd3cf405a327c792edb004bd92dd758aee9bd987bcc6e9b869f8feb8d8547a824859b0a5a1f1da9ed9d645b62bec6e70adfbafe6edffe24231dd45475eed3319c3c81caa390ba084bd67281"}, {0xf0, 0x84, 0x4, "ad4991a927eb7e72ce6bb2229ba5d32d5ea4918def54ae81285b91e4aae656f88bc7977af588d5080ea44b23ca1a644e153bbfb82f119ed0b586440a73c2096c16acb754656361a444411be5a6067cd93de498a9665f10129b075d4deebe8a59653d923ea6c79aa3cce3f54e4c9e85b1099fc4886f044f1ed5d697d589608fd7f3d05b84df3c04118424bb8eef783d4ed240e900f3163b371ff5e9ddeaad8ddb945d716a1fa601e197a7054fecf61b92ab0161a004e14df1042d9852659afaf9a274a2d87d5c93596031c6e292c0e41443fdd4a0e23a3eb4313ce8689c340629"}, {0x1010, 0x2, 0x7fff, "6e7158343b415791fca60cc2fde481549689f19541771c9c99b13d038673f8a48479dfc63e765dd88173ad44c3c7547aa989f04aed16c18d57c5154be5515f8f862a9c235c8e562d2f014b05cef84e81f8efb149bdb95a2c3804242908fe3411ced956bb33baa40a9753f363ebe07a2c0a0f49c76bc50a42c95481dd0ef708cedb675892acc1b4eeae184f1073d71327bbfdb44fd05ea0db824d17bb4b376908c39699a43b57a4d2e054323067a25e6eb5ed99d8d71ac3f841da6d240e800cdf09acd62fb1ff8aafae232bf37687670fcf1e764c0630bb88fd0874e4454fb02f76b5784b697dbbfb5e27853a453a90c3b3402f2e5ab25d123e2e90c57b2ad74a471b94f65575e3bd5e5ac22aa42a39763774296258b91426d257d9893b2bbf82a06fb7c9eef060da35147dab9e0d12888f12fe276e63fbf8e2dc92caedb065b8d50c48b631f8f67b8cc6a41470086e33e3fc187054f9cad7f8d291050e19cec00281c76c349e7be46d11e4d1729aa75cfd4d4c2527e5dd3fb06b8051077d6e6980b9907223fdaab529204c0da5a671fe56b0706636f8e57f091367654c338f43395acd69d61468139d8cb92e68028ccf6c243bdde5573c4bd95d2d6f14ff4bc4cdc60034e03467b2b6cb33d361a1bfb2a7a34fa313a64dd64e33d535923a10d6131f3c4b229d0545e88ce067b4a1d48f6b7ac7fc70240baa749b75577a2f3a83daef774f23448f47c0cc0a2422ec95f7f148fc2b9e5ac5d0b379ec6e2b05ca3d5884652d8ff00b7ac1cc507bfedd033dde34c917fbb4d2f39b1929c0a973adf4c3cec72f6457cb972ce805160fd64616da56eb0f56a10b4b58b5b16085888bdda43c3054b1ab8bc67d04948fe9906e6449f41609e4513b1595aa146a456b3e2cd5dd138a9b84bd5fb25daf44195cf817f271037e88e48a027a3f6c315e0435f829f3d4cdf58c2514805419355d9ab48832eaa48b223141a018c2b5c22c9d145aa8c2e06e988962d49ecdc0194f8f2c56d3168e6cfaea76310638a942ca6a6f9a1aff35fc65c795fcef9d44490da562cbd4c76e0caac378889200482b9f1eaa9726051e025315f7ebfea7ccdcfad89df07173c74e69e73cd1222df018a52ecb9ea3c878ae2b290a73f4df6c63f692149a5bcfd06c5d4b78088236b096caae0c7af2567f3294b6b0301b20536efb39366135f2fd21e2c1690ac6bdad8041e7208d316f4d4185395e69a51bdf568bbfffc251ce9e880dc6d25e1d568ed0baa9120ed400be05fa452c70291356b37858f3ce3fd40482ee977d9f3c45289cf57e14cd243b2835777e6016c81f53dc3acd3819f4416328c6bf631de7115a284e2c5bb60afa57d9299d15aeb2fc94275cd4f912a7f4e8075476c8133f1f1fc896bdf8ad0f6489b169a4a0a05153454fe83c68c64b8a666cf54a469e0f5603917c9de89c26a130452112d716144c2eb02e2bee16bc61e2045a9060d1492c16e1dc469c6bb671a7a782d199f39d560052ba64e17342f36c8b5478ff58a6c915ff9e066928ba981bf30962906195639d65389e3e78f5b953f057a06025cc9178ce9e35bd1051ac41206572092ad6d0e2d06dd6de12d52e9aec9c4a0a12e3928a0a5c56fc5847b7fb2e781940942a6ed18cadbee6f1439d18b9b9cd38c78a52d4ff26264db69d060468dab92fa988425c37733b95ef24104a7ed682cab9cc7a80d965c6abdd55249614d45286e0227ca044b8bd91a5ab21043b2a65b2ab58c667d9939b01cfefbb7f848c11d67b70ee6339248ed5eb1e12e31196f4a61bdfbd85a4541d3591b91f575bf81a5fc6f3288b602b30261b86ca2d537662b3efd8ca0e5b4d438596d99dd07b8dbc64fe9e09456670089c708144dda292f902a02b4798cbbc29fffb7278f0d153ea74eef6ea1222a501d23def29a5c5b682ea2361de8e3d84e236647d14bca7054e8c5fcc986e72a73b262e8418fbab08a2432b57c7e987ff397581da4ddcc615a6bdfef250f6809d71f058271823587af122c3cadb049c3bba38d948c3d0ad6f6afd54e8dec1cf395d8882a99a28e62a44c4f56736c39e1e93c8c75e7251d0b835ec70d5acd10b986489fcabf4ada4dba7b0a437b14c5bedcbcc66a66926fe8057d5dcbeaf7adf31866940a3f33e6d1b09b112c0998b59b7395cf92646485b90f60b6f3a339ac0728c3729d31c481d1b5c3847d84d50da8d87e73016dea356f18c1065ec6cf26a3047552d8bc1a424f256cfa31dbed1dc2469b6abd50bf54646329a54f37196800724f04a86d8e4e51c9a888444f97c8fc08e9df8de206ec6d88d99ff6f908ebd6872f8f3c660181737651fd58be37a4ab943a6dc9f2cc07e7ca195e1825819a3ece0acb77546d9313e15ff64c8074f95870699aaf0420c2dbb0a53b72668413c3b79332e939bb3274dd08fcae560ad5f05f66ed92feabb8d58346e9bc649073074fda59ef5f95eed1ac248d0035fb72d6295bdd1b4a62326bd1b3bdb12093efa19d4bd0f03be22dfcbb91e602f93aea0057f3d0747a75c18274ab33a541dd0fe944d29810971c41fdd5ab0d7e9bb0c00861d698d4e69311c70a13c5bc3789109981e2c93511a1acebba437692c53468505311744e80a453135c8d1409281f7f66afa54d4beb91c8b3aec4d79127916ea9e3db5a969dd34dc007b617badd05aa8c0e6a924c20b74e4298b7d71ca7debdc00ee09d19096dca6d39c63bedfd14aea5356b428207cce53777f41c1291a23d5cdecdc1e2f65182d1bb303f64fdb2af496594389d49608c3b0a62eb495b4a5c61e71deb0424f43b875d9305c6353d3549b2b24f2f12a96c32f9c60c562afd10669ea7e80ecd2bf7493d8c13a20f9e0549f52ede4e9d7ff9d17dfde06b617a579b452ad05d2d46b924ac90e063ff063e7fe8d01e6a26f8d875ceb401a7118bbef925d1488f35a417d54cacb8583bac7a465101a1481fc0d0cc32046740d10d37fd56484d2fc77199a259180f618a733780c6f72ba382678603be7db92d91edaaf30c7f47b1b0714ad82465b88acac398877d66789c6b1fb4f3838c239c8feabe72fa816c002656265713af169debce81b24551c949235bacefca340817db0ad6e5309018a3316c2148611d43533bf9b2bf9bd3662f7144a35c7a33748f0cb6aea82335222aa425de05149a59d4424710e381764a4115a667b1d95afbc3fdd9e8c984108c31eb2a91264c57de21d7b52bde716a2f4c7c503fe89933c8a42708e685a39fdde26f605baa86b97046ef854e1f3e88040a185fbb963d993f366ec4f68de6c6630d15dfde5bbca870664784830ec38fb0a8252485c409d9acee53be8293a22e1cebaa522cb28fffb597d4b0aed54927388911f57e45443f2b089c74839f74977b961953f9fabee2230afaa1d6ffd5948fdede026f208321d4544b9adbfa6e063b5f3f7ce6bf1759486b25a0843055b3b67db1c341e09a8a31ebc2542ed4d3b9a049fd866f097cee4d20375a71869a8dec04450a2fd01d38be6ae49aa3a68af66a0402cf14ab1291ee4194a732bd02c58142e1e27866ccebb701a300172fd42e8f43aed003a1781548e8d89c7f2e24d6a293fec062192a686a6fd41501fa9c435d259dff21fb18d898c656d6525c19dc3d1742eb9b561d61f2db914be7253d199c390e43e71939335f7473a41ea94025e585b67202d811b90e9b5357fb21a6bb8e7dc42c7db3502d7bac7c58f877c2706caa6ba4239aa0605b27023c5bf400198465cfcb2a1ae624a32a0ecaf46c7f8301929ef1d9b8beb0993486a9aafcc11e13b582f5d7abdd3b7a1000b5e12cfc0f4e5b10104928b37eaa19686dadda78a2e38def4b759b08a9fbcc5f09d4e5dbff5d32b1738a1d77260bef1de24d7df5d23fac758fd25435d5c3893e7d22110cf392c523b7c2a837463e7e3c431a2d3e6ed5a7a908498c05d37992c024c25c719d67b2af4bcfdde5703d23f3bf81bfbe4d79e3f02008c3366dbba66996d4adce0272ce6a415bac2e9d67957d057e75913c06d14d10f0aff077364512b23f789b775aa1df6605c07424f75d4e6c7d92c9dc57c0b057a85f2fffeae6407f267c8bc5f7fade040506e718c1a2b562de9c079062dc0ac75eba5410b74aac404b9a7c1423acc57b5157b4256b11ff0558db22e29027626d5d86612f16d0b919a86e8c71b638ea08b9d1757a19ddce8349834b18faf8ad4cc2c91879168eda1742e701b12bf5736d90b9ca33a29830d299498d57957686ab7e490faa310690e4e2131275b11daed4b065761a2a0f140a7790273852c2420a76da018fa1542eb0837fe0f4ec876aeaf8d41647cf4be6ef09960621e755390e453cbc32a0747e65362c3daa51befe2000260be4d890311d3d6fa43806759d7eec6e4e1ceefc3cafc2814b128ee8c3c587bd9ba778e95529d203972acb0981e3177dd5bd0ddff9bd8aa2697c6056911260d2b79a6fbf0b5279c2bfd8eb95fa0fff2def8fdf287907cef87844b7b5b7a61d6c1c56ec5886937578a4084d21f0ac948a8b1399eeb60dbea9011868569975357f4f6fca6a38b43b5f2a0aff8a6557cc19fef1269626c70b0c03a7b3669cc0e76339639018bb260b43009626ebc09d8876ee6d5db163354f08dc8eea347860643cf9a8deb7a03be1a331263b340386808d90f03a3ac4f527739f658372d29b233a58ab9919c1cc8b0c22d472dbc2d086018e12042e45cbd4e595635498d8c32bcc62b811be66cbe32bfe7d46d74ed07445fbcf6e071d633e3a63370d3a3d501723a47c9b1b4f56dd00e010ba37f10d418d91154a491e277653910edd7a4551b10cfe12e1018f8b7d48ffe3606086a9d597407330d955dff047d532a755d745ac2dbb47155c3df78d50348f1604c6b8460dd3529c0f0ac61c10f00eba2c97f66d08bf8260d84b23a0888558e928ae41d4656f3a560ae96f20b7252205cd8e6a6eb322c0a3dbf9055312ac6683ce2dfb8b3b83f0be4c6906b087673432ec6711f53cac597f4cc6cc0061eb7cb65c91c5f6c56c108987c1589a6e24f76f154ccd680607aace08be1e88628c9a6e20bf95544ba36f2a632114b39ccd4ed9f639639a403530aa4500df05523d3ad9eb44470c3b6693beb2a348eef5a1af8af5ac0f35fa6025de821184f35562b6094f34b42a18a355d0c9cbd2d6cdf5cca82522f9e167c55051213817cd8c75886406789a8e7d3f9e875f76c5a7aae341a25e8096cfe17c191371e6833fa47febb834c4c3b3fa4aaa33520bf078c872c367d9ca4e65e1b55c4bf128dcc9b33bcb184c0fbf6442c5cd526a95d5d60a04e5bf7a4b1f149bffdef9515d6321e09010b80fcd7d884e3301e92ce3c80ddb57641c4b644b57a782704934dfde8f649fa4563398fbac70403648354a7575018a53d34fd1d7454635268ab24c0cb7c4692471c47d08d767073e30f4cfc92a8c1a4ff10af197089dbf3387e5993c57c422e43a9a93b1ea88bd82e20d7a4fd7e1e1276f524ba88405d4455b6eee84fc102bdce39e7c3c9cc6fa9a50a38738f892caf638dbea67ee82c44c6f929656def99268a86b05a8fb6f79d98ea6fd0d0d52efda213cd9a466e125515cfe1b59e196283a18e12f04dccbb0ea2020d524bd92db8d15f594ebe75866d5b572b8d8f168e92cfb68e71bdbf6f6ff955a18af206ab209355d9dc0bc6255a6cee1e6031ec5fd6546461420a6550f30a84f315dbb071347668f55799b4385585e17246118325a6d78e2f3ba593afa2e7f440afbff8f7349c0fe2a05f45c02b11e8368eafdfa6a637c8"}, {0x28, 0x10d, 0x3, "cc3dce67ee1f03edbbc0a27ab1a3a0a22dbd6e29e0e2"}, {0xd8, 0x112, 0x1, "9b3bef865d091bc88fe86e23ccfa8d97aa1c36e9783f118427de0166dcd1cc788e321179af2206bd4429471b8931eb20fab752d2926f8713eb381f1eeaf90a749e3ac487c6ed1deaff92090241e8f86026f3a8dc9b56583d5dfdd84e403f0370a5f9345b32fc4e0550f3ce18f7c31a5d87a2058e4dc5aa9cef49abe37af81559fa6e73591522e52c873a1574810cd61d63ba5e3161fbdf81c3dfbf0ecf635a78dbe02079fb3d6dcd402126e22b29ec270f22ae2db7c3b530963e5fdb8ba5a179d398af5c"}], 0x1278}}, {{&(0x7f00000006c0)=@un=@abs={0x0, 0x0, 0x4e20}, 0x80, &(0x7f0000002f00)=[{&(0x7f0000000740)="52bb4693ef4f2d029ddb790a6423c8369ec8ed7434d53ed9e7ebf6dc719ff1c10d7fdf207fe333b0ee9726a5e24550cc7a25fdf6bbe43635e99699d59094ecd2a621a2e4e8c3c1731e765d85d88b306912009297f4d5c45895f6f39334b49d2a2bd62e7dc8bc5b52e24289f79dc62c579c438cd0f1e16807306f293b938a6a3823188cf5de45061fd1c011e07dbb412d052f275332a7", 0x96}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000002e00)="e33d37e40d9b4c5ea7e34389cf7b22bf602174c8988ff025a023969b8946c328923b3571739c50053af00e9d1f36bcf995ab47e35dd9c821e93881b80af63b0dba6fb10a66b354fa0fd27da896d7500e1a55f9391f186f9ba0fe450e1994e765acd6d32d3bfedea412a75673392875ed2c3c881d64d0e490eb1e82d2b317f40ee6207a532a334a469ad7c79c0d43983c5cc5f5b39a50119d4ab425ce7e5a1227d2767dd6698468fd336696da4e247c7576fbf3491d0caf6fefdbe96c5b57c0a97600c8e74fea8648f4d641", 0xcb}, {&(0x7f0000001800)="7a20a9cd1967b99e81f496d43bd7ed9e474aed21f39da30ede96ae5c2c709352144f857e5ec406df1ae4f446f2c04feb5af05f28459ae87585a826db30f5c0961fc9542761b5fbb5e9bd83a8ded460c899eeac485817022305cc40450cc25d3288a1bb846963f7d9308fc2e9eccd59ceceb66b6de852430f714e193571442d6ef3dcdd8685b3fb809029cd67a1ca6292b2333d1eb033b4dc5cc2c0c0b5a7d19bca7f1c1350d208f7eaac4eb9ff59123404e7d105affd19372a6270eb95e02c", 0xbf}], 0x4, &(0x7f0000002f40)=[{0x28, 0x118, 0x144, "24d6a1ada6dc553fc14a85f5514fc03d2d"}], 0x28}}, {{&(0x7f0000002f80)=@sco={0x1f, {0x9, 0x0, 0x2, 0xdf, 0x1, 0x40}}, 0x80, &(0x7f0000003040)=[{&(0x7f0000003000)="4e24fa2eb27b5abf07227d2124e5e02dd2e8aa1547f304aeffeef10bf85f34645bf5f12faf7e32c918982fb7f5be39b768a716c422bc860495b6", 0x3a}], 0x1}}, {{&(0x7f0000003080)=@rc={0x1f, {0xdf, 0xfc, 0x3, 0x9, 0x1, 0x1f}}, 0x80, &(0x7f0000004200)=[{&(0x7f0000003100)="c0cefa88a9324fbb0d186d6689cee5cbc3fba7162956d1e0bf0a14ba8ae0c7423ad71a156a934f47de370c10f1714685511255b1e648c3a501fde5575b3eed94c45dba5185c36e59fc249d5c571f90ce2d999218e90cd6e258139af1a39fd768d437ccc232bfdef61995240f3549926132f1f6a7dffb6eae5ceb833a5f685524937a95194a1aea99e1914972a535ec17b073ae1f0413fc9a256c8d5be6141d184009904fd3d8622376cd4da0d75b68936b0e404f73a1728fbe6f9905fc5043bd3c1a6a818468735a082bc6ca3fa9196da4257a26", 0xd4}, {&(0x7f0000003200)="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", 0x1000}], 0x2, &(0x7f0000004240)=[{0x50, 0x0, 0x7, "0ea84445978a1d0f01b6b6680a1cf76ec342ecc909cf3086fd84a37e9a213a2df6232060b91c09cd30646ad6fccaf8ec1072f66c0c4b474ce0a2"}, {0xe0, 0x108, 0xce8b, "0d0512efe9567ad38f171f0ea54ba5ef84b5b7e14e3a8a20f0b433ece285c76f8ef5ee42ae14779a0706bc8463fc69886577d1b2cfff102a7c7f54db6baf0a9b9c3dd88d52220ff718769a88abc05eea523d059febefa0e8e1e6c8ff88eb2312b79feabebcaabaf2c6321dabfa7643e9d7264f34a5e467ed2493f848e0040aa01ec76ad055a2cf8a50938357e95ac2d6a7a1f2fb07a17f91ea3de9fc0fe6db729f8c1540a2393559add465ad58ce94688b9fcb8f4e08777751bfde3cff8900bbbeb4360c2499f735ae69e23d78"}, {0x98, 0x1, 0x7fffffff, "a4fcfb072ab843ddf4e182ddc3f20268adc77654085e6531989336a61af507b75f636b1984f2b4fcd1a5cc4c8890a677bf3e8a1587cb5bface37fdb1e92870730463fe0c6f8890116ceaca26c25de319f8b21870721b0a22dc3827339d36aed15c09256e6a9ddc4c2ff3bebe6e0025a10174a2fab949d2415573264c00b57d793958062fcf4175"}, {0x1010, 0x95f363688c2cbd79, 0x7, "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"}, {0xa0, 0x116, 0x8, "62b8c3c35cf56f907ebe2415e80f831d17c3dfa8b38ee3b5e2b521b1dfa6e21bc6f14dd0042eece87bd9579f08bc01257df5bf69fa874e6375d71c6e552b8efd3ad0cec01edccbb05c939f49c0ed21480e896c1267fd130cf15a3b56865dce17e7d7703269f4dfcf9b1965aba5bc95c50d68c8e83ba97901bc2a339a71327115898e423ad912cfc020c4f3460246550b"}, {0x78, 0x10a, 0xff, "bb7f299b8dde9a0fe5eb540a0ecd430a3bb2e2e6bfc82ba2916fda6577ceb705b835db1083023c64dac22b8c851b14673040ed957711bce5c7bbf83e523f32b0d693a92bcae436e521762ef97a506e0465bab007065f2a75ee104cf41222b08a10e6737eba82"}, {0x50, 0x103, 0x9, "1e2c0c712b13f97f5710b60f2597428a2fbca4acd42129221e3ff9761ccdd10d08cbe60a4763e0158a8d32a7a0a8b0942dcb4501144c74ebdd35450c2fc8"}, {0x38, 0x10e, 0xe5, "e34a881475fa931f005098130a1326a614ea26fae8961e1013f28e1b46f72a46838e2c524f0e31"}, {0x98, 0x10d, 0x3, "3464a50a0d531c28fedf0e5fbff6edc4056b3712b3ec1851c8e00e3b9aa90093f97b37133a94d90f93fd0cd51760c130b28220fa9647c1690b4f4415f302948fff8c58a1388d7399a4871141c4a0041128b305a035bca25485bffac650a9fc8516d38d7c287f1d7b7291feffabbb13286403d0ca25130cc728ec9253f284610ab44cad839f6935"}], 0x1410}}, {{&(0x7f0000005680)=@nfc={0x27, 0x0, 0x1, 0x3}, 0x80, &(0x7f0000006a80)=[{&(0x7f0000005700)="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", 0xfe}, {&(0x7f0000005800)="95a2d06dc3db3cb0f0122b0624d2e83d303e30db7d2fbb06da36fe65f3352f98f06f7ff6e5ebed7b33e44ae8297eb8df65e790c527e176e73ad7446b4a52a3", 0x3f}, {&(0x7f0000005840)="f99130219bd510c89451f1b2ddf94b37591badc311393d99dafd9c8177c47155b493230a733cc4f175d857bdcfa818171f220f34eaa8fb1102adafc5a4c51fd4ca3f98409edcb2f302a47f0c26350e0413f3a15ff9735c604848aba7337f3c4dacabaa567f12b06568858fcebd1e1af6fe4f306eed32f1fa976224b1faf134cc462f93fd6831928942089b75", 0x8c}, {&(0x7f0000005900)="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", 0xff}, {&(0x7f0000005a00)="2748f6cc1700102404a6bc0e3be9d3fa461d2c2bdb40fc413744ad3a48b0b25deb02afa724526450ae37938c8724cb2ffe4eb87459f957a7b4103c8712cd37a84037911d97ca69b9e0fbcd4f288683467021d168ab06acd5a83e773e326af10267055e41edc7eb1d012fc58980da67ed797e44ffefb5b386c7727660d0199fda960b1a40e0b2708b21574ead6980fd13261a927e46da666218fbcf2de1a9846e888bc6d541991492514ce17df3525fa36e8368b946c6e485f77e36f4d814b8bdf364545d98a7e4246e0df892a2809916289c4b3068afad45205838db6209b988bced42f2b10a0a18a0d31b68b9d0df98aeb74bc0fe4c74d4e33c83374f582e94d0650e36f125581614147ce7dc4fd0d49e67e7d27e0a03b4a411ccf11c40fdc69ba616a0883b8845eddf772c77965d5d084181c25889bbeae07cf5b2a67d221a606c3cea655490bacc650a2ebcde13663b3da0c3af200c7254562c364f82bf40134aaff0c35580e3fd8fcf9956f8f303baa4bc7267323591e5c3cf1db45dfc2e2e7bbf1006f9ec2d7725c550840d5a4e4980d89890c323a72685d9898e34df70d570b5c8f587968eee53a245e63b68d2c4784c80dbc78c2620a985e1df09d6eb617c5ae8876b2f9079d4499d57dd667e6b2627379c998e6c3edce0d7bf49e2d86cf6f2146ac4a3d52c0f09a32ff51416938b54a508dd6821ca84d7fe4766597712eccb2e5a9b1a7452f7afb05f4723b17346c3ded6aa49136c193d6f8760464a84f9bfceeb7239a91086279f51894e28f7551987cfa23fdbe89027f2587b210a348c7bdcc154153a9e6fb236c1183e533fee624f41ceb9e091ee23863351e53bae3209b7c4bf45101810646720237c065d3f768a30bf97b827abc9174a0855df056a4ce0c5cc82e3c9784f57417f8dfa7de7f019095ea1a13db3add81ebbb59a85db9d6f62fa7c04a3f3d5020f117a5091a6d861cfa15d3fcd6692d4b0d83dd0d822b93a47c6e48e55e63205bb47f75069a67c499d3bf2f602ef341ab7f6b8fc89866708e90d25afc38d8a4957bd5d09f3ff7539efd027bcd1fb3deb4db4639da25960953f1d70ba6dab02ca51a609c8fa7aa511f53e2111f289ec88c418041616c7a35c85baceb82065ace0f021776ee7d02a287d98b75902496289a90b110a153947ca91dabadfae03f8e0c23713cfc1804d7a293528f87722a6018ef0ad0fb94e24537599e5cdf40ed5ffd5042683a3960588c2c774e921e40281a81ee918ac74dfffc6b90584979ed741aea7665d21872da56a80b66260bf2af6d5649aee67b9d1556d9a186e0748e269b73221f1d8269e4d906e6cd15bcf292485ce518d9b40969cb74f845bce9cffe9cca3dbf8759495206d7d58c9512503e663b77626cb29b682438a68691bc840b8271144017c621ef7cb0db44b359d16187d372d3279a8c76ac1865f160f73412426b6872815efd93b5ccb439163f38ce2d427916b4455632d7d24cf9be63c2743662a96703d3dff40f613270d94003c6c29d2f9e465d9e594ed206ee3690bed927ebd22a49569df50a8fafc856485013f461caf26bc8daea71643a97bf027d20648b2a120557d2cfafebead51e7327e5d601c4eaa7d6364f0fbfb71846f4984540af646e06dc5fbafa10594ed14bf9130bccfb19bea9d63eef97fbb55d212f5ec0f13b7d9dcc9081224267aaa5c2ace16ba9c6dd023e1dd620cd57f84e2bf374a4701d4afcd12cac75c4e07ab0698b34af22183e162c1745aedef602142a17c4566f1b2f30dbb42c0e1e52ba61dc8a05f73ddaccadc1ad280f14812573f0aa0252af887bed8520a960c1ec52c7ca248f2fc64865f4bce2921014159997795f94829cc78fb11c09f00686f1ad28a1a56de3a1e2720f6a446e94d1bc3eb9b1f4a932986dbece3da13d46514dc40dfa6f63a46e25bc4fef6fe1e6e18b46a31665053e650e4a9a0629ea3e638559c05dcaf971e4dc9b7e8f9d9b1b5cd76ceb694126e7ed78a367ba78be189b25473ced1d22d601c015b1ab58f8d8a5ce443f10c9f5367d09f731b37178d2422773378781484dcbc237027001c7eac0af46fb83129a31ae0201166296a9f2a81bea169e541df68311a8023ad11908161d29f4aded961f2587fa4689066dedba452c1e16d9851a900df19acde11b05af95332eeff32579194ce84f07b6762ef5d1a6d27692e25f47c8622fe6feec1e6907a94c87c8b1496d75cfbf4e0ef969e590babbe7b7c5c00a0f24324c743e38ad1d9369acbd27eef7f1fa482149b11f60267f889b138c7cb56b85595ab45d45ac52becb420ca1df1ce0b70b3d8315beab1a9175dbe48257a78bb28ff048f1cc8b5d33bd82c2015c2b4bd06f5e739cfc4ddda0bcef3003b4177bbf010603c7902f896be7fbb6351eb82c197c5fa05378787e148c9f34ce67016f65b00cadf2ed0cd9d675a4b7e5c367edc78ee53fb1a3c595bdca1378f8abf698b9d74cb1a659a9c052eeaed3a4cd6ae1287461e5db296154ee75edb0e9631a4f36a41cc7e605d97f924d3d659a76561dabce2b5f136d7d5a4b05cbd15ecf3ff65f266cedd74376fe2fd2d5fb37627c92b5335c9374a0fee3c812c7cc77d3619b8bebd693bdc86ff7b4d4c3bc1e24eb29300ff678824c8b577f6ff3b2a465b9b49fcbe55958c5a085aa70229d762c0521590a79f4251f320f1a88ffc12c781772e563eddf9339d444b21ac570672f1f273cde99e04f88ce3875e562f0a5a34ead5b4aa3bd087eb88c8752b19872ac21d649fcb2335a18dde38756476f6aa344647c08ec319734f3bf112ae1a46323754c097be9f6ec6662669a2440ae29daaff36c472c705b0e8b3271270b4a50d624a9f074500aca317ef0fd3ffbd1a9a68d80a2d3dd5abe80f7a5840f4fd2f7666d1170fa15959a282d5ca719de75a366388d202bcff339d40cb445de286602fcd1311cb1bd06d08f5f5104ce26e3e1ca8414a4e01465ab8ace28d865f06deb9d6b6bd214f24471680d9c05dbbe48c6be32dcb40de1017e31e1ce865f63193bcdb2a203a7726b784ea75768110314fccde46751300966128e26db4ba241a10a99fdd7322372e74988da8ef099d29b40612e43698942d818fc96519222929adfad9548e58c8464dc78a5280512763e052817a72fa4a11f78f66b9cbec962f93e7793fb6fa99bf1f0325f9524fd0f63fc1aaf27dbf9b4dbc377c3a6242ce6420a55267062cabab97c98dc2bff60670efe6851e3baf688279af9baead8f8f630f061d2a6fcf27430c326ff0c2223340e49f8d5d2c18da81872a70203d24bd1c4491b54001c056b81a70f79ca7e6947110209859b18597353507a4fb23fb3a1cba15cabac9906d5ef9f0cdfac9eb626e9c0f5dc920ffedcd84a5ad7afe9433158cf2ccbeeaaef6d046eeb8c3cc44220b1e87bb401c8608559aeff4cc72a3e0c4a876950a99aadd37e170161eeee136eb9847c2579c318b720afa9709f63b445f0c02b8a6e435ff1d514a45415c185e536f089623504dad5ed2a8cfe4f9827bffc6a0a4960b19998c62eaaf58615ae8a9f6145ea796f5d892f3bc47711bffa6d76931b41ec0665ea046481a0398b871d9be548f271cb1677c3382515638ea0f8d9bb103eabd06d39d24078dd4231205850e434c64eafd9240b75c6e6003713c79731bf44df4eab84847ee50dac3812e9fb9ee91eb0473875b6802231fae179a3a7e726b3861f78643d94df6b4cf23b955b623edd4e807651946086a263bbde992e503e075d9c2584670077b78ec9c7b8e4cf07a9ec0a6ae296e86bafd20aeca833bec9bcc0c3857765d90e5051954111fe050b8df599bf038ef8d53a4a54ee715a56efd8079eb55d3898bd45766b120d1caf03084e7c346170070662da6524af1104b32b65ec77464e2bd1d46660ab4cacba4e71aaa0bb0fbb5445864138675f95295f1d2cace234c2b8164367bb9285bdd7b15eab65493e02f10ae3426c1e11fd398a81e7fe4f7b543bed5d2a7604df0df1c2c76e40718ca2c8bc059c0b941986c8783025f83bdb244dc56c0b0d4677b3b1e0e710d9038747fc328b21d92e64f450b569718b01f1e25f6c5e215b5888a210491a7e7c979fff275fba4435e87c85bd44d5da30f4a724cb6f92d486efecd3272600d8eb343e070e128b99ca9b8c02001307c5e165fc99a652362e3b51fdba4d4464c52a36e8d7d018c09005371cc35ab0b826fc6fae928bc871d8f08bd842502381e7f66b9da793705d3ec9ac6acc397ae1a33dd938c06b8333271c95e6879cb8c4f3d661d0e53d78a8fe947cf5c4160af80c48742916ccc6346454a720d4014ed8d0355402d47c28a5a72c019355d9622fa20b571e52b74510a4d8415512769bbf86c2c43ca5d13a2cf55235f139184b237907e947ab5dce322b4a96238accb2f1af73716b16e8b4e72c057abd1adef3cced86c307fbd9ac7c06a8e6ba5a3d53272487f2d53a1774cfecc2542243c24ee4eaebb669d0680491fb649e3960ca738385b365001cfba17fc9e85e871e926bf55f846fc8bcec1bbec3bcb4972afb1ed35efe671c7ccbd84d27a7eef9e4e100ca743d8e748db74b65b2cbaa828ef2380f389d5e040f293e3c3da799aa288067711e0d7ad29e2f5aff16f6829129c3e356fc1e2060213c0b554e13c4d9a541498988794dd7a9f38dca3e4fb66b0acf93f081cb5bf311ebf7009952d5f177b3e9466795829cab91c1af00c9391e3258d1b09bd66cd725691a1f85d9776259c591f19c0e09126877a5908da09ed2ab8789e5d42407949bf0d40f6a829a2b4ce9e9df9e81b844132d3c2c92ce9b2894cc2d9f2236c4d5f8f6bceee824cad3f3d4bf3b2573f3570117649f45e1a162140689ad256c6859328c7da09d8f8e1501d8fa997bc19e994de267bc7d00600238ff797cde531bb7c4ff673d97e211a8e7d054905e60f0596be92a09a87030810a2dfb7f470bdd8dabdd719fabab48303fc3d812402d3472cf7ebc02c31d946cc14e81405c524b71d0b0bae4c9b27284914cdbb948520aca0673623990a0118f26f9a61eb3cf6215a7c2b41ddf655c79c5cb77cafcf169fe8eea6dc001252b18419b45d14cd3233a301beef068bd33f557bd3a84fe651f3d32a89c413c2bc00eff128a95d80deefe4fd110a434fa9652f8a68f963e585d1e516235486401a36e3c9bb2ca04e2849cb04bd2e3589451e10206ebdfaa8955178d3e1761b72989dd5a8f8445fde9a099283b3459e17bd2ea7a6f39f2b51ea403b6f0be98eb33b308e1b4caaa1cfd3cb57202c993b1e7cd7ad12ccc5703916b0791617b7de67eac6be63b07891851362a60e0a906cc0c9274435912d65afd75adf5b07f6cf439e4a8faa3475dd5b53d417e60ee75fb11a4a2ff3d33e0c4cc2b086dec7f7e918e49ad8fa0102ab7bf7e8785eec089d17f99f66027b42a5c4243efccf33876e979f7db7bfdcab0584af57917cd269b779acf5398a91c53eeb7a5c1598b1b05e6eb4e6dc94b1436932ed530794e0dea650105654038ac130f15d588e1dd9b5ee3eb6591228ca701519a5b7efa4862deab3a031b2225d22a5f978f302e71fad3ac81a29439e3c777a617507a70a75d9d3b3e9be392fc811053f6fc0910dddbc1fa805e7e6204550e26bca340049b00292b755f0fe2cb84692bc5314fd2be3f5c525d1052470ecbfe9dc867540e4e5053a2a152a030a5762d0d1ba83731d57feef87d6eb67add064842b356a82a63510cfc725ee681f54cc32f644e7b23d61d5b866b23dda278ba1233e08", 0x1000}, {&(0x7f0000006a00)="52a0760a337217dd4307e8ba808ea60bfe8790a0200a4246b970b2629cfffbd4e82d41231aa279f44001add9ccdb4e7d3cfe9b90c07909229e978b62a398672046fd4b8697fdfaaa4f45c889de8ebb3eb779e8a76802c5ef6575fe2613b8d5ba5fb6ac430653b6caa579402cb98da69681863f3c64244b667f71f0d72c", 0x7d}], 0x6}}, {{&(0x7f0000006b00)=@nl=@unspec, 0x80, &(0x7f0000006c80)=[{&(0x7f0000006b80)="17468b5ecc54493131cf889c8fb3d8b062d82592e32f54bda217200cc90e34724e1aa835673cb04b249d3643acee39b9ba585995ba051f19bb59187e0b44e126932de7677e2efe49215b0078d3c8ebd2fc4fb7416adb4d072763f616acb57e915b4dfbb56f6c71da8e90c4c30bf8b309b5c9f69b05c29c08dfd79df4343d5f50a6edfbda39ef81551634310861d1f1d6c856d58cfc1d279cb09b6b4759c76540d4741e20", 0xa4}, {&(0x7f0000006c40)}], 0x2}}], 0x6, 0x4000014) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = fcntl$dupfd(r17, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r14, 0x29, 0x22, &(0x7f0000000100)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xd9) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000200)={'veth0\x00', r19}) 01:08:49 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x90ad) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x54135aa0c77a6023, 0x0) write$dsp(r2, &(0x7f0000000100)="f7a57421f9dcb15eae8b89249aa9bc96ef3d99e78998b273ef08031de8626c6f0ed460a133d7bc735ec6a9b5074a6e97d85ba4d032ab85f57f70540572196ccc8571be40d2cb768914464cbabf0550d77261f23e52ed3e51da6029a6e5626f8437e68f41f5a33d9dd54d58f716e61e10962b372e0a838c59474d536b2b668606407906073c1a0dfb33d894", 0x8b) [ 2556.926105][T30675] device nr0 entered promiscuous mode [ 2556.954791][T30678] device nr0 entered promiscuous mode 01:08:49 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x8902, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) [ 2557.226077][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2557.232155][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2557.859260][T30678] device nr0 entered promiscuous mode [ 2557.867217][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2557.874404][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2558.026121][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2558.032559][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2558.039108][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2558.045314][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:08:50 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x8903, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) [ 2561.388264][ C0] net_ratelimit: 12 callbacks suppressed [ 2561.388285][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2561.401483][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2562.029981][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2562.039303][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2562.186183][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2562.194178][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2562.201675][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2562.208597][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2562.508019][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2562.515676][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2566.666770][ C0] net_ratelimit: 18 callbacks suppressed [ 2566.666811][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2566.679242][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2567.626962][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2567.636038][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2568.266671][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2568.274495][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2568.426156][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2568.432225][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2568.438052][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2568.443946][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2571.786875][ C0] net_ratelimit: 12 callbacks suppressed [ 2571.786917][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2571.799191][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2572.426808][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2572.434740][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2572.586147][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2572.592001][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2572.597903][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2572.603678][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2572.907253][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2572.915597][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2576.837593][T30339] debugfs: File 'trace0' in directory 'loop0' already present! [ 2577.067231][ C0] net_ratelimit: 18 callbacks suppressed [ 2577.067272][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2577.079673][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2578.027306][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2578.035570][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2578.668020][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2578.675619][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2578.826113][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2578.831969][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2578.837821][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2578.843611][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2582.186103][ C0] net_ratelimit: 12 callbacks suppressed [ 2582.186112][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2582.197638][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2582.826084][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2582.831933][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2582.987165][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2582.995132][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2583.002389][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2583.009304][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2583.306115][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2583.311985][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2587.075515][T30349] debugfs: File 'dropped' in directory 'loop0' already present! [ 2587.083332][T30349] debugfs: File 'msg' in directory 'loop0' already present! [ 2587.097903][T30349] debugfs: File 'trace0' in directory 'loop0' already present! 01:09:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x141100, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x0, &(0x7f0000000040)='silent\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x90ad) 01:09:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/user\x00') perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x7, 0x0, 0x3, 0xc8, 0x0, 0x9, 0x0, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xbed, 0x1, @perf_config_ext={0x2, 0x9}, 0x1404, 0xad, 0x7219, 0x6, 0x7fffffff, 0x3, 0x5}, r1, 0x8, 0xffffffffffffffff, 0xd) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$UHID_INPUT(r4, &(0x7f0000000440)={0x8, "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", 0x1000}, 0x1006) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0009000000ff38ffec329eafdc2cbd5d6b3342b4a6723594edf4e404555ab0bd4b205cdd121075d9ace607dc3b240917ef3cbd55d15187e9e3dea05b172cfd520dad0807386894e099348780620ba848dd85d608befb2eb36192021a9b0e54f7b02b6c5d721e969403736277469c6dea22ad52cc8c3be951328f2c93096ceb9459de172dd5d0a20ecfb73e094e9790be265e7a28fbc7c0"], 0x90ad) 01:09:19 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x8904, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) 01:09:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x7e00000000000000, 0x0) 01:09:20 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x92d0300, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:09:20 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x6f0a77bd) accept4$unix(r1, &(0x7f0000000480), &(0x7f00000002c0)=0x6e, 0x1000) fstat(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xffffffffffffffeb) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) r6 = shmget$private(0x0, 0x1000, 0x1000, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_UNLOCK(r6, 0xc) shmctl$IPC_SET(r6, 0x1, &(0x7f0000000840)={{0x100, r2, r3, 0x0, r3}, 0xb8fc, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7b}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r8) sendmsg(r9, &(0x7f0000000280)={&(0x7f00000003c0)=@ipx={0x4, 0x7b5d, 0x88b9, '\x00', 0xa8}, 0x80, &(0x7f0000001a00), 0x1, 0x0, 0xffffffffffffff5c}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x2, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, 0xffffffffffffffff, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r10 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r11 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r10) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r11) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 2587.412080][T30793] device nr0 entered promiscuous mode [ 2587.454279][T30801] debugfs: File 'dropped' in directory 'loop0' already present! [ 2587.466043][ C0] net_ratelimit: 18 callbacks suppressed [ 2587.466051][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2587.477568][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2587.505188][T30801] debugfs: File 'msg' in directory 'loop0' already present! [ 2587.505343][T30801] debugfs: File 'trace0' in directory 'loop0' already present! [ 2587.573004][T30802] debugfs: File 'dropped' in directory 'loop0' already present! [ 2587.581812][T30802] debugfs: File 'msg' in directory 'loop0' already present! 01:09:20 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x8906, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) [ 2588.124098][T30793] device nr0 entered promiscuous mode 01:09:21 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc008561c, &(0x7f0000000000)={0x100000008000005, 0x9, @value}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$tipc(r5, &(0x7f0000000080)=@id={0x1e, 0x3, 0x0, {0x4e22}}, 0x10) fstatfs(r2, &(0x7f0000000000)=""/78) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f7ff"], 0x90ad) [ 2588.436613][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2588.443143][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:09:21 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x8907, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) [ 2588.533507][T31124] device nr0 entered promiscuous mode 01:09:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) getitimer(0x2, &(0x7f0000000000)) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x90ad) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x8) [ 2589.066128][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2589.072179][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2589.126785][T31231] device nr0 entered promiscuous mode [ 2589.227633][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2589.234924][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2589.242013][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2589.248312][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:09:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ee405de6ff"], 0x90ad) [ 2589.651023][T31235] device nr0 entered promiscuous mode 01:09:22 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x8910, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) [ 2590.303242][T31235] device nr0 entered promiscuous mode 01:09:23 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="f218b5b200"], 0x90ad) 01:09:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x8000000000000000, 0x0) 01:09:23 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x8911, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) [ 2590.946149][T31349] device nr0 entered promiscuous mode 01:09:23 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) chdir(&(0x7f0000000000)='./file0\x00') ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f7ff"], 0x90ad) [ 2591.282258][T31356] device nr0 entered promiscuous mode [ 2591.586514][T31344] device nr0 entered promiscuous mode [ 2592.596957][ C0] net_ratelimit: 12 callbacks suppressed [ 2592.596999][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2592.610850][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2593.226085][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2593.232117][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2593.387080][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2593.395776][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2593.404255][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2593.411255][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2593.706108][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2593.712009][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2597.866079][ C0] net_ratelimit: 18 callbacks suppressed [ 2597.866088][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2597.877577][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2598.826093][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2598.831955][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2599.466095][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2599.471937][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2599.627158][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2599.634863][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2599.643271][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2599.650811][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2602.986097][ C0] net_ratelimit: 12 callbacks suppressed [ 2602.986106][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2602.997619][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2603.626093][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2603.631938][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2603.787176][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2603.796233][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2603.805321][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2603.812296][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2604.106079][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2604.111909][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2608.266084][ C0] net_ratelimit: 18 callbacks suppressed [ 2608.266093][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2608.277600][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2609.226086][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2609.231940][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2609.866092][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2609.872027][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2610.027126][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2610.036410][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2610.044880][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2610.052609][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2611.424287][T30802] debugfs: File 'trace0' in directory 'loop0' already present! [ 2613.386092][ C0] net_ratelimit: 12 callbacks suppressed [ 2613.386102][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2613.400238][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2614.026092][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2614.031954][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2614.187131][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2614.196176][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2614.204405][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2614.211794][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2614.506088][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2614.512013][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2618.677086][ C0] net_ratelimit: 18 callbacks suppressed [ 2618.677108][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2618.689353][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2619.636815][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2619.645762][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2620.266815][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2620.274719][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2620.426131][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2620.431970][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2620.437845][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2620.443643][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:09:55 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r5 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x7d}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x2], 0x2, 0x33333333, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r7 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:09:55 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x8912, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) 01:09:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'veth1\x00', 0x8000}) r2 = socket$kcm(0x29, 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886440"], 0x90ad) 01:09:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x7e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/66, 0x42}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0xffffffff00000000, 0x0) 01:09:55 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r2 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000200)={'ip6gre0\x00', {0x2, 0x4e20, @broadcast}}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400283}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r3, 0x400, 0x70bd29, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast2, 0x8800, 0x0, 'sh\x00', 0x0, 0x10001, 0x66}, 0x2c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/mL\xcbcfilter\x00\x80\xab+\xb7\xf3\xa0\x1f\xc7\xb2+\xe3\x96\xf47\x89\xc3\x84\xf3\x1c\xf9\x8bW\x1d\x98\xde\xf2\x9d\xad_\xc0\xab\xd0/\xe4|1\'\x8c\x04u\xf5\x10\x9b\t\xdew\x17\xeb\xef\xe2\xd6\xa3u-\x82\x85`\xe5g~\x18\x11\x82\x00\x00\x00\x00\x00\x99\xc6\x90*:\xcf\x84~\x14\x00\x86G#i\xefa\xa4Q\xb0\xaf\xbb\xcc\x8b\xf1\x19\x16\x93\x1b\xae\x03\r\xbf\xa3}5Id,\xea\x1e\b\xeft\xed=0\xbe\x90F\xe1[\xc4\x92\xdcG\x01\x98%f9!r$\x85\xaa\xa3\xc5\x80\x0e\x9b\xf2\x8b\xe6:\xf1\x1e\x9ey\x1ahLw\x87\xa5\xaf\x91\x98\x1d\x01#f\x01JW\xcb!\x19\xb36\x8c\xd2k\xeb-\xc6[VKt\x93\x16<(\x15\xfexG#\f\x00\x04') preadv(r6, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) fstatfs(r6, &(0x7f0000000280)=""/20) close(r5) r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) setsockopt$inet6_buf(r7, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) connect$inet6(r7, &(0x7f0000000040)={0xa, 0x4e22, 0x1ff, @dev, 0x6}, 0x1c) splice(r4, 0x0, r5, 0x0, 0x100000002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r8 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f7ff"], 0x90ad) 01:09:55 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x100, 0x80) recvfrom$inet(r0, 0x0, 0xffffffffffffff2d, 0xa0002101, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='cpuset\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x6f0a77bd) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffcd) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000cc0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r6 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x100, r3, r5, 0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x7d}) r7 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)="c99d74", 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x7], 0x2, 0x400, 0x5, 0xfffffffffffffffd, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x40, 0x0, 0x3, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x4, 0x9e6d, 0x73d9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100}, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8, 0xc1f}, 0x0, 0xe, r1, 0x434c6ec92bcd5d3e) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000008}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r8 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r9 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r9) io_setup(0xa7e7, &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 01:09:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x980, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000040)={0x40003010}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000886400"], 0x90ad) [ 2623.238934][T31473] debugfs: File 'dropped' in directory 'loop0' already present! [ 2623.254222][T31473] debugfs: File 'msg' in directory 'loop0' already present! [ 2623.282263][T31473] debugfs: File 'trace0' in directory 'loop0' already present! [ 2623.360558][T31479] debugfs: File 'dropped' in directory 'loop0' already present! [ 2623.376823][T31479] debugfs: File 'msg' in directory 'loop0' already present! [ 2623.420735][T31585] device nr0 entered promiscuous mode [ 2623.796804][ C0] net_ratelimit: 12 callbacks suppressed [ 2623.796845][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2623.810369][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:09:56 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x8913, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) 01:09:56 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/n\xa5t/tun\x00', 0x41402, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x6, 0x81, 0xa7, 0x81, 0x0, 0x6, 0x92, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x5, @perf_config_ext={0x1000, 0xea}, 0x19ef0, 0x35, 0x287, 0x3d96b528d0dffb0e, 0x6, 0xfff00000, 0x6}, 0x0, 0x1, r6, 0x1) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000180)='nr\xde\xe9\xfaR?0\x01\x00IA\xc7^\x0e\xa4\xd6T\xf3\xca\x8bx)\xa2gg\xb3#\x0e\x80\xde\x97\xc3\xeav\x95h\x19\x89|\x7f\f\x05?\xd6\xdc\xbb\xdf') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f7ff"], 0x90ad) 01:09:56 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x40000, 0x0) write$P9_RREAD(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="e6000000750100db000000fe1df6d0894479acae145a49a0f805469ef934ef59a7a78873c57102000000d6d6a8d2b2bcb4601370b2a3b72478db0b8906adef5017a8717a73ed6ff400a53ad3776da80f1a21146abbfc277187ecc6002f440ff7dff579d51ca1e7aaf7bf5dec6d2939123e741d9a828b516d8ff86f179b7157a6ee9469db83eb3cfcf61f84ccf3bbb54820497aa2817bc8127e71b1eb2d58af256bde6efdf1efb7fbd160c64445c8d890d5ab86a8ff371885800838f4a2117194fcfece66445387d63f2bd1f681e781cdaa6d72cf0a0f4ddc4dc32ba54d59bf5c29070d9b81c9f117d7421583ce5c330cae17957d098abc527eb45a8385fd08312b8946b886abdda449646e0639d0c96754bb9bdc071ef2322efe400d559d16ec457b96403fd8265a6622f5c7"], 0xe6) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x101, 0xffff}, {0x2, 0x401}, {0x32, 0x1b}, {0x200, 0xa2}, {0x401, 0xfffc}, {0xffff, 0x101}, {0x7, 0xc98}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000f7ff"], 0x90ad) [ 2624.300245][T31798] device nr0 entered promiscuous mode [ 2624.405203][T31816] device nr0 entered promiscuous mode [ 2624.436916][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2624.443695][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2624.586082][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2624.592060][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2624.597969][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2624.603769][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:09:57 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/vcsa\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180), 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000340)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fsync(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(r4, 0x8914, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00l'}) [ 2624.917255][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2624.923994][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:09:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000000c0)=""/2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="01016400000c8097e26f1674b74b6b7dbd0236f6659671bfa8585da0bb1fad1a4c1b9c0941568533585dc2f3b1db9b75225c204f021b98cf942fd0a0a15b26000323135489620f139c7625b79d65853ca631d606a1576ab441b3368fed690ce129724b9d9716ed84754ac143986abd1f6f6976f1ed0b66d1e09e2725b9f39aa58eb7e964d1aa075071417c365da7e38a513ac9969dafb86d5a0af8133a934d5c045e496558488dae8a6e4d3030925fcf7123c46bc555"], 0x90ad) [ 2625.560137][T32007] device nr0 entered promiscuous mode [ 2629.066901][ C0] net_ratelimit: 18 callbacks suppressed [ 2629.066960][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2629.079450][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2630.026974][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2630.036222][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2630.667359][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2630.676337][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2630.826124][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2630.831979][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2630.837855][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2630.845174][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2634.187010][ C0] net_ratelimit: 12 callbacks suppressed [ 2634.187052][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2634.199929][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2634.826437][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2634.835221][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2634.986137][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2634.992015][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2634.997843][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2635.003604][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2635.306568][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2635.314542][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2639.471239][ C0] net_ratelimit: 18 callbacks suppressed [ 2639.471261][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2639.486026][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2640.427196][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2640.436437][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2641.068492][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2641.076408][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2641.226120][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2641.231954][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2641.237812][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2641.243592][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2644.586823][ C0] net_ratelimit: 12 callbacks suppressed [ 2644.586886][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2644.599119][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2645.226689][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.233887][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2645.386112][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.391981][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2645.397875][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.403682][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2645.707343][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.715629][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2649.866976][ C0] net_ratelimit: 18 callbacks suppressed [ 2649.867007][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2649.879732][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2650.826716][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2650.836365][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2651.467066][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2651.474990][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2651.626138][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2651.631995][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2651.637878][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2651.643653][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2654.987420][ C0] net_ratelimit: 12 callbacks suppressed [ 2654.987441][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2655.000016][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2655.627178][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2655.635425][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2655.786153][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2655.792042][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2655.798044][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2655.803820][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2656.106472][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2656.114458][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2660.266580][ C0] net_ratelimit: 18 callbacks suppressed [ 2660.266623][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2660.279134][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2661.227103][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2661.234915][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2661.867020][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2661.874796][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2662.026111][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2662.031952][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2662.037816][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2662.043592][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2665.387082][ C0] net_ratelimit: 12 callbacks suppressed [ 2665.387105][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2665.399888][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2666.026963][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2666.034280][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2666.186108][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2666.191941][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2666.197807][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2666.203583][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2666.507124][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2666.515176][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2670.666476][ C0] net_ratelimit: 18 callbacks suppressed [ 2670.666498][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2670.679113][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2671.626539][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2671.636054][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2672.267203][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2672.275348][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2672.426139][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2672.432011][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2672.437852][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2672.443625][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2675.786912][ C0] net_ratelimit: 12 callbacks suppressed [ 2675.786937][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2675.799517][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2676.427137][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2676.434714][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2676.586123][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2676.591979][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2676.597850][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2676.603607][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2676.907922][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2676.916352][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2681.067204][ C0] net_ratelimit: 18 callbacks suppressed [ 2681.067225][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2681.079660][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2682.026692][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2682.035646][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2682.667110][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2682.673896][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2682.826113][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2682.831947][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2682.837807][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2682.843587][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2686.187796][ C0] net_ratelimit: 12 callbacks suppressed [ 2686.187852][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2686.200216][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2686.827228][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2686.834911][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2686.986130][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2686.992012][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2686.997830][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2687.003618][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2687.307494][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2687.315774][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2691.467334][ C0] net_ratelimit: 18 callbacks suppressed [ 2691.467405][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2691.480158][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2692.426993][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2692.434881][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2693.066616][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2693.073883][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2693.226143][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2693.231993][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2693.237867][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2693.243627][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2696.587737][ C0] net_ratelimit: 12 callbacks suppressed [ 2696.587758][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2696.600475][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2697.227380][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2697.235245][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2697.386140][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2697.392054][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2697.397900][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2697.403699][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2697.707855][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2697.715644][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2701.866110][ C0] net_ratelimit: 18 callbacks suppressed [ 2701.866119][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2701.877645][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2702.826101][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2702.831967][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2703.466087][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2703.471950][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2703.627251][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2703.634784][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2703.642713][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2703.650007][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2706.986100][ C0] net_ratelimit: 12 callbacks suppressed [ 2706.986110][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2706.997657][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2707.626085][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2707.631920][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2707.787003][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2707.794621][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2707.801600][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2707.808572][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2708.106087][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2708.111948][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2712.266085][ C0] net_ratelimit: 18 callbacks suppressed [ 2712.266093][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2712.277812][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2713.226074][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2713.231930][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2713.866085][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2713.871934][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2714.027614][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2714.036061][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2714.044191][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2714.051099][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2717.386085][ C0] net_ratelimit: 12 callbacks suppressed [ 2717.386093][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2717.397616][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2718.026522][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2718.032374][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2718.187030][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2718.196116][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2718.206119][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2718.215415][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2718.506131][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2718.512010][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2722.666075][ C0] net_ratelimit: 18 callbacks suppressed [ 2722.666084][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2722.677622][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2723.626090][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2723.631972][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2724.266070][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2724.271908][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2724.427797][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2724.436268][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2724.444108][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2724.451015][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2727.786069][ C0] net_ratelimit: 12 callbacks suppressed [ 2727.786078][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2727.797609][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2728.426081][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2728.432014][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2728.586745][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2728.593251][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2728.600070][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2728.606301][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2728.786335][ T9085] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2728.841266][ T9085] CPU: 0 PID: 9085 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 2728.849551][ T9085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2728.859606][ T9085] Call Trace: [ 2728.862908][ T9085] dump_stack+0x197/0x210 [ 2728.867244][ T9085] dump_header+0x10b/0x82d [ 2728.871683][ T9085] ? oom_kill_process+0x94/0x420 [ 2728.876620][ T9085] oom_kill_process.cold+0x10/0x15 [ 2728.881851][ T9085] out_of_memory+0x334/0x13c0 [ 2728.886552][ T9085] ? oom_killer_disable+0x280/0x280 [ 2728.891754][ T9085] ? mutex_trylock+0x264/0x2f0 [ 2728.896526][ T9085] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2728.902164][ T9085] __alloc_pages_slowpath+0x222b/0x2920 [ 2728.907732][ T9085] ? warn_alloc+0x110/0x110 [ 2728.912343][ T9085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2728.918589][ T9085] ? should_fail+0x1de/0x852 [ 2728.923191][ T9085] ? __kasan_check_read+0x11/0x20 [ 2728.928225][ T9085] __alloc_pages_nodemask+0x646/0x910 [ 2728.933602][ T9085] ? xas_descend+0x144/0x370 [ 2728.938973][ T9085] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2728.944693][ T9085] ? __kasan_check_read+0x11/0x20 [ 2728.949733][ T9085] ? find_get_entry+0x4a6/0x7a0 [ 2728.954587][ T9085] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2728.960834][ T9085] alloc_pages_current+0x107/0x210 [ 2728.965950][ T9085] __page_cache_alloc+0x29d/0x490 [ 2728.970977][ T9085] pagecache_get_page+0x27e/0x9e0 [ 2728.976002][ T9085] ? __kasan_check_read+0x11/0x20 [ 2728.981040][ T9085] filemap_fault+0x9b1/0x3180 [ 2728.985719][ T9085] ? mark_held_locks+0xf0/0xf0 [ 2728.990493][ T9085] ? read_cache_page_gfp+0x30/0x30 [ 2728.995609][ T9085] ? __kasan_check_write+0x14/0x20 [ 2729.000730][ T9085] ? down_read+0x109/0x430 [ 2729.005161][ T9085] ? down_read_killable+0x490/0x490 [ 2729.010383][ T9085] ? find_lock_entry+0x650/0x650 [ 2729.015324][ T9085] ? pmd_val+0x85/0x100 [ 2729.019484][ T9085] ext4_filemap_fault+0x86/0xb2 [ 2729.024334][ T9085] __do_fault+0x111/0x540 [ 2729.028673][ T9085] __handle_mm_fault+0x2943/0x3da0 [ 2729.033788][ T9085] ? vm_iomap_memory+0x1a0/0x1a0 [ 2729.038726][ T9085] ? handle_mm_fault+0x292/0xa50 [ 2729.043679][ T9085] ? handle_mm_fault+0x7a0/0xa50 [ 2729.048616][ T9085] ? __kasan_check_read+0x11/0x20 [ 2729.053645][ T9085] handle_mm_fault+0x3b2/0xa50 [ 2729.058422][ T9085] __do_page_fault+0x536/0xd80 [ 2729.063183][ T9085] ? page_fault+0x16/0x40 [ 2729.067537][ T9085] do_page_fault+0x38/0x590 [ 2729.072041][ T9085] page_fault+0x39/0x40 [ 2729.076190][ T9085] RIP: 0033:0x459f50 [ 2729.080092][ T9085] Code: Bad RIP value. [ 2729.084151][ T9085] RSP: 002b:000000c42f89ba90 EFLAGS: 00010213 [ 2729.090212][ T9085] RAX: 000000c4203bc120 RBX: 0000000000000000 RCX: 000000c420000180 [ 2729.098180][ T9085] RDX: 0000026a0d9d20d4 RSI: 3f742e72ec966f2f RDI: 00007ffe2aded080 [ 2729.106775][ T9085] RBP: 000000c42f89bc00 R08: 00007ffe2aded090 R09: 0000000000084082 [ 2729.114745][ T9085] R10: 000000c42f89b9e8 R11: 000000c42f89b9e0 R12: 000000c42f89bb98 [ 2729.122719][ T9085] R13: 000000c42f89bb98 R14: 0000000000000000 R15: 0000000000000000 [ 2729.130941][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2729.136863][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2730.295865][ T9085] Mem-Info: [ 2730.307212][ T9085] active_anon:185409 inactive_anon:4304 isolated_anon:0 [ 2730.307212][ T9085] active_file:10 inactive_file:656 isolated_file:0 [ 2730.307212][ T9085] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2730.307212][ T9085] slab_reclaimable:12426 slab_unreclaimable:90575 [ 2730.307212][ T9085] mapped:52226 shmem:4382 pagetables:3896 bounce:0 [ 2730.307212][ T9085] free:25246 free_pcp:0 free_cma:0 [ 2730.509709][ T9085] Node 0 active_anon:741632kB inactive_anon:17216kB active_file:40kB inactive_file:2476kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 569344kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2730.669840][ T9085] Node 1 active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2730.814846][ T9085] Node 0 DMA free:10368kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2730.926144][ T9085] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2730.931948][ T9085] Node 0 DMA32 free:36432kB min:52488kB low:61512kB high:70536kB reserved_highatomic:2048KB active_anon:741632kB inactive_anon:17216kB active_file:140kB inactive_file:2464kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10608kB pagetables:15580kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2731.116046][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2731.120796][ T9085] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2731.246300][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2731.251037][ T9085] Node 1 Normal free:53756kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2731.335580][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2731.356156][ T9085] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 1*128kB (U) 0*256kB 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10368kB [ 2731.408137][ T9085] Node 0 DMA32: 2892*4kB (UME) 1460*8kB (UME) 422*16kB (UME) 127*32kB (UME) 14*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 34960kB [ 2731.484940][ T9085] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2731.538734][ T9085] Node 1 Normal: 2*4kB (UM) 5*8kB (UME) 4*16kB (UME) 4*32kB (UME) 5*64kB (UME) 0*128kB 2*256kB (ME) 1*512kB (U) 1*1024kB (M) 1*2048kB (M) 12*4096kB (UM) = 53808kB [ 2731.622932][ T9085] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2731.682851][ T9085] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2731.738357][ T9085] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2731.778728][ T9085] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2731.842835][ T9085] 5075 total pagecache pages [ 2731.871952][ T9085] 0 pages in swap cache [ 2731.891132][ T9085] Swap cache stats: add 0, delete 0, find 0/0 [ 2731.920613][ T9085] Free swap = 0kB [ 2731.924400][ T9085] Total swap = 0kB [ 2731.960942][ T9085] 1965979 pages RAM [ 2731.964805][ T9085] 0 pages HighMem/MovableOnly [ 2732.011950][ T9085] 344068 pages reserved [ 2732.027247][ T9085] 0 pages cma reserved [ 2732.031423][ T9085] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=3551,uid=0 [ 2732.132823][ T9085] Out of memory: Killed process 3551 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:172032kB oom_score_adj:1000 [ 2732.217263][ T1097] oom_reaper: reaped process 3551 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2732.731816][ T8958] rsyslogd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2732.776596][ T8958] CPU: 1 PID: 8958 Comm: rsyslogd Not tainted 5.5.0-rc1-syzkaller #0 [ 2732.784738][ T8958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2732.794810][ T8958] Call Trace: [ 2732.798121][ T8958] dump_stack+0x197/0x210 [ 2732.802468][ T8958] dump_header+0x10b/0x82d [ 2732.806885][ T8958] ? oom_kill_process+0x94/0x420 [ 2732.811822][ T8958] oom_kill_process.cold+0x10/0x15 [ 2732.816939][ T8958] out_of_memory+0x334/0x13c0 [ 2732.821624][ T8958] ? oom_killer_disable+0x280/0x280 [ 2732.826823][ T8958] ? mutex_trylock+0x264/0x2f0 [ 2732.831583][ T8958] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2732.837217][ T8958] __alloc_pages_slowpath+0x222b/0x2920 [ 2732.842864][ T8958] ? warn_alloc+0x110/0x110 [ 2732.847392][ T8958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2732.853631][ T8958] ? should_fail+0x1de/0x852 [ 2732.858252][ T8958] ? __kasan_check_read+0x11/0x20 [ 2732.863438][ T8958] __alloc_pages_nodemask+0x646/0x910 [ 2732.868844][ T8958] ? xas_descend+0x144/0x370 [ 2732.873450][ T8958] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2732.879171][ T8958] ? __kasan_check_read+0x11/0x20 [ 2732.884208][ T8958] ? find_get_entry+0x4a6/0x7a0 [ 2732.889063][ T8958] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2732.895308][ T8958] alloc_pages_current+0x107/0x210 [ 2732.900429][ T8958] __page_cache_alloc+0x29d/0x490 [ 2732.905463][ T8958] pagecache_get_page+0x27e/0x9e0 [ 2732.910491][ T8958] ? __kasan_check_read+0x11/0x20 [ 2732.915518][ T8958] filemap_fault+0x9b1/0x3180 [ 2732.920756][ T8958] ? mark_held_locks+0xf0/0xf0 [ 2732.925534][ T8958] ? read_cache_page_gfp+0x30/0x30 [ 2732.930658][ T8958] ? __kasan_check_write+0x14/0x20 [ 2732.935768][ T8958] ? down_read+0x109/0x430 [ 2732.940262][ T8958] ? down_read_killable+0x490/0x490 [ 2732.945472][ T8958] ? find_lock_entry+0x650/0x650 [ 2732.950412][ T8958] ? pmd_val+0x85/0x100 [ 2732.954607][ T8958] ext4_filemap_fault+0x86/0xb2 [ 2732.959465][ T8958] __do_fault+0x111/0x540 [ 2732.963818][ T8958] __handle_mm_fault+0x2943/0x3da0 [ 2732.968934][ T8958] ? vm_iomap_memory+0x1a0/0x1a0 [ 2732.973871][ T8958] ? handle_mm_fault+0x292/0xa50 [ 2732.978826][ T8958] ? handle_mm_fault+0x7a0/0xa50 [ 2732.983772][ T8958] ? __kasan_check_read+0x11/0x20 [ 2732.988834][ T8958] handle_mm_fault+0x3b2/0xa50 [ 2732.993632][ T8958] __do_page_fault+0x536/0xd80 [ 2732.998602][ T8958] ? page_fault+0x16/0x40 [ 2733.002940][ T8958] do_page_fault+0x38/0x590 [ 2733.007446][ T8958] page_fault+0x39/0x40 [ 2733.011599][ T8958] RIP: 0033:0x7f85c97be1fd [ 2733.016037][ T8958] Code: Bad RIP value. [ 2733.020110][ T8958] RSP: 002b:00007f85c6d5de30 EFLAGS: 00010293 [ 2733.026173][ T8958] RAX: 00000000000000c5 RBX: 0000000000f0b170 RCX: 00007f85c97be1fd [ 2733.034143][ T8958] RDX: 0000000000000fff RSI: 00007f85c85925a0 RDI: 0000000000000004 [ 2733.042112][ T8958] RBP: 0000000000000000 R08: 0000000000ef6260 R09: 0000000004000001 [ 2733.050167][ T8958] R10: 0000000000000001 R11: 0000000000000293 R12: 000000000065e420 [ 2733.058149][ T8958] R13: 00007f85c6d5e9c0 R14: 00007f85c9e03040 R15: 0000000000000003 [ 2733.237123][ C0] net_ratelimit: 18 callbacks suppressed [ 2733.237174][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2733.249646][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2734.026825][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2734.033509][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2734.225995][ T8958] Mem-Info: [ 2734.229191][ T8958] active_anon:184863 inactive_anon:4304 isolated_anon:0 [ 2734.229191][ T8958] active_file:11 inactive_file:658 isolated_file:0 [ 2734.229191][ T8958] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2734.229191][ T8958] slab_reclaimable:12426 slab_unreclaimable:92372 [ 2734.229191][ T8958] mapped:52226 shmem:4382 pagetables:3861 bounce:0 [ 2734.229191][ T8958] free:23958 free_pcp:109 free_cma:0 [ 2734.273790][ T8958] Node 0 active_anon:739448kB inactive_anon:17216kB active_file:40kB inactive_file:2632kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 567296kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2734.309470][ T8958] Node 1 active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2734.391154][ T8958] Node 0 DMA free:10368kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2734.546096][ T8958] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2734.551884][ T8958] Node 0 DMA32 free:30876kB min:62728kB low:71752kB high:80776kB reserved_highatomic:0KB active_anon:739448kB inactive_anon:17216kB active_file:4kB inactive_file:2604kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10576kB pagetables:15440kB bounce:0kB free_pcp:388kB local_pcp:212kB free_cma:0kB [ 2734.628890][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2734.633653][ T8958] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2734.666065][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2734.671953][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2734.705727][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2734.730088][ T8958] Node 1 Normal free:53256kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:12kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2734.827493][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2734.834619][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2734.842659][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2734.849216][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2734.852651][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2734.859763][ T8958] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2734.910537][ T8958] Node 0 DMA32: 2787*4kB (UME) 1282*8kB (UME) 332*16kB (UME) 100*32kB (UME) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 29980kB [ 2734.976152][ T8958] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2735.041285][ T8958] Node 1 Normal: 2*4kB (UM) 5*8kB (UME) 4*16kB (UME) 4*32kB (UME) 4*64kB (ME) 0*128kB 2*256kB (ME) 0*512kB 1*1024kB (M) 1*2048kB (M) 12*4096kB (UM) = 53232kB [ 2735.074909][ T8958] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2735.106009][ T8958] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2735.115334][ T8958] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2735.200905][ T8958] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2735.246128][ T8958] 5075 total pagecache pages [ 2735.250767][ T8958] 0 pages in swap cache [ 2735.254919][ T8958] Swap cache stats: add 0, delete 0, find 0/0 [ 2735.272951][ T8958] Free swap = 0kB [ 2735.276739][ T8958] Total swap = 0kB [ 2735.280469][ T8958] 1965979 pages RAM [ 2735.284270][ T8958] 0 pages HighMem/MovableOnly [ 2735.321825][ T8958] 344068 pages reserved [ 2735.344583][ T8958] 0 pages cma reserved [ 2735.363008][ T8958] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=957,uid=0 [ 2735.437166][ T8958] Out of memory: Killed process 957 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:172032kB oom_score_adj:1000 [ 2735.483202][ T1097] oom_reaper: reaped process 957 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2735.672409][ T9085] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2735.712120][ T9085] CPU: 0 PID: 9085 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 2735.720412][ T9085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2735.730471][ T9085] Call Trace: [ 2735.733768][ T9085] dump_stack+0x197/0x210 [ 2735.738129][ T9085] dump_header+0x10b/0x82d [ 2735.742572][ T9085] ? oom_kill_process+0x94/0x420 [ 2735.747516][ T9085] oom_kill_process.cold+0x10/0x15 [ 2735.752802][ T9085] out_of_memory+0x334/0x13c0 [ 2735.757491][ T9085] ? oom_killer_disable+0x280/0x280 [ 2735.762703][ T9085] ? mutex_trylock+0x264/0x2f0 [ 2735.767467][ T9085] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2735.773100][ T9085] __alloc_pages_slowpath+0x222b/0x2920 [ 2735.778663][ T9085] ? warn_alloc+0x110/0x110 [ 2735.783956][ T9085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2735.790197][ T9085] ? should_fail+0x1de/0x852 [ 2735.794793][ T9085] ? __kasan_check_read+0x11/0x20 [ 2735.799819][ T9085] __alloc_pages_nodemask+0x646/0x910 [ 2735.805205][ T9085] ? xas_descend+0x144/0x370 [ 2735.809796][ T9085] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2735.815511][ T9085] ? __kasan_check_read+0x11/0x20 [ 2735.820538][ T9085] ? find_get_entry+0x4a6/0x7a0 [ 2735.825393][ T9085] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2735.831642][ T9085] alloc_pages_current+0x107/0x210 [ 2735.836767][ T9085] __page_cache_alloc+0x29d/0x490 [ 2735.841796][ T9085] pagecache_get_page+0x27e/0x9e0 [ 2735.846827][ T9085] ? __kasan_check_read+0x11/0x20 [ 2735.851857][ T9085] filemap_fault+0x9b1/0x3180 [ 2735.856556][ T9085] ? mark_held_locks+0xf0/0xf0 [ 2735.861336][ T9085] ? read_cache_page_gfp+0x30/0x30 [ 2735.866452][ T9085] ? __kasan_check_write+0x14/0x20 [ 2735.871560][ T9085] ? down_read+0x109/0x430 [ 2735.876073][ T9085] ? down_read_killable+0x490/0x490 [ 2735.881272][ T9085] ? find_lock_entry+0x650/0x650 [ 2735.886233][ T9085] ? pmd_val+0x85/0x100 [ 2735.890410][ T9085] ext4_filemap_fault+0x86/0xb2 [ 2735.895264][ T9085] __do_fault+0x111/0x540 [ 2735.899592][ T9085] __handle_mm_fault+0x2943/0x3da0 [ 2735.904791][ T9085] ? vm_iomap_memory+0x1a0/0x1a0 [ 2735.909750][ T9085] ? handle_mm_fault+0x292/0xa50 [ 2735.914712][ T9085] ? handle_mm_fault+0x7a0/0xa50 [ 2735.919688][ T9085] ? __kasan_check_read+0x11/0x20 [ 2735.924750][ T9085] handle_mm_fault+0x3b2/0xa50 [ 2735.929529][ T9085] __do_page_fault+0x536/0xd80 [ 2735.934296][ T9085] ? page_fault+0x16/0x40 [ 2735.938632][ T9085] do_page_fault+0x38/0x590 [ 2735.943145][ T9085] page_fault+0x39/0x40 [ 2735.947297][ T9085] RIP: 0033:0x459f50 [ 2735.951198][ T9085] Code: Bad RIP value. [ 2735.955258][ T9085] RSP: 002b:000000c42f89ba90 EFLAGS: 00010213 [ 2735.961361][ T9085] RAX: 000000c4203bc120 RBX: 0000000000000000 RCX: 000000c420000180 [ 2735.969348][ T9085] RDX: 0000026a0d9d20d4 RSI: 3f742e72ec966f2f RDI: 00007ffe2aded080 [ 2735.977317][ T9085] RBP: 000000c42f89bc00 R08: 00007ffe2aded090 R09: 0000000000084082 [ 2735.985288][ T9085] R10: 000000c42f89b9e8 R11: 000000c42f89b9e0 R12: 000000c42f89bb98 [ 2735.993255][ T9085] R13: 000000c42f89bb98 R14: 0000000000000000 R15: 0000000000000000 [ 2736.061830][ T9085] Mem-Info: [ 2736.065031][ T9085] active_anon:184317 inactive_anon:4304 isolated_anon:0 [ 2736.065031][ T9085] active_file:9 inactive_file:632 isolated_file:10 [ 2736.065031][ T9085] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2736.065031][ T9085] slab_reclaimable:12426 slab_unreclaimable:93909 [ 2736.065031][ T9085] mapped:52226 shmem:4382 pagetables:3826 bounce:0 [ 2736.065031][ T9085] free:23001 free_pcp:131 free_cma:0 [ 2736.278826][ T9085] Node 0 active_anon:737264kB inactive_anon:17216kB active_file:24kB inactive_file:2408kB unevictable:0kB isolated(anon):0kB isolated(file):256kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 565248kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2736.432105][ T9085] Node 1 active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2736.565896][ T9085] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2736.656081][ T9085] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2736.661869][ T9085] Node 0 DMA32 free:26216kB min:52488kB low:61512kB high:70536kB reserved_highatomic:0KB active_anon:737264kB inactive_anon:17216kB active_file:24kB inactive_file:2660kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10544kB pagetables:15300kB bounce:0kB free_pcp:684kB local_pcp:464kB free_cma:0kB [ 2736.737681][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2736.742433][ T9085] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2736.862385][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2736.883351][ T9085] Node 1 Normal free:52456kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2737.001708][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2737.009575][ T9085] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2737.037206][ T9085] Node 0 DMA32: 2724*4kB (UME) 1036*8kB (ME) 269*16kB (UME) 84*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 26176kB [ 2737.097481][ T9085] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2737.146034][ T9085] Node 1 Normal: 2*4kB (UM) 5*8kB (UME) 4*16kB (UME) 4*32kB (UME) 4*64kB (ME) 1*128kB (U) 3*256kB (UME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 11*4096kB (UM) = 51568kB [ 2737.185207][ T9085] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2737.223624][ T9085] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2737.261439][ T9085] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2737.306001][ T9085] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2737.315344][ T9085] 5075 total pagecache pages [ 2737.361904][ T9085] 0 pages in swap cache [ 2737.373385][ T9085] Swap cache stats: add 0, delete 0, find 0/0 [ 2737.416067][ T9085] Free swap = 0kB [ 2737.419844][ T9085] Total swap = 0kB [ 2737.423558][ T9085] 1965979 pages RAM [ 2737.466071][ T9085] 0 pages HighMem/MovableOnly [ 2737.470790][ T9085] 344068 pages reserved [ 2737.474937][ T9085] 0 pages cma reserved [ 2737.533746][ T9085] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=32471,uid=0 [ 2737.554082][ T9085] Out of memory: Killed process 32471 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:172032kB oom_score_adj:1000 [ 2737.675702][ T8591] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2737.724192][ T8591] CPU: 0 PID: 8591 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 2737.732478][ T8591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2737.742534][ T8591] Call Trace: [ 2737.745833][ T8591] dump_stack+0x197/0x210 [ 2737.750170][ T8591] dump_header+0x10b/0x82d [ 2737.754584][ T8591] ? oom_kill_process+0x94/0x420 [ 2737.759520][ T8591] oom_kill_process.cold+0x10/0x15 [ 2737.764629][ T8591] out_of_memory+0x334/0x13c0 [ 2737.769308][ T8591] ? oom_killer_disable+0x280/0x280 [ 2737.774511][ T8591] ? mutex_trylock+0x264/0x2f0 [ 2737.779272][ T8591] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2737.784907][ T8591] __alloc_pages_slowpath+0x222b/0x2920 [ 2737.790474][ T8591] ? warn_alloc+0x110/0x110 [ 2737.794980][ T8591] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2737.801228][ T8591] ? should_fail+0x1de/0x852 [ 2737.805823][ T8591] ? __kasan_check_read+0x11/0x20 [ 2737.810850][ T8591] __alloc_pages_nodemask+0x646/0x910 [ 2737.816223][ T8591] ? xas_descend+0x144/0x370 [ 2737.820814][ T8591] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2737.826530][ T8591] ? __kasan_check_read+0x11/0x20 [ 2737.831558][ T8591] ? find_get_entry+0x4a6/0x7a0 [ 2737.836410][ T8591] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2737.842654][ T8591] alloc_pages_current+0x107/0x210 [ 2737.847774][ T8591] __page_cache_alloc+0x29d/0x490 [ 2737.852810][ T8591] pagecache_get_page+0x27e/0x9e0 [ 2737.857836][ T8591] ? __kasan_check_read+0x11/0x20 [ 2737.863559][ T8591] filemap_fault+0x9b1/0x3180 [ 2737.868233][ T8591] ? mark_held_locks+0xf0/0xf0 [ 2737.873060][ T8591] ? read_cache_page_gfp+0x30/0x30 [ 2737.878179][ T8591] ? __kasan_check_write+0x14/0x20 [ 2737.883544][ T8591] ? down_read+0x109/0x430 [ 2737.887959][ T8591] ? down_read_killable+0x490/0x490 [ 2737.893165][ T8591] ? find_lock_entry+0x650/0x650 [ 2737.898101][ T8591] ? pmd_val+0x85/0x100 [ 2737.902264][ T8591] ext4_filemap_fault+0x86/0xb2 [ 2737.907122][ T8591] __do_fault+0x111/0x540 [ 2737.911458][ T8591] __handle_mm_fault+0x2943/0x3da0 [ 2737.916575][ T8591] ? vm_iomap_memory+0x1a0/0x1a0 [ 2737.921514][ T8591] ? handle_mm_fault+0x292/0xa50 [ 2737.926457][ T8591] ? handle_mm_fault+0x7a0/0xa50 [ 2737.931394][ T8591] ? __kasan_check_read+0x11/0x20 [ 2737.936428][ T8591] handle_mm_fault+0x3b2/0xa50 [ 2737.941195][ T8591] __do_page_fault+0x536/0xd80 [ 2737.945975][ T8591] do_page_fault+0x38/0x590 [ 2737.950487][ T8591] page_fault+0x39/0x40 [ 2737.954635][ T8591] RIP: 0033:0x40f9c0 [ 2737.958713][ T8591] Code: Bad RIP value. [ 2737.962770][ T8591] RSP: 002b:000000c420025ef8 EFLAGS: 00010216 [ 2737.968856][ T8591] RAX: ffffffffffffff92 RBX: 000000001dde88c3 RCX: 000000000045ddf3 [ 2737.976825][ T8591] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000191fa20 [ 2737.984789][ T8591] RBP: 000000c420025f20 R08: 0000000000000000 R09: 0000000000000000 [ 2737.992758][ T8591] R10: 000000c420025ed8 R11: 0000000000000206 R12: 0000000000000001 [ 2738.001681][ T8591] R13: 0000000000000020 R14: 0000000000000013 R15: 0000000000000004 [ 2738.145496][ T8591] Mem-Info: [ 2738.168973][ T8591] active_anon:183771 inactive_anon:4304 isolated_anon:0 [ 2738.168973][ T8591] active_file:21 inactive_file:644 isolated_file:0 [ 2738.168973][ T8591] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2738.168973][ T8591] slab_reclaimable:12426 slab_unreclaimable:95682 [ 2738.168973][ T8591] mapped:52226 shmem:4382 pagetables:3791 bounce:0 [ 2738.168973][ T8591] free:21677 free_pcp:272 free_cma:0 [ 2738.253458][ T8591] Node 0 active_anon:735080kB inactive_anon:17216kB active_file:0kB inactive_file:2556kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 563200kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2738.300877][ T8591] Node 1 active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2738.415212][ T8591] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2738.467940][ T8591] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2738.473734][ T8591] Node 0 DMA32 free:26176kB min:52488kB low:61512kB high:70536kB reserved_highatomic:0KB active_anon:735080kB inactive_anon:17216kB active_file:8kB inactive_file:2596kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10512kB pagetables:15160kB bounce:0kB free_pcp:784kB local_pcp:44kB free_cma:0kB [ 2738.690088][ T8591] lowmem_reserve[]: 0 0 0 0 0 [ 2738.694873][ T8591] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2738.764564][ T8591] lowmem_reserve[]: 0 0 0 0 0 [ 2738.783537][ T8591] Node 1 Normal free:48364kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:12kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:252kB local_pcp:252kB free_cma:0kB [ 2738.826091][ C0] net_ratelimit: 14 callbacks suppressed [ 2738.826100][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2738.837605][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2738.909380][ T8591] lowmem_reserve[]: 0 0 0 0 0 [ 2738.914138][ T8591] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2738.935709][ T8591] Node 0 DMA32: 2724*4kB (UME) 1039*8kB (UME) 266*16kB (ME) 81*32kB (UM) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 26120kB [ 2738.965173][ T8591] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2738.987298][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2738.994104][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2739.002005][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2739.007984][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2739.015269][ T8591] Node 1 Normal: 1*4kB (M) 5*8kB (UME) 3*16kB (ME) 3*32kB (ME) 4*64kB (ME) 0*128kB 2*256kB (ME) 1*512kB (U) 1*1024kB (M) 2*2048kB (UM) 10*4096kB (UM) = 47548kB [ 2739.047740][ T8591] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2739.057455][ T8591] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2739.087014][ T8591] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2739.113097][ T8591] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2739.140788][ T8591] 5075 total pagecache pages [ 2739.145477][ T8591] 0 pages in swap cache [ 2739.177908][ T8591] Swap cache stats: add 0, delete 0, find 0/0 [ 2739.184144][ T8591] Free swap = 0kB [ 2739.236042][ T8591] Total swap = 0kB [ 2739.239822][ T8591] 1965979 pages RAM [ 2739.243637][ T8591] 0 pages HighMem/MovableOnly [ 2739.296096][ T8591] 344068 pages reserved [ 2739.300295][ T8591] 0 pages cma reserved [ 2739.304409][ T8591] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=31699,uid=0 [ 2739.351873][ T8591] Out of memory: Killed process 31699 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:172032kB oom_score_adj:1000 [ 2739.476110][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2739.482007][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2739.516182][ T1] init invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2739.540414][ T1] CPU: 0 PID: 1 Comm: init Not tainted 5.5.0-rc1-syzkaller #0 [ 2739.547947][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2739.558168][ T1] Call Trace: [ 2739.561471][ T1] dump_stack+0x197/0x210 [ 2739.565810][ T1] dump_header+0x10b/0x82d [ 2739.570378][ T1] ? oom_kill_process+0x94/0x420 [ 2739.575367][ T1] oom_kill_process.cold+0x10/0x15 [ 2739.580501][ T1] out_of_memory+0x334/0x13c0 [ 2739.585188][ T1] ? oom_killer_disable+0x280/0x280 [ 2739.590528][ T1] ? mutex_trylock+0x264/0x2f0 [ 2739.595298][ T1] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2739.600942][ T1] __alloc_pages_slowpath+0x222b/0x2920 [ 2739.606522][ T1] ? warn_alloc+0x110/0x110 [ 2739.611734][ T1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2739.618100][ T1] ? should_fail+0x1de/0x852 [ 2739.622730][ T1] ? __kasan_check_read+0x11/0x20 [ 2739.627918][ T1] __alloc_pages_nodemask+0x646/0x910 [ 2739.633303][ T1] ? xas_descend+0x144/0x370 [ 2739.637920][ T1] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2739.643645][ T1] ? __kasan_check_read+0x11/0x20 [ 2739.648682][ T1] ? find_get_entry+0x4a6/0x7a0 [ 2739.653641][ T1] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2739.659898][ T1] alloc_pages_current+0x107/0x210 [ 2739.665039][ T1] __page_cache_alloc+0x29d/0x490 [ 2739.670072][ T1] pagecache_get_page+0x27e/0x9e0 [ 2739.675105][ T1] ? __kasan_check_read+0x11/0x20 [ 2739.680138][ T1] filemap_fault+0x9b1/0x3180 [ 2739.684815][ T1] ? mark_held_locks+0xf0/0xf0 [ 2739.689601][ T1] ? read_cache_page_gfp+0x30/0x30 [ 2739.694718][ T1] ? __kasan_check_write+0x14/0x20 [ 2739.699826][ T1] ? down_read+0x109/0x430 [ 2739.704238][ T1] ? down_read_killable+0x490/0x490 [ 2739.709436][ T1] ? lock_downgrade+0x920/0x920 [ 2739.714292][ T1] ext4_filemap_fault+0x86/0xb2 [ 2739.719150][ T1] __do_fault+0x111/0x540 [ 2739.723480][ T1] ? do_raw_spin_unlock+0x178/0x270 [ 2739.728709][ T1] __handle_mm_fault+0x2943/0x3da0 [ 2739.733827][ T1] ? vm_iomap_memory+0x1a0/0x1a0 [ 2739.738764][ T1] ? handle_mm_fault+0x292/0xa50 [ 2739.743706][ T1] ? handle_mm_fault+0x7a0/0xa50 [ 2739.748638][ T1] ? __kasan_check_read+0x11/0x20 [ 2739.753669][ T1] handle_mm_fault+0x3b2/0xa50 [ 2739.758449][ T1] __do_page_fault+0x536/0xd80 [ 2739.763388][ T1] ? page_fault+0x16/0x40 [ 2739.767723][ T1] do_page_fault+0x38/0x590 [ 2739.772227][ T1] page_fault+0x39/0x40 [ 2739.776378][ T1] RIP: 0033:0x4059bb [ 2739.780277][ T1] Code: Bad RIP value. [ 2739.784338][ T1] RSP: 002b:00007fffc1dc2290 EFLAGS: 00010202 [ 2739.790399][ T1] RAX: 0000000000000000 RBX: 00007fffc1dc23b0 RCX: 00007f05668f4dd3 [ 2739.798455][ T1] RDX: 0000000000000000 RSI: 00007fffc1dc21c0 RDI: 000000000000000b [ 2739.806425][ T1] RBP: 0000000000000000 R08: 00007fffc1dc2240 R09: 0000000000000001 [ 2739.814393][ T1] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2739.822363][ T1] R13: 00007fffc1dc25a0 R14: 0000000000000000 R15: 0000000000000000 [ 2740.102958][ T1] Mem-Info: [ 2740.106207][ T1] active_anon:183225 inactive_anon:4304 isolated_anon:0 [ 2740.106207][ T1] active_file:20 inactive_file:633 isolated_file:32 [ 2740.106207][ T1] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2740.106207][ T1] slab_reclaimable:12426 slab_unreclaimable:97305 [ 2740.106207][ T1] mapped:52226 shmem:4382 pagetables:3756 bounce:0 [ 2740.106207][ T1] free:20576 free_pcp:355 free_cma:0 [ 2740.176933][ T1] Node 0 active_anon:732896kB inactive_anon:17216kB active_file:76kB inactive_file:2532kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 561152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2740.266084][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2740.271941][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2740.302774][ T1] Node 1 active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2740.437049][ T1] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2740.588026][ T1] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2740.594087][ T1] Node 0 DMA32 free:26244kB min:52488kB low:61512kB high:70536kB reserved_highatomic:0KB active_anon:732896kB inactive_anon:17216kB active_file:76kB inactive_file:2592kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10480kB pagetables:15020kB bounce:0kB free_pcp:1088kB local_pcp:92kB free_cma:0kB [ 2740.750953][ T1] lowmem_reserve[]: 0 0 0 0 0 [ 2740.755712][ T1] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2740.909944][ T1] lowmem_reserve[]: 0 0 0 0 0 [ 2740.914694][ T1] Node 1 Normal free:42876kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:252kB local_pcp:252kB free_cma:0kB [ 2741.009360][ T1] lowmem_reserve[]: 0 0 0 0 0 [ 2741.014101][ T1] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2741.068775][ T1] Node 0 DMA32: 2661*4kB (UME) 1036*8kB (ME) 267*16kB (UME) 80*32kB (M) 0*64kB 1*128kB (U) 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 26148kB [ 2741.140181][ T1] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2741.201606][ T1] Node 1 Normal: 1*4kB (M) 4*8kB (ME) 4*16kB (UME) 4*32kB (UME) 5*64kB (UME) 0*128kB 2*256kB (ME) 0*512kB 2*1024kB (UM) 1*2048kB (M) 9*4096kB (UM) = 42020kB [ 2741.234153][ T1] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2741.251013][ T1] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2741.293250][ T1] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2741.342038][ T1] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2741.394226][ T1] 5075 total pagecache pages [ 2741.420931][ T1] 0 pages in swap cache [ 2741.425134][ T1] Swap cache stats: add 0, delete 0, find 0/0 [ 2741.452804][ T1] Free swap = 0kB [ 2741.484829][ T1] Total swap = 0kB [ 2741.488874][ T1] 1965979 pages RAM [ 2741.492682][ T1] 0 pages HighMem/MovableOnly [ 2741.504349][ T1] 344068 pages reserved [ 2741.518302][ T1] 0 pages cma reserved [ 2741.522441][ T1] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=29387,uid=0 [ 2741.590464][ T1] Out of memory: Killed process 29387 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:172032kB oom_score_adj:1000 [ 2741.688671][ T8591] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2741.747234][ T8591] CPU: 0 PID: 8591 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 2741.755526][ T8591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2741.765588][ T8591] Call Trace: [ 2741.768891][ T8591] dump_stack+0x197/0x210 [ 2741.773229][ T8591] dump_header+0x10b/0x82d [ 2741.777652][ T8591] ? oom_kill_process+0x94/0x420 [ 2741.782595][ T8591] oom_kill_process.cold+0x10/0x15 [ 2741.787737][ T8591] out_of_memory+0x334/0x13c0 [ 2741.792430][ T8591] ? oom_killer_disable+0x280/0x280 [ 2741.797631][ T8591] ? mutex_trylock+0x264/0x2f0 [ 2741.802396][ T8591] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2741.808037][ T8591] __alloc_pages_slowpath+0x222b/0x2920 [ 2741.813621][ T8591] ? warn_alloc+0x110/0x110 [ 2741.818130][ T8591] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2741.824374][ T8591] ? should_fail+0x1de/0x852 [ 2741.828986][ T8591] ? __kasan_check_read+0x11/0x20 [ 2741.834025][ T8591] __alloc_pages_nodemask+0x646/0x910 [ 2741.839415][ T8591] ? xas_descend+0x144/0x370 [ 2741.844027][ T8591] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2741.849748][ T8591] ? __kasan_check_read+0x11/0x20 [ 2741.854782][ T8591] ? find_get_entry+0x4a6/0x7a0 [ 2741.859638][ T8591] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2741.865881][ T8591] alloc_pages_current+0x107/0x210 [ 2741.871000][ T8591] __page_cache_alloc+0x29d/0x490 [ 2741.876026][ T8591] pagecache_get_page+0x27e/0x9e0 [ 2741.881051][ T8591] ? __kasan_check_read+0x11/0x20 [ 2741.886100][ T8591] filemap_fault+0x9b1/0x3180 [ 2741.890788][ T8591] ? mark_held_locks+0xf0/0xf0 [ 2741.895578][ T8591] ? read_cache_page_gfp+0x30/0x30 [ 2741.900786][ T8591] ? __kasan_check_write+0x14/0x20 [ 2741.905906][ T8591] ? down_read+0x109/0x430 [ 2741.910335][ T8591] ? down_read_killable+0x490/0x490 [ 2741.915542][ T8591] ? find_lock_entry+0x650/0x650 [ 2741.920484][ T8591] ? pmd_val+0x85/0x100 [ 2741.924655][ T8591] ext4_filemap_fault+0x86/0xb2 [ 2741.929518][ T8591] __do_fault+0x111/0x540 [ 2741.934478][ T8591] __handle_mm_fault+0x2943/0x3da0 [ 2741.939605][ T8591] ? vm_iomap_memory+0x1a0/0x1a0 [ 2741.944552][ T8591] ? handle_mm_fault+0x292/0xa50 [ 2741.949500][ T8591] ? handle_mm_fault+0x7a0/0xa50 [ 2741.954440][ T8591] ? __kasan_check_read+0x11/0x20 [ 2741.959492][ T8591] handle_mm_fault+0x3b2/0xa50 [ 2741.964292][ T8591] __do_page_fault+0x536/0xd80 [ 2741.969157][ T8591] do_page_fault+0x38/0x590 [ 2741.973691][ T8591] page_fault+0x39/0x40 [ 2741.977844][ T8591] RIP: 0033:0x40f9c0 [ 2741.981756][ T8591] Code: Bad RIP value. [ 2741.985818][ T8591] RSP: 002b:000000c420025ef8 EFLAGS: 00010216 [ 2741.991881][ T8591] RAX: ffffffffffffff92 RBX: 000000001dde88c3 RCX: 000000000045ddf3 [ 2741.999851][ T8591] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000191fa20 [ 2742.007828][ T8591] RBP: 000000c420025f20 R08: 0000000000000000 R09: 0000000000000000 [ 2742.015969][ T8591] R10: 000000c420025ed8 R11: 0000000000000206 R12: 0000000000000001 [ 2742.023940][ T8591] R13: 0000000000000020 R14: 0000000000000013 R15: 0000000000000004 [ 2742.038745][ T8591] Mem-Info: [ 2742.041917][ T8591] active_anon:182679 inactive_anon:4304 isolated_anon:0 [ 2742.041917][ T8591] active_file:18 inactive_file:647 isolated_file:32 [ 2742.041917][ T8591] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2742.041917][ T8591] slab_reclaimable:12426 slab_unreclaimable:99036 [ 2742.041917][ T8591] mapped:52226 shmem:4382 pagetables:3721 bounce:0 [ 2742.041917][ T8591] free:19298 free_pcp:495 free_cma:0 [ 2742.182858][ T8591] Node 0 active_anon:730712kB inactive_anon:17216kB active_file:68kB inactive_file:2672kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 559104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2742.316097][ T8591] Node 1 active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2742.362745][ T8591] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2742.421896][ T8591] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2742.448043][ T8591] Node 0 DMA32 free:26208kB min:52488kB low:61512kB high:70536kB reserved_highatomic:0KB active_anon:730712kB inactive_anon:17216kB active_file:64kB inactive_file:2644kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10448kB pagetables:14880kB bounce:0kB free_pcp:1428kB local_pcp:508kB free_cma:0kB [ 2742.544850][ T8591] lowmem_reserve[]: 0 0 0 0 0 [ 2742.549928][ T8591] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2742.585891][ T8591] lowmem_reserve[]: 0 0 0 0 0 [ 2742.603235][ T8591] Node 1 Normal free:39088kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:504kB local_pcp:252kB free_cma:0kB [ 2742.653416][ T8591] lowmem_reserve[]: 0 0 0 0 0 [ 2742.658201][ T8591] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2742.712763][ T8591] Node 0 DMA32: 2598*4kB (UME) 1037*8kB (UME) 267*16kB (UME) 80*32kB (M) 0*64kB 1*128kB (U) 0*256kB 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 26160kB [ 2742.806480][ T8591] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2742.829738][ T8591] Node 1 Normal: 2*4kB (UM) 5*8kB (UME) 3*16kB (ME) 4*32kB (UME) 5*64kB (UME) 0*128kB 3*256kB (UME) 0*512kB 2*1024kB (UM) 1*2048kB (M) 8*4096kB (UM) = 38176kB [ 2742.878614][ T8591] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2742.928613][ T8591] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2742.938020][ T8591] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2742.947608][ T8591] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2742.956968][ T8591] 5075 total pagecache pages [ 2742.961584][ T8591] 0 pages in swap cache [ 2742.965739][ T8591] Swap cache stats: add 0, delete 0, find 0/0 [ 2742.971839][ T8591] Free swap = 0kB [ 2742.975554][ T8591] Total swap = 0kB [ 2742.980537][ T8591] 1965979 pages RAM [ 2742.984958][ T8591] 0 pages HighMem/MovableOnly [ 2742.990124][ T8591] 344068 pages reserved [ 2742.994276][ T8591] 0 pages cma reserved [ 2743.002641][ T8591] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=27904,uid=0 [ 2743.026103][ T8591] Out of memory: Killed process 27904 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:172032kB oom_score_adj:1000 [ 2743.267926][ T9085] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2743.325796][ T9085] CPU: 1 PID: 9085 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 2743.334088][ T9085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2743.344243][ T9085] Call Trace: [ 2743.347722][ T9085] dump_stack+0x197/0x210 [ 2743.352232][ T9085] dump_header+0x10b/0x82d [ 2743.356741][ T9085] ? oom_kill_process+0x94/0x420 [ 2743.361677][ T9085] oom_kill_process.cold+0x10/0x15 [ 2743.366786][ T9085] out_of_memory+0x334/0x13c0 [ 2743.371473][ T9085] ? oom_killer_disable+0x280/0x280 [ 2743.376670][ T9085] ? mutex_trylock+0x264/0x2f0 [ 2743.381440][ T9085] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2743.387095][ T9085] __alloc_pages_slowpath+0x222b/0x2920 [ 2743.392663][ T9085] ? warn_alloc+0x110/0x110 [ 2743.397167][ T9085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2743.403413][ T9085] ? should_fail+0x1de/0x852 [ 2743.408032][ T9085] ? __kasan_check_read+0x11/0x20 [ 2743.413059][ T9085] __alloc_pages_nodemask+0x646/0x910 [ 2743.418433][ T9085] ? xas_descend+0x144/0x370 [ 2743.423040][ T9085] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2743.428762][ T9085] ? __kasan_check_read+0x11/0x20 [ 2743.433796][ T9085] ? find_get_entry+0x4a6/0x7a0 [ 2743.438653][ T9085] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2743.444892][ T9085] alloc_pages_current+0x107/0x210 [ 2743.450004][ T9085] __page_cache_alloc+0x29d/0x490 [ 2743.455073][ T9085] pagecache_get_page+0x27e/0x9e0 [ 2743.460102][ T9085] ? __kasan_check_read+0x11/0x20 [ 2743.465388][ T9085] filemap_fault+0x9b1/0x3180 [ 2743.470065][ T9085] ? mark_held_locks+0xf0/0xf0 [ 2743.474838][ T9085] ? read_cache_page_gfp+0x30/0x30 [ 2743.479967][ T9085] ? __kasan_check_write+0x14/0x20 [ 2743.485107][ T9085] ? down_read+0x109/0x430 [ 2743.489526][ T9085] ? down_read_killable+0x490/0x490 [ 2743.494746][ T9085] ? find_lock_entry+0x650/0x650 [ 2743.499695][ T9085] ? pmd_val+0x85/0x100 [ 2743.503876][ T9085] ext4_filemap_fault+0x86/0xb2 [ 2743.509255][ T9085] __do_fault+0x111/0x540 [ 2743.513588][ T9085] __handle_mm_fault+0x2943/0x3da0 [ 2743.518707][ T9085] ? vm_iomap_memory+0x1a0/0x1a0 [ 2743.523651][ T9085] ? handle_mm_fault+0x292/0xa50 [ 2743.528627][ T9085] ? handle_mm_fault+0x7a0/0xa50 [ 2743.533662][ T9085] ? __kasan_check_read+0x11/0x20 [ 2743.538777][ T9085] handle_mm_fault+0x3b2/0xa50 [ 2743.543544][ T9085] __do_page_fault+0x536/0xd80 [ 2743.548304][ T9085] ? page_fault+0x16/0x40 [ 2743.552643][ T9085] do_page_fault+0x38/0x590 [ 2743.557172][ T9085] page_fault+0x39/0x40 [ 2743.561327][ T9085] RIP: 0033:0x459f50 [ 2743.565228][ T9085] Code: Bad RIP value. [ 2743.569284][ T9085] RSP: 002b:000000c42f89ba90 EFLAGS: 00010213 [ 2743.575346][ T9085] RAX: 000000c4203bc120 RBX: 0000000000000000 RCX: 000000c420000180 [ 2743.583316][ T9085] RDX: 0000026a0d9d20d4 RSI: 3f742e72ec966f2f RDI: 00007ffe2aded080 [ 2743.591421][ T9085] RBP: 000000c42f89bc00 R08: 00007ffe2aded090 R09: 0000000000084082 [ 2743.599429][ T9085] R10: 000000c42f89b9e8 R11: 000000c42f89b9e0 R12: 000000c42f89bb98 [ 2743.607410][ T9085] R13: 000000c42f89bb98 R14: 0000000000000000 R15: 0000000000000000 [ 2743.783198][ T9085] Mem-Info: [ 2743.786545][ T9085] active_anon:182133 inactive_anon:4304 isolated_anon:0 [ 2743.786545][ T9085] active_file:11 inactive_file:652 isolated_file:0 [ 2743.786545][ T9085] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2743.786545][ T9085] slab_reclaimable:12426 slab_unreclaimable:100322 [ 2743.786545][ T9085] mapped:52226 shmem:4382 pagetables:3686 bounce:0 [ 2743.786545][ T9085] free:18930 free_pcp:159 free_cma:0 [ 2743.967321][ T9085] Node 0 active_anon:728528kB inactive_anon:17216kB active_file:72kB inactive_file:2520kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 557056kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2744.098098][ T9085] Node 1 active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2744.278667][ T9085] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2744.343825][ T9085] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2744.349679][ T9085] Node 0 DMA32 free:25744kB min:38152kB low:47176kB high:56200kB reserved_highatomic:0KB active_anon:728528kB inactive_anon:17216kB active_file:72kB inactive_file:2628kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10416kB pagetables:14740kB bounce:0kB free_pcp:556kB local_pcp:152kB free_cma:0kB [ 2744.426084][ C0] net_ratelimit: 18 callbacks suppressed [ 2744.426093][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2744.436373][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2744.437622][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2744.442163][ T9085] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2744.660752][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2744.665499][ T9085] Node 1 Normal free:37912kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2744.840999][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2744.845847][ T9085] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2744.972983][ T9085] Node 0 DMA32: 2706*4kB (UME) 906*8kB (UME) 221*16kB (UME) 64*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 23656kB [ 2745.008921][ T9085] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2745.025589][ T9085] Node 1 Normal: 2*4kB (UM) 5*8kB (UME) 3*16kB (ME) 4*32kB (UME) 5*64kB (UME) 2*128kB (U) 2*256kB (ME) 1*512kB (U) 1*1024kB (M) 1*2048kB (M) 8*4096kB (UM) = 37664kB [ 2745.066070][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2745.071925][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2745.097040][ T9085] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2745.146055][ T9085] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2745.155414][ T9085] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2745.210716][ T9085] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2745.220204][ T9085] 5075 total pagecache pages [ 2745.225768][ T9085] 0 pages in swap cache [ 2745.230068][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2745.230150][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2745.230265][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2745.230335][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2745.378659][ T9085] Swap cache stats: add 0, delete 0, find 0/0 [ 2745.384781][ T9085] Free swap = 0kB [ 2745.428332][ T9085] Total swap = 0kB [ 2745.432101][ T9085] 1965979 pages RAM [ 2745.435909][ T9085] 0 pages HighMem/MovableOnly [ 2745.493525][ T9085] 344068 pages reserved [ 2745.520004][ T9085] 0 pages cma reserved [ 2745.524125][ T9085] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=24330,uid=0 [ 2745.618795][ T9085] Out of memory: Killed process 24330 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:172032kB oom_score_adj:1000 [ 2745.712993][ T9085] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2745.717226][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2745.730492][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2745.734488][ T9085] CPU: 1 PID: 9085 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 2745.744896][ T9085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2745.754953][ T9085] Call Trace: [ 2745.758275][ T9085] dump_stack+0x197/0x210 [ 2745.762617][ T9085] dump_header+0x10b/0x82d [ 2745.767050][ T9085] ? oom_kill_process+0x94/0x420 [ 2745.772015][ T9085] oom_kill_process.cold+0x10/0x15 [ 2745.777127][ T9085] out_of_memory+0x334/0x13c0 [ 2745.781810][ T9085] ? oom_killer_disable+0x280/0x280 [ 2745.787016][ T9085] ? mutex_trylock+0x264/0x2f0 [ 2745.791782][ T9085] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2745.797417][ T9085] __alloc_pages_slowpath+0x222b/0x2920 [ 2745.802997][ T9085] ? warn_alloc+0x110/0x110 [ 2745.807507][ T9085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2745.813745][ T9085] ? should_fail+0x1de/0x852 [ 2745.818349][ T9085] ? __kasan_check_read+0x11/0x20 [ 2745.823374][ T9085] __alloc_pages_nodemask+0x646/0x910 [ 2745.829016][ T9085] ? xas_descend+0x144/0x370 [ 2745.833607][ T9085] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2745.839324][ T9085] ? __kasan_check_read+0x11/0x20 [ 2745.844353][ T9085] ? find_get_entry+0x4a6/0x7a0 [ 2745.849203][ T9085] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2745.855470][ T9085] alloc_pages_current+0x107/0x210 [ 2745.860586][ T9085] __page_cache_alloc+0x29d/0x490 [ 2745.865640][ T9085] pagecache_get_page+0x27e/0x9e0 [ 2745.870663][ T9085] ? __kasan_check_read+0x11/0x20 [ 2745.875699][ T9085] filemap_fault+0x9b1/0x3180 [ 2745.880458][ T9085] ? mark_held_locks+0xf0/0xf0 [ 2745.885232][ T9085] ? read_cache_page_gfp+0x30/0x30 [ 2745.890349][ T9085] ? __kasan_check_write+0x14/0x20 [ 2745.895482][ T9085] ? down_read+0x109/0x430 [ 2745.899899][ T9085] ? down_read_killable+0x490/0x490 [ 2745.905104][ T9085] ? find_lock_entry+0x650/0x650 [ 2745.910042][ T9085] ? pmd_val+0x85/0x100 [ 2745.914210][ T9085] ext4_filemap_fault+0x86/0xb2 [ 2745.919070][ T9085] __do_fault+0x111/0x540 [ 2745.923403][ T9085] __handle_mm_fault+0x2943/0x3da0 [ 2745.928607][ T9085] ? vm_iomap_memory+0x1a0/0x1a0 [ 2745.933628][ T9085] ? handle_mm_fault+0x292/0xa50 [ 2745.938617][ T9085] ? handle_mm_fault+0x7a0/0xa50 [ 2745.943567][ T9085] ? __kasan_check_read+0x11/0x20 [ 2745.948621][ T9085] handle_mm_fault+0x3b2/0xa50 [ 2745.953696][ T9085] __do_page_fault+0x536/0xd80 [ 2745.958491][ T9085] ? page_fault+0x16/0x40 [ 2745.962842][ T9085] do_page_fault+0x38/0x590 [ 2745.967359][ T9085] page_fault+0x39/0x40 [ 2745.971511][ T9085] RIP: 0033:0x459f50 [ 2745.975397][ T9085] Code: Bad RIP value. [ 2745.979444][ T9085] RSP: 002b:000000c42f89ba90 EFLAGS: 00010213 [ 2745.985537][ T9085] RAX: 000000c4203bc120 RBX: 0000000000000000 RCX: 000000c420000180 [ 2745.993490][ T9085] RDX: 0000026a0d9d20d4 RSI: 3f742e72ec966f2f RDI: 00007ffe2aded080 [ 2746.001541][ T9085] RBP: 000000c42f89bc00 R08: 00007ffe2aded090 R09: 0000000000084082 [ 2746.009493][ T9085] R10: 000000c42f89b9e8 R11: 000000c42f89b9e0 R12: 000000c42f89bb98 [ 2746.017445][ T9085] R13: 000000c42f89bb98 R14: 0000000000000000 R15: 0000000000000000 [ 2746.027648][ T9085] Mem-Info: [ 2746.030796][ T9085] active_anon:181587 inactive_anon:4304 isolated_anon:0 [ 2746.030796][ T9085] active_file:10 inactive_file:676 isolated_file:0 [ 2746.030796][ T9085] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2746.030796][ T9085] slab_reclaimable:12426 slab_unreclaimable:102166 [ 2746.030796][ T9085] mapped:52226 shmem:4382 pagetables:3651 bounce:0 [ 2746.030796][ T9085] free:17631 free_pcp:230 free_cma:0 [ 2746.069075][ T9085] Node 0 active_anon:726344kB inactive_anon:17216kB active_file:40kB inactive_file:2684kB unevictable:0kB isolated(anon):0kB isolated(file):12kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 555008kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2746.098197][ T9085] Node 1 active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2746.232329][ T9085] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2746.353481][ T9085] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2746.396026][ T9085] Node 0 DMA32 free:24176kB min:48392kB low:57416kB high:66440kB reserved_highatomic:0KB active_anon:726344kB inactive_anon:17216kB active_file:12kB inactive_file:2632kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10388kB pagetables:14600kB bounce:0kB free_pcp:620kB local_pcp:320kB free_cma:0kB [ 2746.542086][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2746.546879][ T9085] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2746.617873][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2746.622902][ T9085] Node 1 Normal free:34196kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:252kB local_pcp:0kB free_cma:0kB [ 2746.761513][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2746.766464][ T9085] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2746.809027][ T9085] Node 0 DMA32: 2706*4kB (UME) 886*8kB (UME) 214*16kB (ME) 56*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 0*2048kB 0*4096kB = 24152kB [ 2746.855832][ T9085] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2746.912314][ T9085] Node 1 Normal: 1*4kB (M) 4*8kB (ME) 3*16kB (ME) 3*32kB (ME) 4*64kB (ME) 1*128kB (U) 2*256kB (ME) 1*512kB (U) 1*1024kB (M) 1*2048kB (M) 7*4096kB (UM) = 33332kB [ 2746.946155][ T9085] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2746.955926][ T9085] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2747.007960][ T9085] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2747.048176][ T9085] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2747.094347][ T9085] 5075 total pagecache pages [ 2747.121777][ T9085] 0 pages in swap cache [ 2747.146405][ T9085] Swap cache stats: add 0, delete 0, find 0/0 [ 2747.152530][ T9085] Free swap = 0kB [ 2747.157394][ T9085] Total swap = 0kB [ 2747.161122][ T9085] 1965979 pages RAM [ 2747.164919][ T9085] 0 pages HighMem/MovableOnly [ 2747.169771][ T9085] 344068 pages reserved [ 2747.174006][ T9085] 0 pages cma reserved [ 2747.204928][ T9085] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=22415,uid=0 [ 2747.283288][ T9085] Out of memory: Killed process 22415 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:172032kB oom_score_adj:1000 [ 2747.550728][ T1] init invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2747.563415][ T1] CPU: 0 PID: 1 Comm: init Not tainted 5.5.0-rc1-syzkaller #0 [ 2747.571023][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2747.581090][ T1] Call Trace: [ 2747.584413][ T1] dump_stack+0x197/0x210 [ 2747.588755][ T1] dump_header+0x10b/0x82d [ 2747.593170][ T1] ? oom_kill_process+0x94/0x420 [ 2747.598303][ T1] oom_kill_process.cold+0x10/0x15 [ 2747.603430][ T1] out_of_memory+0x334/0x13c0 [ 2747.608115][ T1] ? oom_killer_disable+0x280/0x280 [ 2747.613315][ T1] ? mutex_trylock+0x264/0x2f0 [ 2747.618081][ T1] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2747.623818][ T1] __alloc_pages_slowpath+0x222b/0x2920 [ 2747.629370][ T1] ? warn_alloc+0x110/0x110 [ 2747.633873][ T1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2747.640146][ T1] ? should_fail+0x1de/0x852 [ 2747.644925][ T1] ? __kasan_check_read+0x11/0x20 [ 2747.649957][ T1] __alloc_pages_nodemask+0x646/0x910 [ 2747.655339][ T1] ? xas_descend+0x144/0x370 [ 2747.660043][ T1] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2747.665763][ T1] ? __kasan_check_read+0x11/0x20 [ 2747.670801][ T1] ? find_get_entry+0x4a6/0x7a0 [ 2747.675687][ T1] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2747.681933][ T1] alloc_pages_current+0x107/0x210 [ 2747.687064][ T1] __page_cache_alloc+0x29d/0x490 [ 2747.692094][ T1] pagecache_get_page+0x27e/0x9e0 [ 2747.697215][ T1] ? __kasan_check_read+0x11/0x20 [ 2747.702249][ T1] filemap_fault+0x9b1/0x3180 [ 2747.706946][ T1] ? mark_held_locks+0xf0/0xf0 [ 2747.711876][ T1] ? read_cache_page_gfp+0x30/0x30 [ 2747.717004][ T1] ? __kasan_check_write+0x14/0x20 [ 2747.722122][ T1] ? down_read+0x109/0x430 [ 2747.726553][ T1] ? down_read_killable+0x490/0x490 [ 2747.731870][ T1] ? lock_downgrade+0x920/0x920 [ 2747.736736][ T1] ext4_filemap_fault+0x86/0xb2 [ 2747.741600][ T1] __do_fault+0x111/0x540 [ 2747.745952][ T1] ? do_raw_spin_unlock+0x178/0x270 [ 2747.751171][ T1] __handle_mm_fault+0x2943/0x3da0 [ 2747.756293][ T1] ? vm_iomap_memory+0x1a0/0x1a0 [ 2747.761232][ T1] ? handle_mm_fault+0x292/0xa50 [ 2747.766184][ T1] ? handle_mm_fault+0x7a0/0xa50 [ 2747.771236][ T1] ? __kasan_check_read+0x11/0x20 [ 2747.776280][ T1] handle_mm_fault+0x3b2/0xa50 [ 2747.781061][ T1] __do_page_fault+0x536/0xd80 [ 2747.785839][ T1] ? page_fault+0x16/0x40 [ 2747.790186][ T1] do_page_fault+0x38/0x590 [ 2747.794696][ T1] page_fault+0x39/0x40 [ 2747.798850][ T1] RIP: 0033:0x4059bb [ 2747.802749][ T1] Code: Bad RIP value. [ 2747.806828][ T1] RSP: 002b:00007fffc1dc2290 EFLAGS: 00010202 [ 2747.812894][ T1] RAX: 0000000000000000 RBX: 00007fffc1dc23b0 RCX: 00007f05668f4dd3 [ 2747.820864][ T1] RDX: 0000000000000000 RSI: 00007fffc1dc21c0 RDI: 000000000000000b [ 2747.828846][ T1] RBP: 0000000000000000 R08: 00007fffc1dc2240 R09: 0000000000000001 [ 2747.836821][ T1] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2747.844790][ T1] R13: 00007fffc1dc25a0 R14: 0000000000000000 R15: 0000000000000000 [ 2747.903369][ T1] Mem-Info: [ 2747.906672][ T1] active_anon:181041 inactive_anon:4304 isolated_anon:0 [ 2747.906672][ T1] active_file:14 inactive_file:650 isolated_file:32 [ 2747.906672][ T1] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2747.906672][ T1] slab_reclaimable:12426 slab_unreclaimable:103701 [ 2747.906672][ T1] mapped:52226 shmem:4382 pagetables:3616 bounce:0 [ 2747.906672][ T1] free:16590 free_pcp:314 free_cma:0 [ 2748.136025][ T1] Node 0 active_anon:724160kB inactive_anon:17216kB active_file:56kB inactive_file:2644kB unevictable:0kB isolated(anon):0kB isolated(file):136kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 552960kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2748.274578][ T1] Node 1 active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2748.311525][ T1] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2748.400741][ T1] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2748.416375][ T1] Node 0 DMA32 free:24144kB min:48392kB low:57416kB high:66440kB reserved_highatomic:0KB active_anon:724160kB inactive_anon:17216kB active_file:52kB inactive_file:2576kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10352kB pagetables:14460kB bounce:0kB free_pcp:680kB local_pcp:572kB free_cma:0kB [ 2748.471521][ T1] lowmem_reserve[]: 0 0 0 0 0 [ 2748.501989][ T1] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2748.634784][ T1] lowmem_reserve[]: 0 0 0 0 0 [ 2748.641641][ T1] Node 1 Normal free:29592kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:504kB local_pcp:252kB free_cma:0kB [ 2748.725745][ T1] lowmem_reserve[]: 0 0 0 0 0 [ 2748.756279][ T1] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2748.756362][ T1] Node 0 DMA32: 2643*4kB (UME) 885*8kB (ME) 214*16kB (ME) 55*32kB (M) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 23796kB [ 2748.756424][ T1] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2748.756475][ T1] Node 1 Normal: 2*4kB (UM) 5*8kB (UME) 3*16kB (ME) 4*32kB (UME) 5*64kB (UME) 1*128kB (U) 3*256kB (UME) 0*512kB 1*1024kB (M) 1*2048kB (M) 6*4096kB (UM) = 29088kB [ 2749.061079][ T1] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2749.105425][ T1] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2749.121740][ T1] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2749.182280][ T1] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2749.236064][ T1] 5075 total pagecache pages [ 2749.240711][ T1] 0 pages in swap cache [ 2749.244877][ T1] Swap cache stats: add 0, delete 0, find 0/0 [ 2749.301128][ T1] Free swap = 0kB [ 2749.305051][ T1] Total swap = 0kB [ 2749.342672][ T1] 1965979 pages RAM [ 2749.346571][ T1] 0 pages HighMem/MovableOnly [ 2749.351247][ T1] 344068 pages reserved [ 2749.355390][ T1] 0 pages cma reserved [ 2749.458833][ T1] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=20449,uid=0 [ 2749.550100][ T1] Out of memory: Killed process 20449 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:172032kB oom_score_adj:1000 [ 2749.597446][ T8958] rsyslogd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2749.717041][ T8958] CPU: 0 PID: 8958 Comm: rsyslogd Not tainted 5.5.0-rc1-syzkaller #0 [ 2749.725190][ T8958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2749.735353][ T8958] Call Trace: [ 2749.738668][ T8958] dump_stack+0x197/0x210 [ 2749.743002][ T8958] dump_header+0x10b/0x82d [ 2749.747416][ T8958] ? oom_kill_process+0x94/0x420 [ 2749.752358][ T8958] oom_kill_process.cold+0x10/0x15 [ 2749.757472][ T8958] out_of_memory+0x334/0x13c0 [ 2749.762156][ T8958] ? oom_killer_disable+0x280/0x280 [ 2749.767362][ T8958] ? mutex_trylock+0x264/0x2f0 [ 2749.772125][ T8958] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2749.777762][ T8958] __alloc_pages_slowpath+0x222b/0x2920 [ 2749.783690][ T8958] ? warn_alloc+0x110/0x110 [ 2749.788197][ T8958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2749.794449][ T8958] ? should_fail+0x1de/0x852 [ 2749.799049][ T8958] ? __kasan_check_read+0x11/0x20 [ 2749.804077][ T8958] __alloc_pages_nodemask+0x646/0x910 [ 2749.809451][ T8958] ? xas_descend+0x144/0x370 [ 2749.814048][ T8958] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2749.819881][ T8958] ? __kasan_check_read+0x11/0x20 [ 2749.825171][ T8958] ? find_get_entry+0x4a6/0x7a0 [ 2749.830047][ T8958] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2749.836291][ T8958] alloc_pages_current+0x107/0x210 [ 2749.841405][ T8958] __page_cache_alloc+0x29d/0x490 [ 2749.846538][ T8958] pagecache_get_page+0x27e/0x9e0 [ 2749.851564][ T8958] ? __kasan_check_read+0x11/0x20 [ 2749.856594][ T8958] filemap_fault+0x9b1/0x3180 [ 2749.862003][ T8958] ? mark_held_locks+0xf0/0xf0 [ 2749.866891][ T8958] ? read_cache_page_gfp+0x30/0x30 [ 2749.872069][ T8958] ? __kasan_check_write+0x14/0x20 [ 2749.877202][ T8958] ? down_read+0x109/0x430 [ 2749.881629][ T8958] ? down_read_killable+0x490/0x490 [ 2749.886848][ T8958] ? find_lock_entry+0x650/0x650 [ 2749.891790][ T8958] ? pmd_val+0x85/0x100 [ 2749.896012][ T8958] ext4_filemap_fault+0x86/0xb2 [ 2749.900870][ T8958] __do_fault+0x111/0x540 [ 2749.905209][ T8958] __handle_mm_fault+0x2943/0x3da0 [ 2749.910337][ T8958] ? vm_iomap_memory+0x1a0/0x1a0 [ 2749.915285][ T8958] ? handle_mm_fault+0x292/0xa50 [ 2749.920237][ T8958] ? handle_mm_fault+0x7a0/0xa50 [ 2749.925186][ T8958] ? __kasan_check_read+0x11/0x20 [ 2749.930306][ T8958] handle_mm_fault+0x3b2/0xa50 [ 2749.935082][ T8958] __do_page_fault+0x536/0xd80 [ 2749.939848][ T8958] ? page_fault+0x16/0x40 [ 2749.944185][ T8958] do_page_fault+0x38/0x590 [ 2749.948692][ T8958] page_fault+0x39/0x40 [ 2749.952872][ T8958] RIP: 0033:0x7f85c97be1fd [ 2749.957295][ T8958] Code: Bad RIP value. [ 2749.961357][ T8958] RSP: 002b:00007f85c6d5de30 EFLAGS: 00010293 [ 2749.967480][ T8958] RAX: 00000000000000c5 RBX: 0000000000f0b170 RCX: 00007f85c97be1fd [ 2749.975459][ T8958] RDX: 0000000000000fff RSI: 00007f85c85925a0 RDI: 0000000000000004 [ 2749.983432][ T8958] RBP: 0000000000000000 R08: 0000000000ef6260 R09: 0000000004000001 [ 2749.991487][ T8958] R10: 0000000000000001 R11: 0000000000000293 R12: 000000000065e420 [ 2749.999457][ T8958] R13: 00007f85c6d5e9c0 R14: 00007f85c9e03040 R15: 0000000000000003 [ 2750.007794][ C0] net_ratelimit: 18 callbacks suppressed [ 2750.007802][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2750.019274][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2750.666081][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2750.671979][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2750.693158][ T8958] Mem-Info: [ 2750.732187][ T8958] active_anon:180495 inactive_anon:4304 isolated_anon:0 [ 2750.732187][ T8958] active_file:16 inactive_file:638 isolated_file:64 [ 2750.732187][ T8958] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2750.732187][ T8958] slab_reclaimable:12426 slab_unreclaimable:105553 [ 2750.732187][ T8958] mapped:52226 shmem:4382 pagetables:3581 bounce:0 [ 2750.732187][ T8958] free:15305 free_pcp:360 free_cma:0 [ 2751.024799][ T8958] Node 0 active_anon:721976kB inactive_anon:17216kB active_file:108kB inactive_file:2400kB unevictable:0kB isolated(anon):0kB isolated(file):256kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 550912kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2751.093379][ T8958] Node 1 active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2751.138036][ T8958] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2751.213948][ T8958] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2751.219880][ T8958] Node 0 DMA32 free:24076kB min:48392kB low:57416kB high:66440kB reserved_highatomic:0KB active_anon:721976kB inactive_anon:17216kB active_file:8kB inactive_file:2484kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10320kB pagetables:14320kB bounce:0kB free_pcp:876kB local_pcp:424kB free_cma:0kB [ 2751.307414][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2751.314460][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2751.373393][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2751.410728][ T8958] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2751.466103][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2751.471968][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2751.477863][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2751.483647][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2751.591473][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2751.602749][ T8958] Node 1 Normal free:26824kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:504kB local_pcp:252kB free_cma:0kB [ 2751.802513][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2751.846043][ T8958] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2751.916042][ T8958] Node 0 DMA32: 2643*4kB (UME) 886*8kB (UME) 215*16kB (UME) 55*32kB (M) 1*64kB (U) 1*128kB (U) 0*256kB 0*512kB 1*1024kB (U) 0*2048kB 0*4096kB = 24076kB [ 2751.992987][ T8958] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2752.067195][ T8958] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 4*64kB (ME) 0*128kB 3*256kB (UME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26824kB [ 2752.134681][ T8958] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2752.196982][ T8958] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2752.236671][ T8958] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2752.280049][ T8958] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2752.327640][ T8958] 5075 total pagecache pages [ 2752.332258][ T8958] 0 pages in swap cache [ 2752.396174][ T8958] Swap cache stats: add 0, delete 0, find 0/0 [ 2752.402299][ T8958] Free swap = 0kB [ 2752.436009][ T8958] Total swap = 0kB [ 2752.439810][ T8958] 1965979 pages RAM [ 2752.443619][ T8958] 0 pages HighMem/MovableOnly [ 2752.468766][ T8958] 344068 pages reserved [ 2752.473061][ T8958] 0 pages cma reserved [ 2752.477216][ T8958] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=19208,uid=0 [ 2752.597737][ T8958] Out of memory: Killed process 19208 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:172032kB oom_score_adj:1000 [ 2752.712741][ T8591] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2752.776173][ T8591] CPU: 1 PID: 8591 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 2752.784482][ T8591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2752.794534][ T8591] Call Trace: [ 2752.797835][ T8591] dump_stack+0x197/0x210 [ 2752.802258][ T8591] dump_header+0x10b/0x82d [ 2752.806669][ T8591] ? oom_kill_process+0x94/0x420 [ 2752.811605][ T8591] oom_kill_process.cold+0x10/0x15 [ 2752.816740][ T8591] out_of_memory+0x334/0x13c0 [ 2752.821425][ T8591] ? oom_killer_disable+0x280/0x280 [ 2752.826630][ T8591] ? mutex_trylock+0x264/0x2f0 [ 2752.831415][ T8591] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2752.837062][ T8591] __alloc_pages_slowpath+0x222b/0x2920 [ 2752.842621][ T8591] ? warn_alloc+0x110/0x110 [ 2752.847124][ T8591] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2752.853368][ T8591] ? should_fail+0x1de/0x852 [ 2752.857965][ T8591] ? __kasan_check_read+0x11/0x20 [ 2752.863001][ T8591] __alloc_pages_nodemask+0x646/0x910 [ 2752.868370][ T8591] ? xas_descend+0x144/0x370 [ 2752.872958][ T8591] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2752.878669][ T8591] ? __kasan_check_read+0x11/0x20 [ 2752.883697][ T8591] ? find_get_entry+0x4a6/0x7a0 [ 2752.888549][ T8591] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2752.894786][ T8591] alloc_pages_current+0x107/0x210 [ 2752.899900][ T8591] __page_cache_alloc+0x29d/0x490 [ 2752.904925][ T8591] pagecache_get_page+0x27e/0x9e0 [ 2752.909947][ T8591] ? __kasan_check_read+0x11/0x20 [ 2752.914970][ T8591] filemap_fault+0x9b1/0x3180 [ 2752.919655][ T8591] ? mark_held_locks+0xf0/0xf0 [ 2752.924427][ T8591] ? read_cache_page_gfp+0x30/0x30 [ 2752.929803][ T8591] ? __kasan_check_write+0x14/0x20 [ 2752.934910][ T8591] ? down_read+0x109/0x430 [ 2752.939327][ T8591] ? down_read_killable+0x490/0x490 [ 2752.944523][ T8591] ? find_lock_entry+0x650/0x650 [ 2752.949460][ T8591] ? pmd_val+0x85/0x100 [ 2752.953618][ T8591] ext4_filemap_fault+0x86/0xb2 [ 2752.958469][ T8591] __do_fault+0x111/0x540 [ 2752.962799][ T8591] __handle_mm_fault+0x2943/0x3da0 [ 2752.967930][ T8591] ? vm_iomap_memory+0x1a0/0x1a0 [ 2752.972865][ T8591] ? handle_mm_fault+0x292/0xa50 [ 2752.977808][ T8591] ? handle_mm_fault+0x7a0/0xa50 [ 2752.982746][ T8591] ? __kasan_check_read+0x11/0x20 [ 2752.987779][ T8591] handle_mm_fault+0x3b2/0xa50 [ 2752.992639][ T8591] __do_page_fault+0x536/0xd80 [ 2752.997409][ T8591] do_page_fault+0x38/0x590 [ 2753.001938][ T8591] page_fault+0x39/0x40 [ 2753.006086][ T8591] RIP: 0033:0x40f9c0 [ 2753.009986][ T8591] Code: Bad RIP value. [ 2753.014043][ T8591] RSP: 002b:000000c420025ef8 EFLAGS: 00010216 [ 2753.020103][ T8591] RAX: ffffffffffffff92 RBX: 000000001dde88c3 RCX: 000000000045ddf3 [ 2753.028072][ T8591] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000191fa20 [ 2753.036039][ T8591] RBP: 000000c420025f20 R08: 0000000000000000 R09: 0000000000000000 [ 2753.044015][ T8591] R10: 000000c420025ed8 R11: 0000000000000206 R12: 0000000000000001 [ 2753.052006][ T8591] R13: 0000000000000020 R14: 0000000000000013 R15: 0000000000000004 [ 2753.131079][ T8591] Mem-Info: [ 2753.134275][ T8591] active_anon:179949 inactive_anon:4304 isolated_anon:0 [ 2753.134275][ T8591] active_file:26 inactive_file:648 isolated_file:0 [ 2753.134275][ T8591] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2753.134275][ T8591] slab_reclaimable:12426 slab_unreclaimable:105878 [ 2753.134275][ T8591] mapped:52226 shmem:4382 pagetables:3546 bounce:0 [ 2753.134275][ T8591] free:15569 free_pcp:368 free_cma:0 [ 2753.226588][ T8591] Node 0 active_anon:719792kB inactive_anon:17216kB active_file:0kB inactive_file:2432kB unevictable:0kB isolated(anon):0kB isolated(file):256kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 548864kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2753.260721][ T8591] Node 1 active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2753.294524][ T8591] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2753.429046][ T8591] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2753.434852][ T8591] Node 0 DMA32 free:24180kB min:48392kB low:57416kB high:66440kB reserved_highatomic:0KB active_anon:719792kB inactive_anon:17216kB active_file:92kB inactive_file:2680kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10292kB pagetables:14180kB bounce:0kB free_pcp:916kB local_pcp:564kB free_cma:0kB [ 2753.545417][ T8591] lowmem_reserve[]: 0 0 0 0 0 [ 2753.586080][ T8591] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2753.758833][ T8591] lowmem_reserve[]: 0 0 0 0 0 [ 2753.763587][ T8591] Node 1 Normal free:26824kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:504kB local_pcp:252kB free_cma:0kB [ 2753.954831][ T8591] lowmem_reserve[]: 0 0 0 0 0 [ 2753.975825][ T8591] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2754.043951][ T8591] Node 0 DMA32: 2643*4kB (UME) 886*8kB (UME) 215*16kB (UME) 56*32kB (UM) 1*64kB (U) 1*128kB (U) 0*256kB 0*512kB 1*1024kB (U) 0*2048kB 0*4096kB = 24108kB [ 2754.136051][ T8591] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2754.221057][ T8591] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 4*64kB (ME) 0*128kB 3*256kB (UME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26824kB [ 2754.306145][ T8591] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2754.315732][ T8591] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2754.417384][ T8591] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2754.477657][ T8591] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2754.543257][ T8591] 5075 total pagecache pages [ 2754.568790][ T8591] 0 pages in swap cache [ 2754.573010][ T8591] Swap cache stats: add 0, delete 0, find 0/0 [ 2754.639301][ T8591] Free swap = 0kB [ 2754.643084][ T8591] Total swap = 0kB [ 2754.657629][ T8591] 1965979 pages RAM [ 2754.661487][ T8591] 0 pages HighMem/MovableOnly [ 2754.666949][ T8591] 344068 pages reserved [ 2754.671112][ T8591] 0 pages cma reserved [ 2754.675182][ T8591] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=18533,uid=0 [ 2754.736394][ T8591] Out of memory: Killed process 18533 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:172032kB oom_score_adj:1000 [ 2754.919643][ T8958] rsyslogd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2754.950940][ T8958] CPU: 0 PID: 8958 Comm: rsyslogd Not tainted 5.5.0-rc1-syzkaller #0 [ 2754.959034][ T8958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2754.969084][ T8958] Call Trace: [ 2754.972380][ T8958] dump_stack+0x197/0x210 [ 2754.976716][ T8958] dump_header+0x10b/0x82d [ 2754.981132][ T8958] ? oom_kill_process+0x94/0x420 [ 2754.986074][ T8958] oom_kill_process.cold+0x10/0x15 [ 2754.991189][ T8958] out_of_memory+0x334/0x13c0 [ 2754.995873][ T8958] ? oom_killer_disable+0x280/0x280 [ 2755.001075][ T8958] ? mutex_trylock+0x264/0x2f0 [ 2755.005837][ T8958] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2755.011475][ T8958] __alloc_pages_slowpath+0x222b/0x2920 [ 2755.017038][ T8958] ? warn_alloc+0x110/0x110 [ 2755.021545][ T8958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2755.027788][ T8958] ? should_fail+0x1de/0x852 [ 2755.032388][ T8958] ? __kasan_check_read+0x11/0x20 [ 2755.037416][ T8958] __alloc_pages_nodemask+0x646/0x910 [ 2755.042794][ T8958] ? xas_descend+0x144/0x370 [ 2755.047409][ T8958] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2755.053214][ T8958] ? __kasan_check_read+0x11/0x20 [ 2755.058241][ T8958] ? find_get_entry+0x4a6/0x7a0 [ 2755.063096][ T8958] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2755.069341][ T8958] alloc_pages_current+0x107/0x210 [ 2755.074456][ T8958] __page_cache_alloc+0x29d/0x490 [ 2755.079486][ T8958] pagecache_get_page+0x27e/0x9e0 [ 2755.084509][ T8958] ? __kasan_check_read+0x11/0x20 [ 2755.089536][ T8958] filemap_fault+0x9b1/0x3180 [ 2755.094207][ T8958] ? mark_held_locks+0xf0/0xf0 [ 2755.098987][ T8958] ? read_cache_page_gfp+0x30/0x30 [ 2755.104101][ T8958] ? __kasan_check_write+0x14/0x20 [ 2755.109215][ T8958] ? down_read+0x109/0x430 [ 2755.113627][ T8958] ? down_read_killable+0x490/0x490 [ 2755.118824][ T8958] ? find_lock_entry+0x650/0x650 [ 2755.123766][ T8958] ? pmd_val+0x85/0x100 [ 2755.127932][ T8958] ext4_filemap_fault+0x86/0xb2 [ 2755.132955][ T8958] __do_fault+0x111/0x540 [ 2755.137291][ T8958] __handle_mm_fault+0x2943/0x3da0 [ 2755.142420][ T8958] ? vm_iomap_memory+0x1a0/0x1a0 [ 2755.147355][ T8958] ? handle_mm_fault+0x292/0xa50 [ 2755.152298][ T8958] ? handle_mm_fault+0x7a0/0xa50 [ 2755.157234][ T8958] ? __kasan_check_read+0x11/0x20 [ 2755.162264][ T8958] handle_mm_fault+0x3b2/0xa50 [ 2755.167041][ T8958] __do_page_fault+0x536/0xd80 [ 2755.171808][ T8958] ? page_fault+0x16/0x40 [ 2755.176148][ T8958] do_page_fault+0x38/0x590 [ 2755.180659][ T8958] page_fault+0x39/0x40 [ 2755.184811][ T8958] RIP: 0033:0x7f85c97be1fd [ 2755.189235][ T8958] Code: Bad RIP value. [ 2755.193298][ T8958] RSP: 002b:00007f85c6d5de30 EFLAGS: 00010293 [ 2755.199362][ T8958] RAX: 00000000000000c5 RBX: 0000000000f0b170 RCX: 00007f85c97be1fd [ 2755.207338][ T8958] RDX: 0000000000000fff RSI: 00007f85c85925a0 RDI: 0000000000000004 [ 2755.215305][ T8958] RBP: 0000000000000000 R08: 0000000000ef6260 R09: 0000000004000001 [ 2755.223271][ T8958] R10: 0000000000000001 R11: 0000000000000293 R12: 000000000065e420 [ 2755.231276][ T8958] R13: 00007f85c6d5e9c0 R14: 00007f85c9e03040 R15: 0000000000000003 [ 2755.266363][ T8958] Mem-Info: [ 2755.269573][ T8958] active_anon:179411 inactive_anon:4304 isolated_anon:0 [ 2755.269573][ T8958] active_file:22 inactive_file:600 isolated_file:64 [ 2755.269573][ T8958] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2755.269573][ T8958] slab_reclaimable:12426 slab_unreclaimable:106551 [ 2755.269573][ T8958] mapped:52226 shmem:4382 pagetables:3509 bounce:0 [ 2755.269573][ T8958] free:15491 free_pcp:377 free_cma:0 [ 2755.462862][ T8958] Node 0 active_anon:717640kB inactive_anon:17216kB active_file:80kB inactive_file:2628kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 548864kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2755.491797][ C0] net_ratelimit: 14 callbacks suppressed [ 2755.491806][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2755.491882][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2755.627465][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2755.634320][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2755.642032][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2755.648100][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2755.665232][ T8958] Node 1 active_anon:4kB inactive_anon:0kB active_file:8kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2755.733386][ T8958] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2755.793707][ T8958] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2755.825739][ T8958] Node 0 DMA32 free:24084kB min:48392kB low:57416kB high:66440kB reserved_highatomic:0KB active_anon:717608kB inactive_anon:17216kB active_file:40kB inactive_file:2644kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10256kB pagetables:14040kB bounce:0kB free_pcp:920kB local_pcp:252kB free_cma:0kB [ 2756.013097][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2756.056131][ T8958] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2756.186070][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2756.191907][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2756.244480][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2756.276489][ T8958] Node 1 Normal free:26824kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:504kB local_pcp:252kB free_cma:0kB [ 2756.425571][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2756.430537][ T8958] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2756.476117][ T8958] Node 0 DMA32: 2643*4kB (UME) 885*8kB (ME) 214*16kB (ME) 56*32kB (UM) 1*64kB (U) 1*128kB (U) 0*256kB 0*512kB 1*1024kB (U) 0*2048kB 0*4096kB = 24084kB [ 2756.576082][ T8958] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2756.636361][ T8958] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 4*64kB (ME) 0*128kB 3*256kB (UME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26824kB [ 2756.706084][ T8958] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2756.773979][ T8958] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2756.824354][ T8958] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2756.878878][ T8958] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2756.895596][ T8958] 5075 total pagecache pages [ 2756.900282][ T8958] 0 pages in swap cache [ 2756.904448][ T8958] Swap cache stats: add 0, delete 0, find 0/0 [ 2756.916148][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2756.922033][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2756.925828][ T8958] Free swap = 0kB [ 2756.931727][ T8958] Total swap = 0kB [ 2756.935459][ T8958] 1965979 pages RAM [ 2756.956104][ T8958] 0 pages HighMem/MovableOnly [ 2756.960832][ T8958] 344068 pages reserved [ 2756.965122][ T8958] 0 pages cma reserved [ 2756.969656][ T8958] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=18201,uid=0 [ 2756.984512][ T8958] Out of memory: Killed process 18201 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:172032kB oom_score_adj:1000 [ 2757.106821][ T1] init invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2757.200787][ T1] CPU: 0 PID: 1 Comm: init Not tainted 5.5.0-rc1-syzkaller #0 [ 2757.208320][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2757.218731][ T1] Call Trace: [ 2757.222033][ T1] dump_stack+0x197/0x210 [ 2757.226373][ T1] dump_header+0x10b/0x82d [ 2757.230794][ T1] ? oom_kill_process+0x94/0x420 [ 2757.235745][ T1] oom_kill_process.cold+0x10/0x15 [ 2757.240863][ T1] out_of_memory+0x334/0x13c0 [ 2757.245568][ T1] ? oom_killer_disable+0x280/0x280 [ 2757.250781][ T1] ? mutex_trylock+0x264/0x2f0 [ 2757.255550][ T1] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2757.261185][ T1] __alloc_pages_slowpath+0x222b/0x2920 [ 2757.266750][ T1] ? warn_alloc+0x110/0x110 [ 2757.271259][ T1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2757.277622][ T1] ? should_fail+0x1de/0x852 [ 2757.282222][ T1] ? __kasan_check_read+0x11/0x20 [ 2757.287360][ T1] __alloc_pages_nodemask+0x646/0x910 [ 2757.292745][ T1] ? xas_descend+0x144/0x370 [ 2757.297341][ T1] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2757.303233][ T1] ? __kasan_check_read+0x11/0x20 [ 2757.308265][ T1] ? find_get_entry+0x4a6/0x7a0 [ 2757.313127][ T1] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2757.319429][ T1] alloc_pages_current+0x107/0x210 [ 2757.324556][ T1] __page_cache_alloc+0x29d/0x490 [ 2757.329593][ T1] pagecache_get_page+0x27e/0x9e0 [ 2757.334621][ T1] ? __kasan_check_read+0x11/0x20 [ 2757.340207][ T1] filemap_fault+0x9b1/0x3180 [ 2757.344890][ T1] ? mark_held_locks+0xf0/0xf0 [ 2757.349673][ T1] ? read_cache_page_gfp+0x30/0x30 [ 2757.354813][ T1] ? __kasan_check_write+0x14/0x20 [ 2757.359938][ T1] ? down_read+0x109/0x430 [ 2757.364353][ T1] ? down_read_killable+0x490/0x490 [ 2757.369558][ T1] ? lock_downgrade+0x920/0x920 [ 2757.374416][ T1] ext4_filemap_fault+0x86/0xb2 [ 2757.379271][ T1] __do_fault+0x111/0x540 [ 2757.383619][ T1] ? do_raw_spin_unlock+0x178/0x270 [ 2757.388837][ T1] __handle_mm_fault+0x2943/0x3da0 [ 2757.393966][ T1] ? vm_iomap_memory+0x1a0/0x1a0 [ 2757.398935][ T1] ? handle_mm_fault+0x292/0xa50 [ 2757.404026][ T1] ? handle_mm_fault+0x7a0/0xa50 [ 2757.408984][ T1] ? __kasan_check_read+0x11/0x20 [ 2757.414110][ T1] handle_mm_fault+0x3b2/0xa50 [ 2757.418987][ T1] __do_page_fault+0x536/0xd80 [ 2757.423755][ T1] ? page_fault+0x16/0x40 [ 2757.428103][ T1] do_page_fault+0x38/0x590 [ 2757.432698][ T1] page_fault+0x39/0x40 [ 2757.436875][ T1] RIP: 0033:0x4059bb [ 2757.440779][ T1] Code: Bad RIP value. [ 2757.444848][ T1] RSP: 002b:00007fffc1dc2290 EFLAGS: 00010202 [ 2757.450999][ T1] RAX: 0000000000000000 RBX: 00007fffc1dc23b0 RCX: 00007f05668f4dd3 [ 2757.458990][ T1] RDX: 0000000000000000 RSI: 00007fffc1dc21c0 RDI: 000000000000000b [ 2757.467017][ T1] RBP: 0000000000000000 R08: 00007fffc1dc2240 R09: 0000000000000001 [ 2757.475008][ T1] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2757.483157][ T1] R13: 00007fffc1dc25a0 R14: 0000000000000000 R15: 0000000000000000 [ 2757.939817][ T1] Mem-Info: [ 2757.943021][ T1] active_anon:178857 inactive_anon:4304 isolated_anon:0 [ 2757.943021][ T1] active_file:21 inactive_file:660 isolated_file:32 [ 2757.943021][ T1] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2757.943021][ T1] slab_reclaimable:12426 slab_unreclaimable:107487 [ 2757.943021][ T1] mapped:52226 shmem:4382 pagetables:3476 bounce:0 [ 2757.943021][ T1] free:15394 free_pcp:179 free_cma:0 [ 2758.101112][ T1] Node 0 active_anon:715424kB inactive_anon:17216kB active_file:80kB inactive_file:2504kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 544768kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2758.156090][ T1] Node 1 active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2758.311503][ T1] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2758.394022][ T1] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2758.402822][ T1] Node 0 DMA32 free:22080kB min:42248kB low:51272kB high:60296kB reserved_highatomic:0KB active_anon:715424kB inactive_anon:17216kB active_file:48kB inactive_file:2688kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10224kB pagetables:13900kB bounce:0kB free_pcp:640kB local_pcp:532kB free_cma:0kB [ 2758.486005][ T1] lowmem_reserve[]: 0 0 0 0 0 [ 2758.490763][ T1] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2758.632532][ T1] lowmem_reserve[]: 0 0 0 0 0 [ 2758.637814][ T1] Node 1 Normal free:26808kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2758.688328][ T1] lowmem_reserve[]: 0 0 0 0 0 [ 2758.693064][ T1] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2758.813162][ T1] Node 0 DMA32: 2592*4kB (UME) 825*8kB (UME) 197*16kB (UME) 53*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 21816kB [ 2758.883387][ T1] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2758.954461][ T1] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 5*64kB (UME) 1*128kB (U) 2*256kB (ME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26760kB [ 2759.026230][ T1] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2759.035837][ T1] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2759.076887][ T1] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2759.092861][ T1] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2759.102208][ T1] 5075 total pagecache pages [ 2759.122252][ T1] 0 pages in swap cache [ 2759.130030][ T1] Swap cache stats: add 0, delete 0, find 0/0 [ 2759.148765][ T1] Free swap = 0kB [ 2759.152499][ T1] Total swap = 0kB [ 2759.193919][ T1] 1965979 pages RAM [ 2759.220910][ T1] 0 pages HighMem/MovableOnly [ 2759.225646][ T1] 344068 pages reserved [ 2759.258100][ T1] 0 pages cma reserved [ 2759.262225][ T1] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=5880,uid=0 [ 2759.334161][ T1] Out of memory: Killed process 5880 (syz-executor.4) total-vm:72980kB, anon-rss:2244kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:163840kB oom_score_adj:1000 [ 2759.584501][ T8591] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2759.642290][ T8591] CPU: 1 PID: 8591 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 2759.650588][ T8591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2759.660662][ T8591] Call Trace: [ 2759.663967][ T8591] dump_stack+0x197/0x210 [ 2759.668309][ T8591] dump_header+0x10b/0x82d [ 2759.672731][ T8591] ? oom_kill_process+0x94/0x420 [ 2759.677669][ T8591] oom_kill_process.cold+0x10/0x15 [ 2759.682763][ T8591] out_of_memory+0x334/0x13c0 [ 2759.687423][ T8591] ? oom_killer_disable+0x280/0x280 [ 2759.692776][ T8591] ? mutex_trylock+0x264/0x2f0 [ 2759.697519][ T8591] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2759.703259][ T8591] __alloc_pages_slowpath+0x222b/0x2920 [ 2759.708808][ T8591] ? warn_alloc+0x110/0x110 [ 2759.713359][ T8591] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2759.719617][ T8591] ? should_fail+0x1de/0x852 [ 2759.724216][ T8591] ? __kasan_check_read+0x11/0x20 [ 2759.729344][ T8591] __alloc_pages_nodemask+0x646/0x910 [ 2759.734706][ T8591] ? xas_descend+0x144/0x370 [ 2759.739408][ T8591] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2759.745338][ T8591] ? __kasan_check_read+0x11/0x20 [ 2759.750348][ T8591] ? find_get_entry+0x4a6/0x7a0 [ 2759.755183][ T8591] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2759.761437][ T8591] alloc_pages_current+0x107/0x210 [ 2759.766546][ T8591] __page_cache_alloc+0x29d/0x490 [ 2759.771566][ T8591] pagecache_get_page+0x27e/0x9e0 [ 2759.776567][ T8591] ? __kasan_check_read+0x11/0x20 [ 2759.781587][ T8591] filemap_fault+0x9b1/0x3180 [ 2759.786260][ T8591] ? mark_held_locks+0xf0/0xf0 [ 2759.791025][ T8591] ? read_cache_page_gfp+0x30/0x30 [ 2759.796117][ T8591] ? __kasan_check_write+0x14/0x20 [ 2759.801225][ T8591] ? down_read+0x109/0x430 [ 2759.805639][ T8591] ? down_read_killable+0x490/0x490 [ 2759.810825][ T8591] ? find_lock_entry+0x650/0x650 [ 2759.815741][ T8591] ? pmd_val+0x85/0x100 [ 2759.819896][ T8591] ext4_filemap_fault+0x86/0xb2 [ 2759.824731][ T8591] __do_fault+0x111/0x540 [ 2759.829061][ T8591] __handle_mm_fault+0x2943/0x3da0 [ 2759.834172][ T8591] ? vm_iomap_memory+0x1a0/0x1a0 [ 2759.839092][ T8591] ? handle_mm_fault+0x292/0xa50 [ 2759.844153][ T8591] ? handle_mm_fault+0x7a0/0xa50 [ 2759.849072][ T8591] ? __kasan_check_read+0x11/0x20 [ 2759.854102][ T8591] handle_mm_fault+0x3b2/0xa50 [ 2759.859094][ T8591] __do_page_fault+0x536/0xd80 [ 2759.863889][ T8591] do_page_fault+0x38/0x590 [ 2759.868377][ T8591] page_fault+0x39/0x40 [ 2759.872511][ T8591] RIP: 0033:0x40f9c0 [ 2759.876571][ T8591] Code: Bad RIP value. [ 2759.880617][ T8591] RSP: 002b:000000c420025ef8 EFLAGS: 00010216 [ 2759.886658][ T8591] RAX: ffffffffffffff92 RBX: 000000001dde88c3 RCX: 000000000045ddf3 [ 2759.894620][ T8591] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000191fa20 [ 2759.902578][ T8591] RBP: 000000c420025f20 R08: 0000000000000000 R09: 0000000000000000 [ 2759.910552][ T8591] R10: 000000c420025ed8 R11: 0000000000000206 R12: 0000000000000001 [ 2759.918627][ T8591] R13: 0000000000000020 R14: 0000000000000013 R15: 0000000000000004 [ 2759.936995][ T8591] Mem-Info: [ 2759.940201][ T8591] active_anon:178317 inactive_anon:4304 isolated_anon:0 [ 2759.940201][ T8591] active_file:0 inactive_file:658 isolated_file:0 [ 2759.940201][ T8591] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2759.940201][ T8591] slab_reclaimable:12426 slab_unreclaimable:108524 [ 2759.940201][ T8591] mapped:52226 shmem:4382 pagetables:3439 bounce:0 [ 2759.940201][ T8591] free:14817 free_pcp:259 free_cma:0 [ 2759.998479][ T8591] Node 0 active_anon:713232kB inactive_anon:17216kB active_file:80kB inactive_file:2652kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 542720kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2760.117507][ T8591] Node 1 active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2760.148790][ T8591] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2760.177789][ T8591] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2760.183706][ T8591] Node 0 DMA32 free:22076kB min:44296kB low:53320kB high:62344kB reserved_highatomic:0KB active_anon:713232kB inactive_anon:17216kB active_file:72kB inactive_file:2572kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10192kB pagetables:13768kB bounce:0kB free_pcp:1000kB local_pcp:208kB free_cma:0kB [ 2760.216137][ T8591] lowmem_reserve[]: 0 0 0 0 0 [ 2760.220924][ T8591] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2760.363199][ T8591] lowmem_reserve[]: 0 0 0 0 0 [ 2760.368057][ T8591] Node 1 Normal free:26760kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2760.436380][ T8591] lowmem_reserve[]: 0 0 0 0 0 [ 2760.441148][ T8591] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2760.527040][ T8591] Node 0 DMA32: 2529*4kB (UME) 821*8kB (ME) 197*16kB (UME) 52*32kB (UM) 1*64kB (U) 0*128kB 0*256kB 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 22076kB [ 2760.583112][ T8591] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2760.594770][ T8591] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 5*64kB (UME) 1*128kB (U) 2*256kB (ME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26760kB [ 2760.655040][ T8591] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2760.704145][ T8591] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2760.755533][ T8591] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2760.802921][ T8591] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2760.813642][ T8591] 5075 total pagecache pages [ 2760.824480][ T8591] 0 pages in swap cache [ 2760.848181][ T8591] Swap cache stats: add 0, delete 0, find 0/0 [ 2760.854289][ T8591] Free swap = 0kB [ 2760.896073][ T8591] Total swap = 0kB [ 2760.899851][ T8591] 1965979 pages RAM [ 2760.903669][ T8591] 0 pages HighMem/MovableOnly [ 2760.980578][ T8591] 344068 pages reserved [ 2760.984787][ T8591] 0 pages cma reserved [ 2761.009636][ T8591] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=5547,uid=0 [ 2761.024454][ T8591] Out of memory: Killed process 5547 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:167936kB oom_score_adj:1000 [ 2761.066120][ C0] net_ratelimit: 18 callbacks suppressed [ 2761.066129][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2761.077924][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2761.173806][ T8958] rsyslogd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2761.225801][ T8958] CPU: 0 PID: 8958 Comm: rsyslogd Not tainted 5.5.0-rc1-syzkaller #0 [ 2761.233946][ T8958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2761.246266][ T8958] Call Trace: [ 2761.249583][ T8958] dump_stack+0x197/0x210 [ 2761.253917][ T8958] dump_header+0x10b/0x82d [ 2761.258336][ T8958] ? oom_kill_process+0x94/0x420 [ 2761.263281][ T8958] oom_kill_process.cold+0x10/0x15 [ 2761.268420][ T8958] out_of_memory+0x334/0x13c0 [ 2761.273102][ T8958] ? oom_killer_disable+0x280/0x280 [ 2761.278302][ T8958] ? mutex_trylock+0x264/0x2f0 [ 2761.283088][ T8958] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2761.288723][ T8958] __alloc_pages_slowpath+0x222b/0x2920 [ 2761.294393][ T8958] ? warn_alloc+0x110/0x110 [ 2761.298930][ T8958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2761.305191][ T8958] ? should_fail+0x1de/0x852 [ 2761.309800][ T8958] ? __kasan_check_read+0x11/0x20 [ 2761.314849][ T8958] __alloc_pages_nodemask+0x646/0x910 [ 2761.320234][ T8958] ? xas_descend+0x144/0x370 [ 2761.324838][ T8958] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2761.330585][ T8958] ? __kasan_check_read+0x11/0x20 [ 2761.335646][ T8958] ? find_get_entry+0x4a6/0x7a0 [ 2761.340507][ T8958] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2761.346761][ T8958] alloc_pages_current+0x107/0x210 [ 2761.351911][ T8958] __page_cache_alloc+0x29d/0x490 [ 2761.357296][ T8958] pagecache_get_page+0x27e/0x9e0 [ 2761.362606][ T8958] ? __kasan_check_read+0x11/0x20 [ 2761.367657][ T8958] filemap_fault+0x9b1/0x3180 [ 2761.372337][ T8958] ? mark_held_locks+0xf0/0xf0 [ 2761.377204][ T8958] ? read_cache_page_gfp+0x30/0x30 [ 2761.382329][ T8958] ? __kasan_check_write+0x14/0x20 [ 2761.387446][ T8958] ? down_read+0x109/0x430 [ 2761.391865][ T8958] ? down_read_killable+0x490/0x490 [ 2761.397066][ T8958] ? find_lock_entry+0x650/0x650 [ 2761.402002][ T8958] ? pmd_val+0x85/0x100 [ 2761.406166][ T8958] ext4_filemap_fault+0x86/0xb2 [ 2761.411019][ T8958] __do_fault+0x111/0x540 [ 2761.415355][ T8958] __handle_mm_fault+0x2943/0x3da0 [ 2761.420475][ T8958] ? vm_iomap_memory+0x1a0/0x1a0 [ 2761.425419][ T8958] ? handle_mm_fault+0x292/0xa50 [ 2761.430370][ T8958] ? handle_mm_fault+0x7a0/0xa50 [ 2761.435489][ T8958] ? __kasan_check_read+0x11/0x20 [ 2761.440539][ T8958] handle_mm_fault+0x3b2/0xa50 [ 2761.445328][ T8958] __do_page_fault+0x536/0xd80 [ 2761.450121][ T8958] ? page_fault+0x16/0x40 [ 2761.454475][ T8958] do_page_fault+0x38/0x590 [ 2761.458989][ T8958] page_fault+0x39/0x40 [ 2761.463147][ T8958] RIP: 0033:0x7f85c97be1fd [ 2761.467597][ T8958] Code: Bad RIP value. [ 2761.471749][ T8958] RSP: 002b:00007f85c6d5de30 EFLAGS: 00010293 [ 2761.477812][ T8958] RAX: 00000000000000c5 RBX: 0000000000f0b170 RCX: 00007f85c97be1fd [ 2761.485790][ T8958] RDX: 0000000000000fff RSI: 00007f85c85925a0 RDI: 0000000000000004 [ 2761.493771][ T8958] RBP: 0000000000000000 R08: 0000000000ef6260 R09: 0000000004000001 [ 2761.501752][ T8958] R10: 0000000000000001 R11: 0000000000000293 R12: 000000000065e420 [ 2761.509760][ T8958] R13: 00007f85c6d5e9c0 R14: 00007f85c9e03040 R15: 0000000000000003 [ 2761.706099][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2761.711957][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2761.866729][ T8958] Mem-Info: [ 2761.869954][ T8958] active_anon:177763 inactive_anon:4304 isolated_anon:0 [ 2761.869954][ T8958] active_file:9 inactive_file:627 isolated_file:32 [ 2761.869954][ T8958] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2761.869954][ T8958] slab_reclaimable:12426 slab_unreclaimable:109131 [ 2761.869954][ T8958] mapped:52226 shmem:4382 pagetables:3409 bounce:0 [ 2761.869954][ T8958] free:14773 free_pcp:275 free_cma:0 [ 2761.946093][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2761.949324][ T8958] Node 0 active_anon:711048kB inactive_anon:17216kB active_file:32kB inactive_file:2588kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 540672kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2761.951946][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2761.987077][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2761.992943][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2762.124676][ T8958] Node 1 active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2762.219117][ T8958] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2762.253245][ T8958] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2762.259053][ T8958] Node 0 DMA32 free:22100kB min:44296kB low:53320kB high:62344kB reserved_highatomic:0KB active_anon:711048kB inactive_anon:17216kB active_file:32kB inactive_file:2604kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10160kB pagetables:13632kB bounce:0kB free_pcp:1048kB local_pcp:704kB free_cma:0kB [ 2762.291837][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2762.296575][ T8958] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2762.349489][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2762.354261][ T8958] Node 1 Normal free:26760kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2762.437042][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2762.444079][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2762.595579][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2762.636570][ T8958] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2762.716023][ T8958] Node 0 DMA32: 2597*4kB (UME) 827*8kB (UME) 194*16kB (ME) 45*32kB (M) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 21548kB [ 2762.786457][ T8958] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2762.846765][ T8958] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 5*64kB (UME) 1*128kB (U) 2*256kB (ME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26760kB [ 2762.950755][ T8958] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2762.967576][ T8958] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2762.984726][ T8958] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2762.994332][ T8958] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2763.010500][ T8958] 5075 total pagecache pages [ 2763.015109][ T8958] 0 pages in swap cache [ 2763.029219][ T8958] Swap cache stats: add 0, delete 0, find 0/0 [ 2763.035306][ T8958] Free swap = 0kB [ 2763.070429][ T8958] Total swap = 0kB [ 2763.074193][ T8958] 1965979 pages RAM [ 2763.097787][ T8958] 0 pages HighMem/MovableOnly [ 2763.102490][ T8958] 344068 pages reserved [ 2763.138809][ T8958] 0 pages cma reserved [ 2763.142920][ T8958] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=4769,uid=0 [ 2763.248607][ T8958] Out of memory: Killed process 4769 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:167936kB oom_score_adj:1000 [ 2763.327706][ T8998] cron invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2763.385332][ T8998] CPU: 0 PID: 8998 Comm: cron Not tainted 5.5.0-rc1-syzkaller #0 [ 2763.393101][ T8998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2763.403214][ T8998] Call Trace: [ 2763.406516][ T8998] dump_stack+0x197/0x210 [ 2763.410860][ T8998] dump_header+0x10b/0x82d [ 2763.415283][ T8998] ? oom_kill_process+0x94/0x420 [ 2763.420222][ T8998] oom_kill_process.cold+0x10/0x15 [ 2763.425340][ T8998] out_of_memory+0x334/0x13c0 [ 2763.430023][ T8998] ? oom_killer_disable+0x280/0x280 [ 2763.435220][ T8998] ? mutex_trylock+0x264/0x2f0 [ 2763.439983][ T8998] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2763.445616][ T8998] __alloc_pages_slowpath+0x222b/0x2920 [ 2763.451177][ T8998] ? warn_alloc+0x110/0x110 [ 2763.455685][ T8998] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2763.461943][ T8998] ? should_fail+0x1de/0x852 [ 2763.466549][ T8998] ? __kasan_check_read+0x11/0x20 [ 2763.471582][ T8998] __alloc_pages_nodemask+0x646/0x910 [ 2763.476956][ T8998] ? xas_descend+0x144/0x370 [ 2763.481552][ T8998] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2763.487283][ T8998] ? __kasan_check_read+0x11/0x20 [ 2763.492321][ T8998] ? find_get_entry+0x4a6/0x7a0 [ 2763.497182][ T8998] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2763.503428][ T8998] alloc_pages_current+0x107/0x210 [ 2763.508547][ T8998] __page_cache_alloc+0x29d/0x490 [ 2763.513579][ T8998] pagecache_get_page+0x27e/0x9e0 [ 2763.518605][ T8998] ? __kasan_check_read+0x11/0x20 [ 2763.523634][ T8998] filemap_fault+0x9b1/0x3180 [ 2763.528398][ T8998] ? mark_held_locks+0xf0/0xf0 [ 2763.533182][ T8998] ? read_cache_page_gfp+0x30/0x30 [ 2763.538298][ T8998] ? __kasan_check_write+0x14/0x20 [ 2763.543407][ T8998] ? down_read+0x109/0x430 [ 2763.547819][ T8998] ? down_read_killable+0x490/0x490 [ 2763.553025][ T8998] ? find_lock_entry+0x650/0x650 [ 2763.557958][ T8998] ? pmd_val+0x85/0x100 [ 2763.562123][ T8998] ext4_filemap_fault+0x86/0xb2 [ 2763.566980][ T8998] __do_fault+0x111/0x540 [ 2763.571312][ T8998] __handle_mm_fault+0x2943/0x3da0 [ 2763.576427][ T8998] ? vm_iomap_memory+0x1a0/0x1a0 [ 2763.581365][ T8998] ? handle_mm_fault+0x292/0xa50 [ 2763.586311][ T8998] ? handle_mm_fault+0x7a0/0xa50 [ 2763.591260][ T8998] ? __kasan_check_read+0x11/0x20 [ 2763.596291][ T8998] handle_mm_fault+0x3b2/0xa50 [ 2763.601064][ T8998] __do_page_fault+0x536/0xd80 [ 2763.605832][ T8998] ? page_fault+0x16/0x40 [ 2763.610180][ T8998] do_page_fault+0x38/0x590 [ 2763.614689][ T8998] page_fault+0x39/0x40 [ 2763.618869][ T8998] RIP: 0033:0x7fc587b93e40 [ 2763.623304][ T8998] Code: Bad RIP value. [ 2763.627366][ T8998] RSP: 002b:00007fffe21efa08 EFLAGS: 00010246 [ 2763.633517][ T8998] RAX: 0000000000000000 RBX: 00007fffe21efb30 RCX: 00007fc587b93e40 [ 2763.641497][ T8998] RDX: 0000000000000000 RSI: 00007fffe21efbb0 RDI: 00007fffe21efbb0 [ 2763.649480][ T8998] RBP: 00007fffe21efab0 R08: 00007fffe21efa10 R09: 0000000000000000 [ 2763.657458][ T8998] R10: 0000000000000008 R11: 0000000000000246 R12: 00000000ffffffff [ 2763.665442][ T8998] R13: 00007fffe21efd10 R14: 0000000000000000 R15: 0000000000000000 [ 2763.751472][ T8998] Mem-Info: [ 2763.754663][ T8998] active_anon:177217 inactive_anon:4304 isolated_anon:0 [ 2763.754663][ T8998] active_file:18 inactive_file:620 isolated_file:32 [ 2763.754663][ T8998] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2763.754663][ T8998] slab_reclaimable:12426 slab_unreclaimable:109797 [ 2763.754663][ T8998] mapped:52226 shmem:4382 pagetables:3375 bounce:0 [ 2763.754663][ T8998] free:14823 free_pcp:160 free_cma:0 [ 2763.956109][ T8998] Node 0 active_anon:708864kB inactive_anon:17216kB active_file:68kB inactive_file:2432kB unevictable:0kB isolated(anon):0kB isolated(file):256kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 538624kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2763.997149][ T8998] Node 1 active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2764.030364][ T8998] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2764.116028][ T8998] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2764.121813][ T8998] Node 0 DMA32 free:22092kB min:44296kB low:53320kB high:62344kB reserved_highatomic:0KB active_anon:708864kB inactive_anon:17216kB active_file:68kB inactive_file:2572kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10128kB pagetables:13496kB bounce:0kB free_pcp:588kB local_pcp:408kB free_cma:0kB [ 2764.162594][ T8998] lowmem_reserve[]: 0 0 0 0 0 [ 2764.167799][ T8998] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2764.203143][ T8998] lowmem_reserve[]: 0 0 0 0 0 [ 2764.207917][ T8998] Node 1 Normal free:26760kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2764.251668][ T8998] lowmem_reserve[]: 0 0 0 0 0 [ 2764.276251][ T8998] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2764.332253][ T8998] Node 0 DMA32: 2597*4kB (UME) 766*8kB (ME) 187*16kB (UME) 44*32kB (M) 0*64kB 1*128kB (U) 0*256kB 0*512kB 1*1024kB (U) 0*2048kB 0*4096kB = 22068kB [ 2764.442868][ T8998] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2764.518720][ T8998] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 5*64kB (UME) 1*128kB (U) 2*256kB (ME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26760kB [ 2764.621467][ T8998] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2764.690420][ T8998] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2764.706041][ T8998] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2764.715613][ T8998] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2764.738838][ T8998] 5075 total pagecache pages [ 2764.743657][ T8998] 0 pages in swap cache [ 2764.756654][ T8998] Swap cache stats: add 0, delete 0, find 0/0 [ 2764.762745][ T8998] Free swap = 0kB [ 2764.792056][ T8998] Total swap = 0kB [ 2764.795817][ T8998] 1965979 pages RAM [ 2764.835138][ T8998] 0 pages HighMem/MovableOnly [ 2764.854158][ T8998] 344068 pages reserved [ 2764.881181][ T8998] 0 pages cma reserved [ 2764.885291][ T8998] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=1759,uid=0 [ 2764.917058][ T8998] Out of memory: Killed process 1759 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:167936kB oom_score_adj:1000 [ 2765.008063][ T8591] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2765.072131][ T8591] CPU: 0 PID: 8591 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 2765.080426][ T8591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2765.090778][ T8591] Call Trace: [ 2765.094079][ T8591] dump_stack+0x197/0x210 [ 2765.098773][ T8591] dump_header+0x10b/0x82d [ 2765.103190][ T8591] ? oom_kill_process+0x94/0x420 [ 2765.108132][ T8591] oom_kill_process.cold+0x10/0x15 [ 2765.113257][ T8591] out_of_memory+0x334/0x13c0 [ 2765.117942][ T8591] ? oom_killer_disable+0x280/0x280 [ 2765.123232][ T8591] ? mutex_trylock+0x264/0x2f0 [ 2765.128082][ T8591] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2765.133714][ T8591] __alloc_pages_slowpath+0x222b/0x2920 [ 2765.139299][ T8591] ? warn_alloc+0x110/0x110 [ 2765.143807][ T8591] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2765.150161][ T8591] ? should_fail+0x1de/0x852 [ 2765.154762][ T8591] ? __kasan_check_read+0x11/0x20 [ 2765.159794][ T8591] __alloc_pages_nodemask+0x646/0x910 [ 2765.165166][ T8591] ? xas_descend+0x144/0x370 [ 2765.169781][ T8591] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2765.175498][ T8591] ? __kasan_check_read+0x11/0x20 [ 2765.180532][ T8591] ? find_get_entry+0x4a6/0x7a0 [ 2765.185390][ T8591] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2765.191650][ T8591] alloc_pages_current+0x107/0x210 [ 2765.196775][ T8591] __page_cache_alloc+0x29d/0x490 [ 2765.201894][ T8591] pagecache_get_page+0x27e/0x9e0 [ 2765.206919][ T8591] ? __kasan_check_read+0x11/0x20 [ 2765.211946][ T8591] filemap_fault+0x9b1/0x3180 [ 2765.216627][ T8591] ? mark_held_locks+0xf0/0xf0 [ 2765.221407][ T8591] ? read_cache_page_gfp+0x30/0x30 [ 2765.226525][ T8591] ? __kasan_check_write+0x14/0x20 [ 2765.231659][ T8591] ? down_read+0x109/0x430 [ 2765.236072][ T8591] ? down_read_killable+0x490/0x490 [ 2765.241274][ T8591] ? find_lock_entry+0x650/0x650 [ 2765.246391][ T8591] ? pmd_val+0x85/0x100 [ 2765.250550][ T8591] ext4_filemap_fault+0x86/0xb2 [ 2765.255402][ T8591] __do_fault+0x111/0x540 [ 2765.259742][ T8591] __handle_mm_fault+0x2943/0x3da0 [ 2765.264879][ T8591] ? vm_iomap_memory+0x1a0/0x1a0 [ 2765.269853][ T8591] ? handle_mm_fault+0x292/0xa50 [ 2765.274975][ T8591] ? handle_mm_fault+0x7a0/0xa50 [ 2765.279919][ T8591] ? __kasan_check_read+0x11/0x20 [ 2765.284954][ T8591] handle_mm_fault+0x3b2/0xa50 [ 2765.289728][ T8591] __do_page_fault+0x536/0xd80 [ 2765.294505][ T8591] do_page_fault+0x38/0x590 [ 2765.299021][ T8591] page_fault+0x39/0x40 [ 2765.303175][ T8591] RIP: 0033:0x40f9c0 [ 2765.307169][ T8591] Code: Bad RIP value. [ 2765.311320][ T8591] RSP: 002b:000000c420025ef8 EFLAGS: 00010216 [ 2765.317385][ T8591] RAX: ffffffffffffff92 RBX: 000000001dde88c3 RCX: 000000000045ddf3 [ 2765.325360][ T8591] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000191fa20 [ 2765.333348][ T8591] RBP: 000000c420025f20 R08: 0000000000000000 R09: 0000000000000000 [ 2765.341345][ T8591] R10: 000000c420025ed8 R11: 0000000000000206 R12: 0000000000000001 [ 2765.349327][ T8591] R13: 0000000000000020 R14: 0000000000000013 R15: 0000000000000004 [ 2765.383522][ T8591] Mem-Info: [ 2765.386837][ T8591] active_anon:176677 inactive_anon:4304 isolated_anon:0 [ 2765.386837][ T8591] active_file:10 inactive_file:660 isolated_file:0 [ 2765.386837][ T8591] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2765.386837][ T8591] slab_reclaimable:12426 slab_unreclaimable:110242 [ 2765.386837][ T8591] mapped:52226 shmem:4382 pagetables:3338 bounce:0 [ 2765.386837][ T8591] free:14965 free_pcp:188 free_cma:0 [ 2765.566357][ T8591] Node 0 active_anon:706704kB inactive_anon:17216kB active_file:36kB inactive_file:2604kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 538624kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2765.726957][ T8591] Node 1 active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2765.813492][ T8591] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2765.844429][ T8591] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2765.850277][ T8591] Node 0 DMA32 free:22124kB min:44296kB low:53320kB high:62344kB reserved_highatomic:0KB active_anon:706672kB inactive_anon:17216kB active_file:80kB inactive_file:2620kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10096kB pagetables:13360kB bounce:0kB free_pcp:688kB local_pcp:584kB free_cma:0kB [ 2765.929277][ T8591] lowmem_reserve[]: 0 0 0 0 0 [ 2765.934024][ T8591] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2766.012816][ T8591] lowmem_reserve[]: 0 0 0 0 0 [ 2766.019865][ T8591] Node 1 Normal free:26760kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2766.065586][ T8591] lowmem_reserve[]: 0 0 0 0 0 [ 2766.082252][ T8591] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2766.106083][ C1] net_ratelimit: 14 callbacks suppressed [ 2766.106091][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2766.117681][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2766.123515][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2766.129335][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2766.156118][ T8591] Node 0 DMA32: 2597*4kB (UME) 767*8kB (UME) 186*16kB (ME) 44*32kB (M) 1*64kB (U) 1*128kB (U) 0*256kB 0*512kB 1*1024kB (U) 0*2048kB 0*4096kB = 22124kB [ 2766.216707][ T8591] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2766.271803][ T8591] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 5*64kB (UME) 1*128kB (U) 2*256kB (ME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26760kB [ 2766.345151][ T8591] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2766.355249][ T8591] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2766.364584][ T8591] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2766.374357][ T8591] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2766.383683][ T8591] 5075 total pagecache pages [ 2766.388405][ T8591] 0 pages in swap cache [ 2766.392744][ T8591] Swap cache stats: add 0, delete 0, find 0/0 [ 2766.398955][ T8591] Free swap = 0kB [ 2766.402753][ T8591] Total swap = 0kB [ 2766.406600][ T8591] 1965979 pages RAM [ 2766.410403][ T8591] 0 pages HighMem/MovableOnly [ 2766.415355][ T8591] 344068 pages reserved [ 2766.432877][ T8591] 0 pages cma reserved [ 2766.445461][ T8591] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=23554,uid=0 [ 2766.477805][ T8591] Out of memory: Killed process 23554 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:167936kB oom_score_adj:1000 [ 2766.563498][ T8998] cron invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2766.586086][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2766.592019][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2766.635016][ T8998] CPU: 0 PID: 8998 Comm: cron Not tainted 5.5.0-rc1-syzkaller #0 [ 2766.642861][ T8998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2766.653085][ T8998] Call Trace: [ 2766.656382][ T8998] dump_stack+0x197/0x210 [ 2766.660725][ T8998] dump_header+0x10b/0x82d [ 2766.665143][ T8998] ? oom_kill_process+0x94/0x420 [ 2766.670093][ T8998] oom_kill_process.cold+0x10/0x15 [ 2766.675211][ T8998] out_of_memory+0x334/0x13c0 [ 2766.679919][ T8998] ? oom_killer_disable+0x280/0x280 [ 2766.685125][ T8998] ? mutex_trylock+0x264/0x2f0 [ 2766.689892][ T8998] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2766.695527][ T8998] __alloc_pages_slowpath+0x222b/0x2920 [ 2766.701101][ T8998] ? warn_alloc+0x110/0x110 [ 2766.705614][ T8998] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2766.711908][ T8998] ? should_fail+0x1de/0x852 [ 2766.716518][ T8998] ? __kasan_check_read+0x11/0x20 [ 2766.721636][ T8998] __alloc_pages_nodemask+0x646/0x910 [ 2766.727013][ T8998] ? xas_descend+0x144/0x370 [ 2766.731635][ T8998] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2766.737354][ T8998] ? __kasan_check_read+0x11/0x20 [ 2766.742386][ T8998] ? find_get_entry+0x4a6/0x7a0 [ 2766.747240][ T8998] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2766.753660][ T8998] alloc_pages_current+0x107/0x210 [ 2766.758803][ T8998] __page_cache_alloc+0x29d/0x490 [ 2766.764270][ T8998] pagecache_get_page+0x27e/0x9e0 [ 2766.769471][ T8998] ? __kasan_check_read+0x11/0x20 [ 2766.774504][ T8998] filemap_fault+0x9b1/0x3180 [ 2766.779186][ T8998] ? mark_held_locks+0xf0/0xf0 [ 2766.783985][ T8998] ? read_cache_page_gfp+0x30/0x30 [ 2766.789114][ T8998] ? __kasan_check_write+0x14/0x20 [ 2766.794229][ T8998] ? down_read+0x109/0x430 [ 2766.798647][ T8998] ? down_read_killable+0x490/0x490 [ 2766.803853][ T8998] ? find_lock_entry+0x650/0x650 [ 2766.808791][ T8998] ? pmd_val+0x85/0x100 [ 2766.812952][ T8998] ext4_filemap_fault+0x86/0xb2 [ 2766.817811][ T8998] __do_fault+0x111/0x540 [ 2766.822232][ T8998] __handle_mm_fault+0x2943/0x3da0 [ 2766.827352][ T8998] ? vm_iomap_memory+0x1a0/0x1a0 [ 2766.832459][ T8998] ? handle_mm_fault+0x292/0xa50 [ 2766.837419][ T8998] ? handle_mm_fault+0x7a0/0xa50 [ 2766.842466][ T8998] ? __kasan_check_read+0x11/0x20 [ 2766.847509][ T8998] handle_mm_fault+0x3b2/0xa50 [ 2766.852424][ T8998] __do_page_fault+0x536/0xd80 [ 2766.857195][ T8998] ? page_fault+0x16/0x40 [ 2766.861536][ T8998] do_page_fault+0x38/0x590 [ 2766.866046][ T8998] page_fault+0x39/0x40 [ 2766.870197][ T8998] RIP: 0033:0x7fc587b93e40 [ 2766.874619][ T8998] Code: Bad RIP value. [ 2766.879115][ T8998] RSP: 002b:00007fffe21efa08 EFLAGS: 00010246 [ 2766.885180][ T8998] RAX: 0000000000000000 RBX: 00007fffe21efb30 RCX: 00007fc587b93e40 [ 2766.893153][ T8998] RDX: 0000000000000000 RSI: 00007fffe21efbb0 RDI: 00007fffe21efbb0 [ 2766.901154][ T8998] RBP: 00007fffe21efab0 R08: 00007fffe21efa10 R09: 0000000000000000 [ 2766.909132][ T8998] R10: 0000000000000008 R11: 0000000000000246 R12: 00000000ffffffff [ 2766.917130][ T8998] R13: 00007fffe21efd10 R14: 0000000000000000 R15: 0000000000000000 [ 2766.979581][ T8998] Mem-Info: [ 2766.982776][ T8998] active_anon:176123 inactive_anon:4304 isolated_anon:0 [ 2766.982776][ T8998] active_file:10 inactive_file:654 isolated_file:32 [ 2766.982776][ T8998] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2766.982776][ T8998] slab_reclaimable:12426 slab_unreclaimable:110800 [ 2766.982776][ T8998] mapped:52226 shmem:4382 pagetables:3307 bounce:0 [ 2766.982776][ T8998] free:14987 free_pcp:195 free_cma:0 [ 2767.046533][ T8998] Node 0 active_anon:704488kB inactive_anon:17216kB active_file:140kB inactive_file:2656kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 534528kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2767.223508][ T8998] Node 1 active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2767.250376][ T8998] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2767.287581][ T8998] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2767.293355][ T8998] Node 0 DMA32 free:22124kB min:36104kB low:45128kB high:54152kB reserved_highatomic:0KB active_anon:704488kB inactive_anon:17216kB active_file:40kB inactive_file:2512kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10064kB pagetables:13224kB bounce:0kB free_pcp:732kB local_pcp:556kB free_cma:0kB [ 2767.341154][ T8998] lowmem_reserve[]: 0 0 0 0 0 [ 2767.345899][ T8998] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2767.386082][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2767.391951][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2767.472805][ T8998] lowmem_reserve[]: 0 0 0 0 0 [ 2767.506893][ T8998] Node 1 Normal free:26760kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2767.686208][ T8998] lowmem_reserve[]: 0 0 0 0 0 [ 2767.691221][ T8998] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2767.798462][ T8998] Node 0 DMA32: 2585*4kB (UME) 755*8kB (UME) 184*16kB (UME) 42*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 20668kB [ 2767.883306][ T8998] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2767.951400][ T8998] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 5*64kB (UME) 1*128kB (U) 2*256kB (ME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26760kB [ 2767.957028][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2767.974468][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2768.049055][ T8998] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2768.112691][ T8998] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2768.176010][ T8998] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2768.185612][ T8998] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2768.237741][ T8998] 5075 total pagecache pages [ 2768.242396][ T8998] 0 pages in swap cache [ 2768.273206][ T8998] Swap cache stats: add 0, delete 0, find 0/0 [ 2768.306030][ T8998] Free swap = 0kB [ 2768.309807][ T8998] Total swap = 0kB [ 2768.313540][ T8998] 1965979 pages RAM [ 2768.387143][ T8998] 0 pages HighMem/MovableOnly [ 2768.391894][ T8998] 344068 pages reserved [ 2768.442912][ T8998] 0 pages cma reserved [ 2768.458686][ T8998] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=22097,uid=0 [ 2768.524251][ T8998] Out of memory: Killed process 22097 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:167936kB oom_score_adj:1000 [ 2768.709502][ T9072] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2768.773293][ T9072] CPU: 1 PID: 9072 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 2768.781578][ T9072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2768.791646][ T9072] Call Trace: [ 2768.794951][ T9072] dump_stack+0x197/0x210 [ 2768.799286][ T9072] dump_header+0x10b/0x82d [ 2768.803698][ T9072] ? oom_kill_process+0x94/0x420 [ 2768.808759][ T9072] oom_kill_process.cold+0x10/0x15 [ 2768.813880][ T9072] out_of_memory+0x334/0x13c0 [ 2768.818581][ T9072] ? oom_killer_disable+0x280/0x280 [ 2768.823793][ T9072] ? mutex_trylock+0x264/0x2f0 [ 2768.828573][ T9072] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2768.834209][ T9072] __alloc_pages_slowpath+0x222b/0x2920 [ 2768.839792][ T9072] ? warn_alloc+0x110/0x110 [ 2768.844297][ T9072] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2768.850552][ T9072] ? should_fail+0x1de/0x852 [ 2768.855146][ T9072] ? __kasan_check_read+0x11/0x20 [ 2768.860180][ T9072] __alloc_pages_nodemask+0x646/0x910 [ 2768.865556][ T9072] ? xas_descend+0x144/0x370 [ 2768.870149][ T9072] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2768.875865][ T9072] ? __kasan_check_read+0x11/0x20 [ 2768.880892][ T9072] ? find_get_entry+0x4a6/0x7a0 [ 2768.885749][ T9072] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2768.891991][ T9072] alloc_pages_current+0x107/0x210 [ 2768.897108][ T9072] __page_cache_alloc+0x29d/0x490 [ 2768.902136][ T9072] pagecache_get_page+0x27e/0x9e0 [ 2768.907180][ T9072] ? __kasan_check_read+0x11/0x20 [ 2768.912210][ T9072] filemap_fault+0x9b1/0x3180 [ 2768.916995][ T9072] ? mark_held_locks+0xf0/0xf0 [ 2768.921769][ T9072] ? read_cache_page_gfp+0x30/0x30 [ 2768.927414][ T9072] ? __kasan_check_write+0x14/0x20 [ 2768.932521][ T9072] ? down_read+0x109/0x430 [ 2768.936945][ T9072] ? down_read_killable+0x490/0x490 [ 2768.942148][ T9072] ? find_lock_entry+0x650/0x650 [ 2768.947095][ T9072] ? pmd_val+0x85/0x100 [ 2768.951258][ T9072] ext4_filemap_fault+0x86/0xb2 [ 2768.956109][ T9072] __do_fault+0x111/0x540 [ 2768.960447][ T9072] __handle_mm_fault+0x2943/0x3da0 [ 2768.965570][ T9072] ? vm_iomap_memory+0x1a0/0x1a0 [ 2768.970509][ T9072] ? handle_mm_fault+0x292/0xa50 [ 2768.975484][ T9072] ? handle_mm_fault+0x7a0/0xa50 [ 2768.980453][ T9072] ? __kasan_check_read+0x11/0x20 [ 2768.985625][ T9072] handle_mm_fault+0x3b2/0xa50 [ 2768.990427][ T9072] __do_page_fault+0x536/0xd80 [ 2768.995869][ T9072] ? page_fault+0x16/0x40 [ 2769.000188][ T9072] do_page_fault+0x38/0x590 [ 2769.004828][ T9072] page_fault+0x39/0x40 [ 2769.009175][ T9072] RIP: 0033:0x4374f8 [ 2769.013066][ T9072] Code: Bad RIP value. [ 2769.017123][ T9072] RSP: 002b:000000c420037f38 EFLAGS: 00010216 [ 2769.024312][ T9072] RAX: 0000000000000000 RBX: 0000000000000011 RCX: 000000000045d911 [ 2769.032264][ T9072] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2769.040228][ T9072] RBP: 000000c420037fb0 R08: 000000c420037f18 R09: 0000000000000000 [ 2769.048196][ T9072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000430120 [ 2769.056149][ T9072] R13: 00000000000000f1 R14: 0000000000000011 R15: 0000000000000000 [ 2769.272512][ T9072] Mem-Info: [ 2769.275726][ T9072] active_anon:175577 inactive_anon:4304 isolated_anon:0 [ 2769.275726][ T9072] active_file:39 inactive_file:645 isolated_file:0 [ 2769.275726][ T9072] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2769.275726][ T9072] slab_reclaimable:12426 slab_unreclaimable:111827 [ 2769.275726][ T9072] mapped:52226 shmem:4382 pagetables:3273 bounce:0 [ 2769.275726][ T9072] free:14622 free_pcp:118 free_cma:0 [ 2769.349293][ T9072] Node 0 active_anon:702304kB inactive_anon:17216kB active_file:152kB inactive_file:2680kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 532480kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2769.502257][ T9072] Node 1 active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2769.536551][ T9072] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2769.773035][ T9072] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2769.781001][ T9072] Node 0 DMA32 free:20472kB min:36104kB low:45128kB high:54152kB reserved_highatomic:0KB active_anon:702304kB inactive_anon:17216kB active_file:60kB inactive_file:2708kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10032kB pagetables:13088kB bounce:0kB free_pcp:400kB local_pcp:180kB free_cma:0kB [ 2769.852572][ T9072] lowmem_reserve[]: 0 0 0 0 0 [ 2769.880788][ T9072] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2769.956887][ T9072] lowmem_reserve[]: 0 0 0 0 0 [ 2769.961626][ T9072] Node 1 Normal free:26760kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2770.167202][ T9072] lowmem_reserve[]: 0 0 0 0 0 [ 2770.171950][ T9072] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2770.277564][ T9072] Node 0 DMA32: 2620*4kB (UME) 691*8kB (UME) 170*16kB (UME) 36*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 19880kB [ 2770.363850][ T9072] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2770.425908][ T9072] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 5*64kB (UME) 1*128kB (U) 2*256kB (ME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26760kB [ 2770.528600][ T9072] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2770.563674][ T9072] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2770.603649][ T9072] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2770.639358][ T9072] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2770.648965][ T9072] 5075 total pagecache pages [ 2770.653558][ T9072] 0 pages in swap cache [ 2770.664203][ T9072] Swap cache stats: add 0, delete 0, find 0/0 [ 2770.671227][ T9072] Free swap = 0kB [ 2770.675306][ T9072] Total swap = 0kB [ 2770.685744][ T9072] 1965979 pages RAM [ 2770.689617][ T9072] 0 pages HighMem/MovableOnly [ 2770.694717][ T9072] 344068 pages reserved [ 2770.714878][ T9072] 0 pages cma reserved [ 2770.723803][ T9072] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=21449,uid=0 [ 2770.817503][ T9072] Out of memory: Killed process 21449 (syz-executor.4) total-vm:72980kB, anon-rss:2240kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:167936kB oom_score_adj:1000 [ 2770.954473][ T9085] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2771.018635][ T9085] CPU: 0 PID: 9085 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 2771.027033][ T9085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2771.037089][ T9085] Call Trace: [ 2771.040413][ T9085] dump_stack+0x197/0x210 [ 2771.044748][ T9085] dump_header+0x10b/0x82d [ 2771.049174][ T9085] ? oom_kill_process+0x94/0x420 [ 2771.054205][ T9085] oom_kill_process.cold+0x10/0x15 [ 2771.059326][ T9085] out_of_memory+0x334/0x13c0 [ 2771.064006][ T9085] ? oom_killer_disable+0x280/0x280 [ 2771.069214][ T9085] ? mutex_trylock+0x264/0x2f0 [ 2771.073976][ T9085] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2771.079620][ T9085] __alloc_pages_slowpath+0x222b/0x2920 [ 2771.085189][ T9085] ? warn_alloc+0x110/0x110 [ 2771.089783][ T9085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2771.096027][ T9085] ? should_fail+0x1de/0x852 [ 2771.100646][ T9085] ? __kasan_check_read+0x11/0x20 [ 2771.105680][ T9085] __alloc_pages_nodemask+0x646/0x910 [ 2771.111055][ T9085] ? xas_descend+0x144/0x370 [ 2771.115651][ T9085] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2771.121394][ T9085] ? __kasan_check_read+0x11/0x20 [ 2771.126431][ T9085] ? find_get_entry+0x4a6/0x7a0 [ 2771.131286][ T9085] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2771.137534][ T9085] alloc_pages_current+0x107/0x210 [ 2771.142649][ T9085] __page_cache_alloc+0x29d/0x490 [ 2771.147682][ T9085] pagecache_get_page+0x27e/0x9e0 [ 2771.152705][ T9085] ? __kasan_check_read+0x11/0x20 [ 2771.157736][ T9085] filemap_fault+0x9b1/0x3180 [ 2771.162417][ T9085] ? mark_held_locks+0xf0/0xf0 [ 2771.167194][ T9085] ? read_cache_page_gfp+0x30/0x30 [ 2771.172307][ T9085] ? __kasan_check_write+0x14/0x20 [ 2771.177414][ T9085] ? down_read+0x109/0x430 [ 2771.181827][ T9085] ? down_read_killable+0x490/0x490 [ 2771.187028][ T9085] ? find_lock_entry+0x650/0x650 [ 2771.191970][ T9085] ? pmd_val+0x85/0x100 [ 2771.196136][ T9085] ext4_filemap_fault+0x86/0xb2 [ 2771.200991][ T9085] __do_fault+0x111/0x540 [ 2771.205342][ T9085] __handle_mm_fault+0x2943/0x3da0 [ 2771.210462][ T9085] ? vm_iomap_memory+0x1a0/0x1a0 [ 2771.215397][ T9085] ? handle_mm_fault+0x292/0xa50 [ 2771.220341][ T9085] ? handle_mm_fault+0x7a0/0xa50 [ 2771.225280][ T9085] ? __kasan_check_read+0x11/0x20 [ 2771.230308][ T9085] handle_mm_fault+0x3b2/0xa50 [ 2771.235082][ T9085] __do_page_fault+0x536/0xd80 [ 2771.239889][ T9085] ? page_fault+0x16/0x40 [ 2771.244244][ T9085] do_page_fault+0x38/0x590 [ 2771.248759][ T9085] page_fault+0x39/0x40 [ 2771.252914][ T9085] RIP: 0033:0x459f50 [ 2771.256819][ T9085] Code: Bad RIP value. [ 2771.260884][ T9085] RSP: 002b:000000c42f89ba90 EFLAGS: 00010213 [ 2771.266946][ T9085] RAX: 000000c4203bc120 RBX: 0000000000000000 RCX: 000000c420000180 [ 2771.274965][ T9085] RDX: 0000026a0d9d20d4 RSI: 3f742e72ec966f2f RDI: 00007ffe2aded080 [ 2771.282957][ T9085] RBP: 000000c42f89bc00 R08: 00007ffe2aded090 R09: 0000000000084082 [ 2771.290944][ T9085] R10: 000000c42f89b9e8 R11: 000000c42f89b9e0 R12: 000000c42f89bb98 [ 2771.298916][ T9085] R13: 000000c42f89bb98 R14: 0000000000000000 R15: 0000000000000000 [ 2771.404445][ T9085] Mem-Info: [ 2771.452840][ T9085] active_anon:175039 inactive_anon:4304 isolated_anon:0 [ 2771.452840][ T9085] active_file:34 inactive_file:641 isolated_file:48 [ 2771.452840][ T9085] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2771.452840][ T9085] slab_reclaimable:12426 slab_unreclaimable:112785 [ 2771.452840][ T9085] mapped:52226 shmem:4382 pagetables:3236 bounce:0 [ 2771.452840][ T9085] free:14288 free_pcp:123 free_cma:0 [ 2771.546047][ C0] net_ratelimit: 16 callbacks suppressed [ 2771.546055][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2771.557571][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2771.625415][ T9085] Node 0 active_anon:700152kB inactive_anon:17216kB active_file:124kB inactive_file:2668kB unevictable:0kB isolated(anon):0kB isolated(file):64kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 532480kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2771.802421][ T9085] Node 1 active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2771.953099][ T9085] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2772.101527][ T9085] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2772.107499][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2772.107570][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2772.126191][ T9085] Node 0 DMA32 free:19732kB min:40200kB low:49224kB high:58248kB reserved_highatomic:0KB active_anon:700120kB inactive_anon:17216kB active_file:64kB inactive_file:2688kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:10000kB pagetables:12952kB bounce:0kB free_pcp:652kB local_pcp:340kB free_cma:0kB [ 2772.199408][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2772.204160][ T9085] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2772.325173][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2772.347188][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2772.353951][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2772.361934][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2772.368539][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2772.426875][ T9085] Node 1 Normal free:26760kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2772.611723][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2772.618529][ T9085] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2772.676091][ T9085] Node 0 DMA32: 2557*4kB (UME) 666*8kB (ME) 163*16kB (ME) 31*32kB (UM) 1*64kB (U) 0*128kB 0*256kB 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 19732kB [ 2772.750551][ T9085] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2772.826120][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2772.831960][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2772.846000][ T9085] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 5*64kB (UME) 1*128kB (U) 2*256kB (ME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26760kB [ 2772.869148][ T9085] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2772.906896][ T9085] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2772.956148][ T9085] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2772.965860][ T9085] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2773.028063][ T9085] 5075 total pagecache pages [ 2773.032704][ T9085] 0 pages in swap cache [ 2773.043633][ T9085] Swap cache stats: add 0, delete 0, find 0/0 [ 2773.049784][ T9085] Free swap = 0kB [ 2773.053499][ T9085] Total swap = 0kB [ 2773.088962][ T9085] 1965979 pages RAM [ 2773.092809][ T9085] 0 pages HighMem/MovableOnly [ 2773.133096][ T9085] 344068 pages reserved [ 2773.161126][ T9085] 0 pages cma reserved [ 2773.165237][ T9085] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz4,task=syz-executor.4,pid=23894,uid=0 [ 2773.238309][ T9085] Out of memory: Killed process 23894 (syz-executor.4) total-vm:72848kB, anon-rss:2232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:172032kB oom_score_adj:1000 [ 2773.296151][ T1097] oom_reaper: reaped process 23894 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2773.349383][ T1] init invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2773.416339][ T1] CPU: 1 PID: 1 Comm: init Not tainted 5.5.0-rc1-syzkaller #0 [ 2773.423853][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2773.433910][ T1] Call Trace: [ 2773.437210][ T1] dump_stack+0x197/0x210 [ 2773.441549][ T1] dump_header+0x10b/0x82d [ 2773.445972][ T1] ? oom_kill_process+0x94/0x420 [ 2773.450922][ T1] oom_kill_process.cold+0x10/0x15 [ 2773.456046][ T1] out_of_memory+0x334/0x13c0 [ 2773.460741][ T1] ? oom_killer_disable+0x280/0x280 [ 2773.465942][ T1] ? mutex_trylock+0x264/0x2f0 [ 2773.470702][ T1] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2773.476379][ T1] __alloc_pages_slowpath+0x222b/0x2920 [ 2773.481955][ T1] ? warn_alloc+0x110/0x110 [ 2773.486480][ T1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2773.492725][ T1] ? should_fail+0x1de/0x852 [ 2773.497345][ T1] ? __kasan_check_read+0x11/0x20 [ 2773.502370][ T1] __alloc_pages_nodemask+0x646/0x910 [ 2773.507740][ T1] ? xas_descend+0x144/0x370 [ 2773.512338][ T1] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2773.518051][ T1] ? __kasan_check_read+0x11/0x20 [ 2773.523088][ T1] ? find_get_entry+0x4a6/0x7a0 [ 2773.527939][ T1] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2773.534273][ T1] alloc_pages_current+0x107/0x210 [ 2773.539392][ T1] __page_cache_alloc+0x29d/0x490 [ 2773.544419][ T1] pagecache_get_page+0x27e/0x9e0 [ 2773.549442][ T1] ? __kasan_check_read+0x11/0x20 [ 2773.554470][ T1] filemap_fault+0x9b1/0x3180 [ 2773.559147][ T1] ? mark_held_locks+0xf0/0xf0 [ 2773.564357][ T1] ? read_cache_page_gfp+0x30/0x30 [ 2773.569485][ T1] ? __kasan_check_write+0x14/0x20 [ 2773.574614][ T1] ? down_read+0x109/0x430 [ 2773.579054][ T1] ? down_read_killable+0x490/0x490 [ 2773.584289][ T1] ? lock_downgrade+0x920/0x920 [ 2773.589157][ T1] ext4_filemap_fault+0x86/0xb2 [ 2773.594019][ T1] __do_fault+0x111/0x540 [ 2773.598352][ T1] ? do_raw_spin_unlock+0x178/0x270 [ 2773.603574][ T1] __handle_mm_fault+0x2943/0x3da0 [ 2773.608698][ T1] ? vm_iomap_memory+0x1a0/0x1a0 [ 2773.613638][ T1] ? handle_mm_fault+0x292/0xa50 [ 2773.618591][ T1] ? handle_mm_fault+0x7a0/0xa50 [ 2773.623536][ T1] ? __kasan_check_read+0x11/0x20 [ 2773.628558][ T1] handle_mm_fault+0x3b2/0xa50 [ 2773.633327][ T1] __do_page_fault+0x536/0xd80 [ 2773.638084][ T1] ? page_fault+0x16/0x40 [ 2773.642420][ T1] do_page_fault+0x38/0x590 [ 2773.646923][ T1] page_fault+0x39/0x40 [ 2773.651071][ T1] RIP: 0033:0x4059bb [ 2773.654974][ T1] Code: Bad RIP value. [ 2773.659037][ T1] RSP: 002b:00007fffc1dc2290 EFLAGS: 00010202 [ 2773.665111][ T1] RAX: 0000000000000000 RBX: 00007fffc1dc23b0 RCX: 00007f05668f4dd3 [ 2773.673076][ T1] RDX: 0000000000000000 RSI: 00007fffc1dc21c0 RDI: 000000000000000b [ 2773.681050][ T1] RBP: 0000000000000000 R08: 00007fffc1dc2240 R09: 0000000000000001 [ 2773.689041][ T1] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2773.697108][ T1] R13: 00007fffc1dc25a0 R14: 0000000000000000 R15: 0000000000000000 [ 2773.707285][ T1] Mem-Info: [ 2773.710438][ T1] active_anon:174493 inactive_anon:4304 isolated_anon:0 [ 2773.710438][ T1] active_file:13 inactive_file:657 isolated_file:32 [ 2773.710438][ T1] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2773.710438][ T1] slab_reclaimable:12426 slab_unreclaimable:113264 [ 2773.710438][ T1] mapped:52226 shmem:4382 pagetables:3202 bounce:0 [ 2773.710438][ T1] free:14309 free_pcp:178 free_cma:0 [ 2773.748357][ T1] Node 0 active_anon:697968kB inactive_anon:17216kB active_file:44kB inactive_file:2520kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 530432kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2773.777444][ T1] Node 1 active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2773.912735][ T1] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2773.951078][ T1] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2773.996015][ T1] Node 0 DMA32 free:19468kB min:38152kB low:47176kB high:56200kB reserved_highatomic:0KB active_anon:697944kB inactive_anon:17216kB active_file:100kB inactive_file:2636kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:9972kB pagetables:12812kB bounce:0kB free_pcp:708kB local_pcp:112kB free_cma:0kB [ 2774.181607][ T1] lowmem_reserve[]: 0 0 0 0 0 [ 2774.187607][ T1] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2774.254776][ T1] lowmem_reserve[]: 0 0 0 0 0 [ 2774.284445][ T1] Node 1 Normal free:26760kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2774.359834][ T1] lowmem_reserve[]: 0 0 0 0 0 [ 2774.364581][ T1] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2774.379895][ T1] Node 0 DMA32: 2545*4kB (UME) 642*8kB (ME) 151*16kB (ME) 22*32kB (M) 1*64kB (U) 0*128kB 0*256kB 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 19012kB [ 2774.394857][ T1] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2774.406470][ T1] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 5*64kB (UME) 1*128kB (U) 2*256kB (ME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26760kB [ 2774.422592][ T1] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2774.432221][ T1] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2774.441563][ T1] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2774.451834][ T1] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2774.461233][ T1] 5075 total pagecache pages [ 2774.465821][ T1] 0 pages in swap cache [ 2774.470008][ T1] Swap cache stats: add 0, delete 0, find 0/0 [ 2774.496147][ T1] Free swap = 0kB [ 2774.499920][ T1] Total swap = 0kB [ 2774.503637][ T1] 1965979 pages RAM [ 2774.628370][ T1] 0 pages HighMem/MovableOnly [ 2774.633096][ T1] 344068 pages reserved [ 2774.679613][ T1] 0 pages cma reserved [ 2774.683834][ T1] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz3,task=syz-executor.3,pid=11740,uid=0 [ 2774.772249][ T1] Out of memory: Killed process 11740 (syz-executor.3) total-vm:72980kB, anon-rss:2232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:163840kB oom_score_adj:1000 [ 2774.971115][ T9072] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2775.026081][ T9072] CPU: 1 PID: 9072 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 2775.034373][ T9072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2775.044422][ T9072] Call Trace: [ 2775.047721][ T9072] dump_stack+0x197/0x210 [ 2775.052055][ T9072] dump_header+0x10b/0x82d [ 2775.056473][ T9072] ? oom_kill_process+0x94/0x420 [ 2775.061418][ T9072] oom_kill_process.cold+0x10/0x15 [ 2775.066527][ T9072] out_of_memory+0x334/0x13c0 [ 2775.071205][ T9072] ? oom_killer_disable+0x280/0x280 [ 2775.076402][ T9072] ? mutex_trylock+0x264/0x2f0 [ 2775.081159][ T9072] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2775.086817][ T9072] __alloc_pages_slowpath+0x222b/0x2920 [ 2775.092395][ T9072] ? warn_alloc+0x110/0x110 [ 2775.096898][ T9072] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2775.103169][ T9072] ? should_fail+0x1de/0x852 [ 2775.107765][ T9072] ? __kasan_check_read+0x11/0x20 [ 2775.112812][ T9072] __alloc_pages_nodemask+0x646/0x910 [ 2775.118198][ T9072] ? xas_descend+0x144/0x370 [ 2775.122793][ T9072] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2775.128533][ T9072] ? __kasan_check_read+0x11/0x20 [ 2775.133575][ T9072] ? find_get_entry+0x4a6/0x7a0 [ 2775.138450][ T9072] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2775.144697][ T9072] alloc_pages_current+0x107/0x210 [ 2775.149812][ T9072] __page_cache_alloc+0x29d/0x490 [ 2775.154857][ T9072] pagecache_get_page+0x27e/0x9e0 [ 2775.159890][ T9072] ? __kasan_check_read+0x11/0x20 [ 2775.164931][ T9072] filemap_fault+0x9b1/0x3180 [ 2775.169605][ T9072] ? mark_held_locks+0xf0/0xf0 [ 2775.174378][ T9072] ? read_cache_page_gfp+0x30/0x30 [ 2775.179499][ T9072] ? __kasan_check_write+0x14/0x20 [ 2775.184634][ T9072] ? down_read+0x109/0x430 [ 2775.189049][ T9072] ? down_read_killable+0x490/0x490 [ 2775.194337][ T9072] ? find_lock_entry+0x650/0x650 [ 2775.199267][ T9072] ? pmd_val+0x85/0x100 [ 2775.203429][ T9072] ext4_filemap_fault+0x86/0xb2 [ 2775.208367][ T9072] __do_fault+0x111/0x540 [ 2775.212782][ T9072] __handle_mm_fault+0x2943/0x3da0 [ 2775.217895][ T9072] ? vm_iomap_memory+0x1a0/0x1a0 [ 2775.222832][ T9072] ? handle_mm_fault+0x292/0xa50 [ 2775.227780][ T9072] ? handle_mm_fault+0x7a0/0xa50 [ 2775.232715][ T9072] ? __kasan_check_read+0x11/0x20 [ 2775.237741][ T9072] handle_mm_fault+0x3b2/0xa50 [ 2775.242512][ T9072] __do_page_fault+0x536/0xd80 [ 2775.247299][ T9072] ? page_fault+0x16/0x40 [ 2775.251635][ T9072] do_page_fault+0x38/0x590 [ 2775.256135][ T9072] page_fault+0x39/0x40 [ 2775.260300][ T9072] RIP: 0033:0x4374f8 [ 2775.264201][ T9072] Code: Bad RIP value. [ 2775.268263][ T9072] RSP: 002b:000000c420037f38 EFLAGS: 00010216 [ 2775.274319][ T9072] RAX: 0000000000000000 RBX: 0000000000000011 RCX: 000000000045d911 [ 2775.282282][ T9072] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2775.290251][ T9072] RBP: 000000c420037fb0 R08: 000000c420037f18 R09: 0000000000000000 [ 2775.298219][ T9072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000430120 [ 2775.306188][ T9072] R13: 00000000000000f1 R14: 0000000000000011 R15: 0000000000000000 [ 2775.317239][ T9072] Mem-Info: [ 2775.320379][ T9072] active_anon:173950 inactive_anon:4304 isolated_anon:0 [ 2775.320379][ T9072] active_file:31 inactive_file:683 isolated_file:0 [ 2775.320379][ T9072] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2775.320379][ T9072] slab_reclaimable:12426 slab_unreclaimable:114002 [ 2775.320379][ T9072] mapped:52226 shmem:4382 pagetables:3167 bounce:0 [ 2775.320379][ T9072] free:14153 free_pcp:189 free_cma:0 [ 2775.368571][ T9072] Node 0 active_anon:695796kB inactive_anon:17216kB active_file:116kB inactive_file:2660kB unevictable:0kB isolated(anon):0kB isolated(file):104kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 528384kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2775.404540][ T9072] Node 1 active_anon:4kB inactive_anon:0kB active_file:8kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2775.546032][ T9072] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2775.716873][ T9072] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2775.722925][ T9072] Node 0 DMA32 free:18900kB min:38152kB low:47176kB high:56200kB reserved_highatomic:0KB active_anon:695764kB inactive_anon:17216kB active_file:56kB inactive_file:2664kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:9904kB pagetables:12680kB bounce:0kB free_pcp:700kB local_pcp:320kB free_cma:0kB [ 2775.922051][ T9072] lowmem_reserve[]: 0 0 0 0 0 [ 2775.936188][ T9072] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2775.987711][ T9072] lowmem_reserve[]: 0 0 0 0 0 [ 2775.992460][ T9072] Node 1 Normal free:26760kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2776.060547][ T9072] lowmem_reserve[]: 0 0 0 0 0 [ 2776.065291][ T9072] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2776.146837][ T9072] Node 0 DMA32: 2553*4kB (UME) 618*8kB (ME) 152*16kB (UME) 21*32kB (M) 0*64kB 1*128kB (U) 0*256kB 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 18900kB [ 2776.236067][ T9072] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2776.301392][ T9072] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 5*64kB (UME) 1*128kB (U) 2*256kB (ME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26760kB [ 2776.342350][ T9072] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2776.386818][ T9072] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2776.407253][ T9072] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2776.424106][ T9072] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2776.433558][ T9072] 5075 total pagecache pages [ 2776.444385][ T9072] 0 pages in swap cache [ 2776.448636][ T9072] Swap cache stats: add 0, delete 0, find 0/0 [ 2776.454723][ T9072] Free swap = 0kB [ 2776.495088][ T9072] Total swap = 0kB [ 2776.499348][ T9072] 1965979 pages RAM [ 2776.503153][ T9072] 0 pages HighMem/MovableOnly [ 2776.516062][ T9072] 344068 pages reserved [ 2776.520234][ T9072] 0 pages cma reserved [ 2776.524296][ T9072] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz3,task=syz-executor.3,pid=3033,uid=0 [ 2776.661487][ T9072] Out of memory: Killed process 3033 (syz-executor.3) total-vm:72980kB, anon-rss:2232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:163840kB oom_score_adj:1000 [ 2776.799650][ T8958] rsyslogd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2776.828148][ T8958] CPU: 1 PID: 8958 Comm: rsyslogd Not tainted 5.5.0-rc1-syzkaller #0 [ 2776.836262][ T8958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2776.846508][ T8958] Call Trace: [ 2776.849817][ T8958] dump_stack+0x197/0x210 [ 2776.854156][ T8958] dump_header+0x10b/0x82d [ 2776.858555][ T8958] ? oom_kill_process+0x94/0x420 [ 2776.863476][ T8958] oom_kill_process.cold+0x10/0x15 [ 2776.868568][ T8958] out_of_memory+0x334/0x13c0 [ 2776.873225][ T8958] ? oom_killer_disable+0x280/0x280 [ 2776.878421][ T8958] ? mutex_trylock+0x264/0x2f0 [ 2776.883334][ T8958] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2776.888945][ T8958] __alloc_pages_slowpath+0x222b/0x2920 [ 2776.894475][ T8958] ? warn_alloc+0x110/0x110 [ 2776.898959][ T8958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2776.905195][ T8958] ? should_fail+0x1de/0x852 [ 2776.909779][ T8958] ? __kasan_check_read+0x11/0x20 [ 2776.914786][ T8958] __alloc_pages_nodemask+0x646/0x910 [ 2776.920155][ T8958] ? xas_descend+0x144/0x370 [ 2776.924744][ T8958] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2776.930447][ T8958] ? __kasan_check_read+0x11/0x20 [ 2776.935466][ T8958] ? find_get_entry+0x4a6/0x7a0 [ 2776.940317][ T8958] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2776.946543][ T8958] alloc_pages_current+0x107/0x210 [ 2776.951631][ T8958] __page_cache_alloc+0x29d/0x490 [ 2776.956633][ T8958] pagecache_get_page+0x27e/0x9e0 [ 2776.961634][ T8958] ? __kasan_check_read+0x11/0x20 [ 2776.966647][ T8958] filemap_fault+0x9b1/0x3180 [ 2776.972177][ T8958] ? mark_held_locks+0xf0/0xf0 [ 2776.976979][ T8958] ? read_cache_page_gfp+0x30/0x30 [ 2776.982193][ T8958] ? __kasan_check_write+0x14/0x20 [ 2776.987374][ T8958] ? down_read+0x109/0x430 [ 2776.991775][ T8958] ? down_read_killable+0x490/0x490 [ 2776.996959][ T8958] ? find_lock_entry+0x650/0x650 [ 2777.001880][ T8958] ? pmd_val+0x85/0x100 [ 2777.006047][ T8958] ext4_filemap_fault+0x86/0xb2 [ 2777.011027][ T8958] __do_fault+0x111/0x540 [ 2777.015341][ T8958] __handle_mm_fault+0x2943/0x3da0 [ 2777.020440][ T8958] ? vm_iomap_memory+0x1a0/0x1a0 [ 2777.025364][ T8958] ? handle_mm_fault+0x292/0xa50 [ 2777.030302][ T8958] ? handle_mm_fault+0x7a0/0xa50 [ 2777.035228][ T8958] ? __kasan_check_read+0x11/0x20 [ 2777.040238][ T8958] handle_mm_fault+0x3b2/0xa50 [ 2777.044980][ T8958] __do_page_fault+0x536/0xd80 [ 2777.049809][ T8958] ? page_fault+0x16/0x40 [ 2777.054119][ T8958] do_page_fault+0x38/0x590 [ 2777.058600][ T8958] page_fault+0x39/0x40 [ 2777.062730][ T8958] RIP: 0033:0x7f85c97be1fd [ 2777.067149][ T8958] Code: Bad RIP value. [ 2777.071726][ T8958] RSP: 002b:00007f85c6d5de30 EFLAGS: 00010293 [ 2777.077770][ T8958] RAX: 00000000000000c5 RBX: 0000000000f0b170 RCX: 00007f85c97be1fd [ 2777.085719][ T8958] RDX: 0000000000000fff RSI: 00007f85c85925a0 RDI: 0000000000000004 [ 2777.093666][ T8958] RBP: 0000000000000000 R08: 0000000000ef6260 R09: 0000000004000001 [ 2777.101621][ T8958] R10: 0000000000000001 R11: 0000000000000293 R12: 000000000065e420 [ 2777.109744][ T8958] R13: 00007f85c6d5e9c0 R14: 00007f85c9e03040 R15: 0000000000000003 [ 2777.120803][ T8958] Mem-Info: [ 2777.123949][ T8958] active_anon:173397 inactive_anon:4304 isolated_anon:0 [ 2777.123949][ T8958] active_file:30 inactive_file:651 isolated_file:0 [ 2777.123949][ T8958] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2777.123949][ T8958] slab_reclaimable:12426 slab_unreclaimable:114429 [ 2777.123949][ T8958] mapped:52226 shmem:4382 pagetables:3138 bounce:0 [ 2777.123949][ T8958] free:14468 free_pcp:66 free_cma:0 [ 2777.128164][ C0] net_ratelimit: 18 callbacks suppressed [ 2777.128209][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2777.161591][ T8958] Node 0 active_anon:693584kB inactive_anon:17216kB active_file:116kB inactive_file:2604kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:208904kB dirty:0kB writeback:0kB shmem:17528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 524288kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2777.167902][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2777.172928][ T8958] Node 1 active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2777.172935][ T8958] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2777.172969][ T8958] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2777.437866][ T8958] Node 0 DMA32 free:19944kB min:38152kB low:47176kB high:56200kB reserved_highatomic:0KB active_anon:693584kB inactive_anon:17216kB active_file:16kB inactive_file:2612kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:9876kB pagetables:12548kB bounce:0kB free_pcp:228kB local_pcp:8kB free_cma:0kB [ 2777.633974][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2777.661997][ T8958] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2777.862114][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2777.866997][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2777.867089][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2777.966071][ T8958] Node 1 Normal free:26760kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2778.054353][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2778.093639][ T8958] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2778.142677][ T8958] Node 0 DMA32: 2607*4kB (UME) 601*8kB (ME) 147*16kB (ME) 20*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 18228kB [ 2778.212093][ T8958] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2778.266839][ T8958] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 5*64kB (UME) 1*128kB (U) 2*256kB (ME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26760kB [ 2778.344327][ T8958] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2778.356066][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2778.361889][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2778.401368][ T8958] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2778.435041][ T8958] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2778.469798][ T8958] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2778.536768][ T8958] 5075 total pagecache pages [ 2778.541412][ T8958] 0 pages in swap cache [ 2778.545563][ T8958] Swap cache stats: add 0, delete 0, find 0/0 [ 2778.586927][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2778.593670][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2778.601023][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2778.607532][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2778.661915][ T8958] Free swap = 0kB [ 2778.665687][ T8958] Total swap = 0kB [ 2778.671796][ T8958] 1965979 pages RAM [ 2778.682832][ T8958] 0 pages HighMem/MovableOnly [ 2778.720585][ T8958] 344068 pages reserved [ 2778.724789][ T8958] 0 pages cma reserved [ 2778.773280][ T8958] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz1,task=syz-executor.1,pid=3454,uid=0 [ 2778.874332][ T8958] Out of memory: Killed process 3454 (syz-executor.1) total-vm:72848kB, anon-rss:2232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:163840kB oom_score_adj:1000 [ 2778.919498][ T1097] oom_reaper: reaped process 3454 (syz-executor.1), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2779.003217][ T8958] rsyslogd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2779.018071][ T8958] CPU: 0 PID: 8958 Comm: rsyslogd Not tainted 5.5.0-rc1-syzkaller #0 [ 2779.026155][ T8958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2779.036205][ T8958] Call Trace: [ 2779.039507][ T8958] dump_stack+0x197/0x210 [ 2779.043845][ T8958] dump_header+0x10b/0x82d [ 2779.048264][ T8958] ? oom_kill_process+0x94/0x420 [ 2779.053208][ T8958] oom_kill_process.cold+0x10/0x15 [ 2779.058328][ T8958] out_of_memory+0x334/0x13c0 [ 2779.063012][ T8958] ? oom_killer_disable+0x280/0x280 [ 2779.068214][ T8958] ? mutex_trylock+0x264/0x2f0 [ 2779.073935][ T8958] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2779.079580][ T8958] __alloc_pages_slowpath+0x222b/0x2920 [ 2779.085146][ T8958] ? warn_alloc+0x110/0x110 [ 2779.089657][ T8958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2779.095900][ T8958] ? should_fail+0x1de/0x852 [ 2779.100505][ T8958] ? __kasan_check_read+0x11/0x20 [ 2779.105638][ T8958] __alloc_pages_nodemask+0x646/0x910 [ 2779.111012][ T8958] ? xas_descend+0x144/0x370 [ 2779.115618][ T8958] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2779.121344][ T8958] ? __kasan_check_read+0x11/0x20 [ 2779.126396][ T8958] ? find_get_entry+0x4a6/0x7a0 [ 2779.131386][ T8958] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2779.137642][ T8958] alloc_pages_current+0x107/0x210 [ 2779.142759][ T8958] __page_cache_alloc+0x29d/0x490 [ 2779.147799][ T8958] pagecache_get_page+0x27e/0x9e0 [ 2779.152852][ T8958] ? __kasan_check_read+0x11/0x20 [ 2779.157883][ T8958] filemap_fault+0x9b1/0x3180 [ 2779.162600][ T8958] ? mark_held_locks+0xf0/0xf0 [ 2779.167378][ T8958] ? read_cache_page_gfp+0x30/0x30 [ 2779.172495][ T8958] ? __kasan_check_write+0x14/0x20 [ 2779.177606][ T8958] ? down_read+0x109/0x430 [ 2779.182018][ T8958] ? down_read_killable+0x490/0x490 [ 2779.187214][ T8958] ? find_lock_entry+0x650/0x650 [ 2779.192148][ T8958] ? pmd_val+0x85/0x100 [ 2779.197020][ T8958] ext4_filemap_fault+0x86/0xb2 [ 2779.201871][ T8958] __do_fault+0x111/0x540 [ 2779.206301][ T8958] __handle_mm_fault+0x2943/0x3da0 [ 2779.211416][ T8958] ? vm_iomap_memory+0x1a0/0x1a0 [ 2779.216352][ T8958] ? handle_mm_fault+0x292/0xa50 [ 2779.221301][ T8958] ? handle_mm_fault+0x7a0/0xa50 [ 2779.226501][ T8958] ? __kasan_check_read+0x11/0x20 [ 2779.231528][ T8958] handle_mm_fault+0x3b2/0xa50 [ 2779.236323][ T8958] __do_page_fault+0x536/0xd80 [ 2779.241093][ T8958] ? page_fault+0x16/0x40 [ 2779.245445][ T8958] do_page_fault+0x38/0x590 [ 2779.249956][ T8958] page_fault+0x39/0x40 [ 2779.254119][ T8958] RIP: 0033:0x7f85c97be1fd [ 2779.258543][ T8958] Code: Bad RIP value. [ 2779.262618][ T8958] RSP: 002b:00007f85c6d5de30 EFLAGS: 00010293 [ 2779.268691][ T8958] RAX: 00000000000000c5 RBX: 0000000000f0b170 RCX: 00007f85c97be1fd [ 2779.276753][ T8958] RDX: 0000000000000fff RSI: 00007f85c85925a0 RDI: 0000000000000004 [ 2779.284733][ T8958] RBP: 0000000000000000 R08: 0000000000ef6260 R09: 0000000004000001 [ 2779.292706][ T8958] R10: 0000000000000001 R11: 0000000000000293 R12: 000000000065e420 [ 2779.300675][ T8958] R13: 00007f85c6d5e9c0 R14: 00007f85c9e03040 R15: 0000000000000003 [ 2779.494648][ T8958] Mem-Info: [ 2779.498120][ T8958] active_anon:172856 inactive_anon:229 isolated_anon:0 [ 2779.498120][ T8958] active_file:20 inactive_file:649 isolated_file:0 [ 2779.498120][ T8958] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2779.498120][ T8958] slab_reclaimable:12426 slab_unreclaimable:115574 [ 2779.498120][ T8958] mapped:52226 shmem:307 pagetables:3101 bounce:0 [ 2779.498120][ T8958] free:17368 free_pcp:697 free_cma:0 [ 2779.569199][ T8958] Node 0 active_anon:691420kB inactive_anon:916kB active_file:72kB inactive_file:2492kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:208904kB dirty:0kB writeback:0kB shmem:1228kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 524288kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2779.753378][ T8958] Node 1 active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2779.781350][ T8958] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2779.858949][ T8958] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2779.864752][ T8958] Node 0 DMA32 free:31136kB min:38152kB low:47176kB high:56200kB reserved_highatomic:0KB active_anon:691396kB inactive_anon:836kB active_file:48kB inactive_file:2532kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:9840kB pagetables:12416kB bounce:0kB free_pcp:2992kB local_pcp:1548kB free_cma:0kB [ 2779.897527][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2779.902256][ T8958] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2779.931421][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2779.941575][ T8958] Node 1 Normal free:26760kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2779.993482][ T8958] lowmem_reserve[]: 0 0 0 0 0 [ 2780.042217][ T8958] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2780.082064][ T8958] Node 0 DMA32: 4324*4kB (UME) 1081*8kB (ME) 182*16kB (UME) 21*32kB (UM) 0*64kB 0*128kB 1*256kB (U) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 30296kB [ 2780.112267][ T8958] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2780.142731][ T8958] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 5*64kB (UME) 1*128kB (U) 2*256kB (ME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26760kB [ 2780.191059][ T8958] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2780.252266][ T8958] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2780.335658][ T8958] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2780.392588][ T8958] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2780.439810][ T8958] 980 total pagecache pages [ 2780.444392][ T8958] 0 pages in swap cache [ 2780.486296][ T8958] Swap cache stats: add 0, delete 0, find 0/0 [ 2780.492409][ T8958] Free swap = 0kB [ 2780.502359][ T8958] Total swap = 0kB [ 2780.514965][ T8958] 1965979 pages RAM [ 2780.553494][ T8958] 0 pages HighMem/MovableOnly [ 2780.580828][ T8958] 344068 pages reserved [ 2780.585021][ T8958] 0 pages cma reserved [ 2780.643644][ T8958] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz3,task=syz-executor.3,pid=2682,uid=0 [ 2780.711596][ T8958] Out of memory: Killed process 2682 (syz-executor.3) total-vm:72980kB, anon-rss:2232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:159744kB oom_score_adj:1000 [ 2780.861489][ T9085] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2780.931658][ T9085] CPU: 1 PID: 9085 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 2780.939954][ T9085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2780.950107][ T9085] Call Trace: [ 2780.953429][ T9085] dump_stack+0x197/0x210 [ 2780.957766][ T9085] dump_header+0x10b/0x82d [ 2780.962177][ T9085] ? oom_kill_process+0x94/0x420 [ 2780.967091][ T9085] oom_kill_process.cold+0x10/0x15 [ 2780.972290][ T9085] out_of_memory+0x334/0x13c0 [ 2780.977126][ T9085] ? oom_killer_disable+0x280/0x280 [ 2780.982310][ T9085] ? mutex_trylock+0x264/0x2f0 [ 2780.987062][ T9085] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2780.992681][ T9085] __alloc_pages_slowpath+0x222b/0x2920 [ 2780.998217][ T9085] ? warn_alloc+0x110/0x110 [ 2781.002702][ T9085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2781.008946][ T9085] ? should_fail+0x1de/0x852 [ 2781.013515][ T9085] ? __kasan_check_read+0x11/0x20 [ 2781.018528][ T9085] __alloc_pages_nodemask+0x646/0x910 [ 2781.023888][ T9085] ? xas_descend+0x144/0x370 [ 2781.028458][ T9085] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2781.034327][ T9085] ? __kasan_check_read+0x11/0x20 [ 2781.039349][ T9085] ? find_get_entry+0x4a6/0x7a0 [ 2781.044180][ T9085] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2781.050399][ T9085] alloc_pages_current+0x107/0x210 [ 2781.055490][ T9085] __page_cache_alloc+0x29d/0x490 [ 2781.061015][ T9085] pagecache_get_page+0x27e/0x9e0 [ 2781.066014][ T9085] ? __kasan_check_read+0x11/0x20 [ 2781.071016][ T9085] filemap_fault+0x9b1/0x3180 [ 2781.075669][ T9085] ? mark_held_locks+0xf0/0xf0 [ 2781.080440][ T9085] ? read_cache_page_gfp+0x30/0x30 [ 2781.085557][ T9085] ? __kasan_check_write+0x14/0x20 [ 2781.090921][ T9085] ? down_read+0x109/0x430 [ 2781.095323][ T9085] ? down_read_killable+0x490/0x490 [ 2781.100510][ T9085] ? find_lock_entry+0x650/0x650 [ 2781.105445][ T9085] ? pmd_val+0x85/0x100 [ 2781.109689][ T9085] ext4_filemap_fault+0x86/0xb2 [ 2781.114656][ T9085] __do_fault+0x111/0x540 [ 2781.119087][ T9085] __handle_mm_fault+0x2943/0x3da0 [ 2781.124259][ T9085] ? vm_iomap_memory+0x1a0/0x1a0 [ 2781.129198][ T9085] ? handle_mm_fault+0x292/0xa50 [ 2781.134122][ T9085] ? handle_mm_fault+0x7a0/0xa50 [ 2781.139044][ T9085] ? __kasan_check_read+0x11/0x20 [ 2781.144318][ T9085] handle_mm_fault+0x3b2/0xa50 [ 2781.149064][ T9085] __do_page_fault+0x536/0xd80 [ 2781.153811][ T9085] ? page_fault+0x16/0x40 [ 2781.158122][ T9085] do_page_fault+0x38/0x590 [ 2781.162602][ T9085] page_fault+0x39/0x40 [ 2781.166732][ T9085] RIP: 0033:0x459f50 [ 2781.170622][ T9085] Code: Bad RIP value. [ 2781.174679][ T9085] RSP: 002b:000000c42f89ba90 EFLAGS: 00010213 [ 2781.180861][ T9085] RAX: 000000c4203bc120 RBX: 0000000000000000 RCX: 000000c420000180 [ 2781.188926][ T9085] RDX: 0000026a0d9d20d4 RSI: 3f742e72ec966f2f RDI: 00007ffe2aded080 [ 2781.196899][ T9085] RBP: 000000c42f89bc00 R08: 00007ffe2aded090 R09: 0000000000084082 [ 2781.204849][ T9085] R10: 000000c42f89b9e8 R11: 000000c42f89b9e0 R12: 000000c42f89bb98 [ 2781.212799][ T9085] R13: 000000c42f89bb98 R14: 0000000000000000 R15: 0000000000000000 [ 2781.441931][ T9085] Mem-Info: [ 2781.445126][ T9085] active_anon:172305 inactive_anon:209 isolated_anon:0 [ 2781.445126][ T9085] active_file:14 inactive_file:658 isolated_file:0 [ 2781.445126][ T9085] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2781.445126][ T9085] slab_reclaimable:12426 slab_unreclaimable:117064 [ 2781.445126][ T9085] mapped:52226 shmem:287 pagetables:3061 bounce:0 [ 2781.445126][ T9085] free:16457 free_pcp:714 free_cma:0 [ 2781.546169][ T9085] Node 0 active_anon:689216kB inactive_anon:836kB active_file:52kB inactive_file:2460kB unevictable:0kB isolated(anon):0kB isolated(file):256kB mapped:208904kB dirty:0kB writeback:0kB shmem:1148kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 520192kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2781.626221][ T1096] INFO: task syz-executor.0:31688 blocked for more than 143 seconds. [ 2781.629228][ T9085] Node 1 active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2781.634348][ T1096] Not tainted 5.5.0-rc1-syzkaller #0 [ 2781.696326][ T9085] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2781.861761][ T1096] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2781.887078][ T9085] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2781.893835][ T9085] Node 0 DMA32 free:27372kB min:54536kB low:63560kB high:72584kB reserved_highatomic:0KB active_anon:689216kB inactive_anon:836kB active_file:0kB inactive_file:2632kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:9808kB pagetables:12288kB bounce:0kB free_pcp:2792kB local_pcp:1420kB free_cma:0kB [ 2781.906247][ T1096] syz-executor.0 D28120 31688 9087 0x00004004 [ 2782.073216][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2782.086170][ T1096] Call Trace: [ 2782.089526][ T1096] __schedule+0x934/0x1f90 [ 2782.093959][ T1096] ? __sched_text_start+0x8/0x8 [ 2782.099049][ T9085] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2782.186390][ T1096] schedule+0xdc/0x2b0 [ 2782.190523][ T1096] schedule_preempt_disabled+0x13/0x20 [ 2782.246093][ T1096] __mutex_lock+0x7ab/0x13c0 [ 2782.250750][ T1096] ? blk_trace_ioctl+0xe3/0x300 [ 2782.255613][ T1096] ? mutex_trylock+0x2f0/0x2f0 [ 2782.263128][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2782.289627][ T9085] Node 1 Normal free:26760kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2782.346403][ T1096] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2782.351939][ T1096] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2782.400854][ T1096] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2782.420021][ T1096] ? tomoyo_path_number_perm+0x214/0x520 [ 2782.425733][ T1096] mutex_lock_nested+0x16/0x20 [ 2782.451835][ T9085] lowmem_reserve[]: 0 0 0 0 0 [ 2782.469477][ T9085] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2782.491533][ T1096] ? mutex_lock_nested+0x16/0x20 [ 2782.506122][ C0] net_ratelimit: 14 callbacks suppressed [ 2782.506131][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2782.517620][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2782.530740][ T9085] Node 0 DMA32: 4305*4kB (UME) 946*8kB (UME) 139*16kB (ME) 5*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 27172kB [ 2782.532779][ T1096] blk_trace_ioctl+0xe3/0x300 [ 2782.582583][ T9085] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2782.616160][ T1096] ? blk_add_trace_rq_remap+0x3b0/0x3b0 [ 2782.621767][ T1096] ? lock_downgrade+0x920/0x920 [ 2782.667107][ T9085] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 5*64kB (UME) 1*128kB (U) 2*256kB (ME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26760kB [ 2782.676031][ T1096] ? kfree+0x239/0x2c0 [ 2782.733294][ T1096] blkdev_ioctl+0x126/0x1df0 [ 2782.746089][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2782.751926][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2782.757818][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2782.763594][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2782.770896][ T1096] ? blkpg_ioctl+0xa90/0xa90 [ 2782.775519][ T1096] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2782.786133][ T9085] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2782.795694][ T9085] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2782.863626][ T1096] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2782.884260][ T1096] block_ioctl+0xee/0x130 [ 2782.904003][ T9085] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2782.918574][ T1096] ? blkdev_fallocate+0x410/0x410 [ 2782.923626][ T1096] do_vfs_ioctl+0x977/0x14e0 [ 2782.938689][ T9085] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2782.938718][ T1096] ? compat_ioctl_preallocate+0x220/0x220 [ 2782.953928][ T1096] ? __this_cpu_preempt_check+0x35/0x190 [ 2782.959899][ T9085] 980 total pagecache pages [ 2782.964410][ T9085] 0 pages in swap cache [ 2782.978884][ T1096] ? retint_kernel+0x2b/0x2b [ 2782.983530][ T1096] ? tomoyo_path_number_perm+0x25e/0x520 [ 2782.985327][ T9085] Swap cache stats: add 0, delete 0, find 0/0 [ 2783.022410][ T9085] Free swap = 0kB [ 2783.023585][ T1096] ? tomoyo_file_ioctl+0x24/0x30 [ 2783.026230][ T9085] Total swap = 0kB [ 2783.026239][ T9085] 1965979 pages RAM [ 2783.026245][ T9085] 0 pages HighMem/MovableOnly [ 2783.026250][ T9085] 344068 pages reserved [ 2783.026256][ T9085] 0 pages cma reserved [ 2783.026266][ T9085] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz3,task=syz-executor.3,pid=21278,uid=0 [ 2783.026362][ T9085] Out of memory: Killed process 21278 (syz-executor.3) total-vm:72848kB, anon-rss:2224kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:163840kB oom_score_adj:1000 [ 2783.091339][ T1096] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2783.103950][ T1096] ? security_file_ioctl+0x8d/0xc0 [ 2783.114782][ T1097] oom_reaper: reaped process 21278 (syz-executor.3), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2783.119433][ T1096] ksys_ioctl+0xab/0xd0 [ 2783.156085][ T1096] __x64_sys_ioctl+0x73/0xb0 [ 2783.160711][ T1096] do_syscall_64+0xfa/0x790 [ 2783.165224][ T1096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2783.191386][ T1096] RIP: 0033:0x45a6f9 [ 2783.195332][ T1096] Code: Bad RIP value. [ 2783.251624][ T1096] RSP: 002b:00007f2c20980c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2783.261905][ T8998] cron invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2783.301909][ T1096] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 2783.341876][ T8998] CPU: 0 PID: 8998 Comm: cron Not tainted 5.5.0-rc1-syzkaller #0 [ 2783.349647][ T8998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2783.359706][ T8998] Call Trace: [ 2783.363017][ T8998] dump_stack+0x197/0x210 [ 2783.367371][ T8998] dump_header+0x10b/0x82d [ 2783.371786][ T8998] ? oom_kill_process+0x94/0x420 [ 2783.376733][ T8998] oom_kill_process.cold+0x10/0x15 [ 2783.381845][ T8998] out_of_memory+0x334/0x13c0 [ 2783.386527][ T8998] ? oom_killer_disable+0x280/0x280 [ 2783.391726][ T8998] ? mutex_trylock+0x264/0x2f0 [ 2783.396484][ T8998] ? __alloc_pages_slowpath+0xca3/0x2920 [ 2783.402219][ T8998] __alloc_pages_slowpath+0x222b/0x2920 [ 2783.407787][ T8998] ? warn_alloc+0x110/0x110 [ 2783.412294][ T8998] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2783.418659][ T8998] ? should_fail+0x1de/0x852 [ 2783.423268][ T8998] ? __kasan_check_read+0x11/0x20 [ 2783.428332][ T8998] __alloc_pages_nodemask+0x646/0x910 [ 2783.433708][ T8998] ? xas_descend+0x144/0x370 [ 2783.438309][ T8998] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2783.444039][ T8998] ? __kasan_check_read+0x11/0x20 [ 2783.449077][ T8998] ? find_get_entry+0x4a6/0x7a0 [ 2783.453938][ T8998] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2783.460191][ T8998] alloc_pages_current+0x107/0x210 [ 2783.465489][ T8998] __page_cache_alloc+0x29d/0x490 [ 2783.470536][ T8998] pagecache_get_page+0x27e/0x9e0 [ 2783.475574][ T8998] ? __kasan_check_read+0x11/0x20 [ 2783.480630][ T8998] filemap_fault+0x9b1/0x3180 [ 2783.485310][ T8998] ? mark_held_locks+0xf0/0xf0 [ 2783.490096][ T8998] ? read_cache_page_gfp+0x30/0x30 [ 2783.495482][ T8998] ? __kasan_check_write+0x14/0x20 [ 2783.500601][ T8998] ? down_read+0x109/0x430 [ 2783.505013][ T8998] ? down_read_killable+0x490/0x490 [ 2783.510215][ T8998] ? find_lock_entry+0x650/0x650 [ 2783.515147][ T8998] ? pmd_val+0x85/0x100 [ 2783.519308][ T8998] ext4_filemap_fault+0x86/0xb2 [ 2783.524158][ T8998] __do_fault+0x111/0x540 [ 2783.528500][ T8998] __handle_mm_fault+0x2943/0x3da0 [ 2783.533619][ T8998] ? vm_iomap_memory+0x1a0/0x1a0 [ 2783.538580][ T8998] ? handle_mm_fault+0x292/0xa50 [ 2783.543538][ T8998] ? handle_mm_fault+0x7a0/0xa50 [ 2783.548477][ T8998] ? __kasan_check_read+0x11/0x20 [ 2783.553513][ T8998] handle_mm_fault+0x3b2/0xa50 [ 2783.558285][ T8998] __do_page_fault+0x536/0xd80 [ 2783.563044][ T8998] ? page_fault+0x16/0x40 [ 2783.567378][ T8998] do_page_fault+0x38/0x590 [ 2783.571884][ T8998] page_fault+0x39/0x40 [ 2783.576033][ T8998] RIP: 0033:0x7fc587b93e40 [ 2783.580465][ T8998] Code: Bad RIP value. [ 2783.584528][ T8998] RSP: 002b:00007fffe21efa08 EFLAGS: 00010246 [ 2783.590592][ T8998] RAX: 0000000000000000 RBX: 00007fffe21efb30 RCX: 00007fc587b93e40 [ 2783.598563][ T8998] RDX: 0000000000000000 RSI: 00007fffe21efbb0 RDI: 00007fffe21efbb0 [ 2783.606532][ T8998] RBP: 00007fffe21efab0 R08: 00007fffe21efa10 R09: 0000000000000000 [ 2783.614589][ T8998] R10: 0000000000000008 R11: 0000000000000246 R12: 00000000ffffffff [ 2783.622560][ T8998] R13: 00007fffe21efd10 R14: 0000000000000000 R15: 0000000000000000 [ 2783.630780][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2783.636612][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2783.663264][ T1096] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000005 [ 2783.711338][ T1096] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 2783.745292][ T1096] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c209816d4 [ 2783.786392][ T1096] R13: 00000000004c20c3 R14: 00000000004d71e8 R15: 00000000ffffffff [ 2783.793633][ T8998] Mem-Info: [ 2783.798972][ T1096] [ 2783.798972][ T1096] Showing all locks held in the system: [ 2783.803840][ T8998] active_anon:171762 inactive_anon:209 isolated_anon:0 [ 2783.803840][ T8998] active_file:21 inactive_file:651 isolated_file:0 [ 2783.803840][ T8998] unevictable:0 dirty:0 writeback:0 unstable:0 [ 2783.803840][ T8998] slab_reclaimable:12426 slab_unreclaimable:118061 [ 2783.803840][ T8998] mapped:52226 shmem:287 pagetables:3040 bounce:0 [ 2783.803840][ T8998] free:16645 free_pcp:121 free_cma:0 [ 2783.817613][ T1096] 3 locks held by init/1: [ 2783.882934][ T8998] Node 0 active_anon:687044kB inactive_anon:836kB active_file:80kB inactive_file:2604kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:208904kB dirty:0kB writeback:0kB shmem:1148kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 518144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2783.928981][ T8998] Node 1 active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2784.056120][ T1096] #0: ffff8880a1e762e8 (&ei->i_mmap_sem){++++}, at: ext4_filemap_fault+0x7e/0xb2 [ 2784.065421][ T1096] #1: ffff8880ae937358 (&rq->lock){-.-.}, at: __schedule+0x232/0x1f90 [ 2784.100818][ T8998] Node 0 DMA free:10232kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2784.136081][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2784.141957][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2784.145230][ T1096] #2: ffffffff899a56c0 (rcu_read_lock){....}, at: mem_cgroup_iter+0x101/0x5f0 [ 2784.173272][ T1096] 1 lock held by khungtaskd/1096: [ 2784.208557][ T1096] #0: ffffffff899a56c0 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 2784.225516][ T8998] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2784.246232][ T8998] Node 0 DMA32 free:28492kB min:36104kB low:45128kB high:54152kB reserved_highatomic:0KB active_anon:687044kB inactive_anon:836kB active_file:80kB inactive_file:2672kB unevictable:0kB writepending:0kB present:3129332kB managed:2601536kB mlocked:0kB kernel_stack:9776kB pagetables:12156kB bounce:0kB free_pcp:452kB local_pcp:220kB free_cma:0kB [ 2784.295131][ T1096] 1 lock held by rsyslogd/8958: [ 2784.330876][ T1096] 2 locks held by cron/8998: [ 2784.335576][ T1096] 2 locks held by getty/9048: [ 2784.373740][ T1096] #0: ffff8880a7dbc090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2784.417252][ T1096] #1: ffffc9000178b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 2784.453276][ T8998] lowmem_reserve[]: 0 0 0 0 0 [ 2784.472742][ T1096] 2 locks held by getty/9049: [ 2784.482656][ T8998] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2784.525462][ T1096] #0: ffff8880a95d5090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2784.576492][ T1096] #1: ffffc900017eb2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 2784.626973][ T1096] 2 locks held by getty/9050: [ 2784.631699][ T1096] #0: ffff8880a93de090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2784.657549][ T8998] lowmem_reserve[]: 0 0 0 0 0 [ 2784.662295][ T8998] Node 1 Normal free:26760kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:4kB inactive_anon:0kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2784.679291][ T1096] #1: ffffc900017cb2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 2784.716247][ T8998] lowmem_reserve[]: 0 0 0 0 0 [ 2784.719926][ T1096] 2 locks held by getty/9051: [ 2784.721011][ T8998] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 1*32kB (U) 1*64kB (U) 1*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 10232kB [ 2784.725677][ T1096] #0: ffff88809f555090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2784.797818][ T1096] #1: ffffc900017db2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 2784.843137][ T1096] 2 locks held by getty/9052: [ 2784.857891][ T8998] Node 0 DMA32: 4501*4kB (UME) 772*8kB (UME) 122*16kB (UM) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 26132kB [ 2784.874163][ T1096] #0: ffff8880a758b090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2784.909781][ T1096] #1: ffffc9000175b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 2784.924702][ T8998] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2784.956514][ T1096] 2 locks held by getty/9053: [ 2784.961233][ T1096] #0: ffff8880a009f090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2785.004672][ T8998] Node 1 Normal: 2*4kB (UM) 4*8kB (ME) 4*16kB (UME) 3*32kB (ME) 5*64kB (UME) 1*128kB (U) 2*256kB (ME) 0*512kB 1*1024kB (M) 2*2048kB (UM) 5*4096kB (M) = 26760kB [ 2785.053928][ T1096] #1: ffffc9000176b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 2785.102963][ T8998] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2785.116213][ T1096] 2 locks held by getty/9054: [ 2785.120920][ T1096] #0: ffff8880a0531090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2785.149105][ T8998] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2785.185998][ T1096] #1: ffffc9000172b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 2785.195612][ T1096] 4 locks held by syz-fuzzer/9072: [ 2785.226260][ T8998] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2785.235822][ T8998] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2785.289286][ T1096] 3 locks held by syz-fuzzer/9085: [ 2785.294438][ T1096] 3 locks held by syz-fuzzer/8591: [ 2785.336082][ T8998] 980 total pagecache pages [ 2785.340635][ T8998] 0 pages in swap cache [ 2785.344803][ T8998] Swap cache stats: add 0, delete 0, find 0/0 [ 2785.352591][ T1096] 1 lock held by syz-executor.0/31688: [ 2785.370657][ T1096] #0: ffff8880a219d638 (&q->blk_trace_mutex){+.+.}, at: blk_trace_ioctl+0xe3/0x300 [ 2785.414348][ T8998] Free swap = 0kB [ 2785.437015][ T1096] 5 locks held by syz-executor.5/31479: [ 2785.451804][ T8998] Total swap = 0kB [ 2785.455546][ T8998] 1965979 pages RAM [ 2785.477143][ T1096] [ 2785.479517][ T1096] ============================================= [ 2785.479517][ T1096] [ 2785.500736][ T8998] 0 pages HighMem/MovableOnly [ 2785.505466][ T8998] 344068 pages reserved [ 2785.522645][ T1096] NMI backtrace for cpu 1 [ 2785.527116][ T1096] CPU: 1 PID: 1096 Comm: khungtaskd Not tainted 5.5.0-rc1-syzkaller #0 [ 2785.535350][ T1096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2785.545433][ T1096] Call Trace: [ 2785.548734][ T1096] dump_stack+0x197/0x210 [ 2785.553073][ T1096] nmi_cpu_backtrace.cold+0x70/0xb2 [ 2785.558341][ T1096] ? vprintk_func+0x86/0x189 [ 2785.562965][ T1096] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 2785.568597][ T1096] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 2785.574578][ T1096] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2785.580510][ T1096] watchdog+0xb11/0x10c0 [ 2785.584768][ T1096] kthread+0x361/0x430 [ 2785.588848][ T1096] ? reset_hung_task_detector+0x30/0x30 [ 2785.594407][ T1096] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 2785.600158][ T1096] ret_from_fork+0x24/0x30 [ 2785.604852][ T1096] Sending NMI from CPU 1 to CPUs 0: [ 2785.610756][ C0] NMI backtrace for cpu 0 [ 2785.610762][ C0] CPU: 0 PID: 9085 Comm: syz-fuzzer Not tainted 5.5.0-rc1-syzkaller #0 [ 2785.610768][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2785.610772][ C0] RIP: 0010:check_memory_region+0x1d/0x1a0 [ 2785.610782][ C0] Code: 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 48 85 f6 0f 84 34 01 00 00 48 b8 ff ff ff ff ff 7f ff ff 55 0f b6 d2 48 39 c7 48 89 e5 <41> 55 41 54 53 0f 86 07 01 00 00 4c 8d 5c 37 ff 49 89 f8 48 b8 00 [ 2785.610786][ C0] RSP: 0000:ffffc90001e87188 EFLAGS: 00000216 [ 2785.610793][ C0] RAX: ffff7fffffffffff RBX: 0000000000000000 RCX: ffffffff81ff4a7c [ 2785.610797][ C0] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff8a799980 [ 2785.610802][ C0] RBP: ffffc90001e87188 R08: ffff888090aca600 R09: ffff888090acae90 [ 2785.610807][ C0] R10: fffffbfff14f3330 R11: ffffffff8a799987 R12: 0000000000000000 [ 2785.610811][ C0] R13: ffffc90001e872d0 R14: ffff8880996ea5a0 R15: 0000000000000080 [ 2785.610816][ C0] FS: 000000c42008a768(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 2785.610820][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2785.610825][ C0] CR2: 00007fc587b93e16 CR3: 00000000a4b40000 CR4: 00000000001406f0 [ 2785.610830][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2785.610834][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2785.610837][ C0] Call Trace: [ 2785.610840][ C0] __kasan_check_read+0x11/0x20 [ 2785.610843][ C0] ext4_es_count+0x9c/0x3c0 [ 2785.610846][ C0] do_shrink_slab+0x109/0xad0 [ 2785.610848][ C0] shrink_slab+0x19a/0x680 [ 2785.610852][ C0] ? do_shrink_slab+0xad0/0xad0 [ 2785.610855][ C0] ? rcu_read_unlock+0x2e/0x60 [ 2785.610858][ C0] ? mem_cgroup_iter+0x370/0x5f0 [ 2785.610861][ C0] shrink_node+0x46a/0x1ad0 [ 2785.610864][ C0] do_try_to_free_pages+0x3ba/0x14f0 [ 2785.610867][ C0] ? shrink_node+0x1ad0/0x1ad0 [ 2785.610871][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2785.610874][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2785.610878][ C0] try_to_free_pages+0x2dc/0x970 [ 2785.610881][ C0] ? do_try_to_free_pages+0x14f0/0x14f0 [ 2785.610885][ C0] __alloc_pages_slowpath+0x983/0x2920 [ 2785.610888][ C0] ? warn_alloc+0x110/0x110 [ 2785.610891][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2785.610894][ C0] ? should_fail+0x1de/0x852 [ 2785.610898][ C0] ? __kasan_check_read+0x11/0x20 [ 2785.610901][ C0] __alloc_pages_nodemask+0x646/0x910 [ 2785.610905][ C0] ? xas_descend+0x144/0x370 [ 2785.610908][ C0] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2785.610911][ C0] ? __kasan_check_read+0x11/0x20 [ 2785.610914][ C0] ? find_get_entry+0x4a6/0x7a0 [ 2785.610918][ C0] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2785.610922][ C0] alloc_pages_current+0x107/0x210 [ 2785.610925][ C0] __page_cache_alloc+0x29d/0x490 [ 2785.610928][ C0] pagecache_get_page+0x27e/0x9e0 [ 2785.610931][ C0] ? __kasan_check_read+0x11/0x20 [ 2785.610934][ C0] filemap_fault+0x9b1/0x3180 [ 2785.610937][ C0] ? mark_held_locks+0xf0/0xf0 [ 2785.610940][ C0] ? read_cache_page_gfp+0x30/0x30 [ 2785.610944][ C0] ? __kasan_check_write+0x14/0x20 [ 2785.610947][ C0] ? down_read+0x109/0x430 [ 2785.610950][ C0] ? down_read_killable+0x490/0x490 [ 2785.610953][ C0] ? find_lock_entry+0x650/0x650 [ 2785.610956][ C0] ? pmd_val+0x85/0x100 [ 2785.610959][ C0] ext4_filemap_fault+0x86/0xb2 [ 2785.610962][ C0] __do_fault+0x111/0x540 [ 2785.610965][ C0] __handle_mm_fault+0x2943/0x3da0 [ 2785.610968][ C0] ? vm_iomap_memory+0x1a0/0x1a0 [ 2785.610971][ C0] ? handle_mm_fault+0x292/0xa50 [ 2785.610975][ C0] ? handle_mm_fault+0x7a0/0xa50 [ 2785.610978][ C0] ? __kasan_check_read+0x11/0x20 [ 2785.610981][ C0] handle_mm_fault+0x3b2/0xa50 [ 2785.610984][ C0] __do_page_fault+0x536/0xd80 [ 2785.610987][ C0] ? page_fault+0x16/0x40 [ 2785.610990][ C0] do_page_fault+0x38/0x590 [ 2785.610992][ C0] page_fault+0x39/0x40 [ 2785.610995][ C0] RIP: 0033:0x459f50 [ 2785.610998][ C0] Code: Bad RIP value. [ 2785.611001][ C0] RSP: 002b:000000c42f89ba90 EFLAGS: 00010213 [ 2785.611008][ C0] RAX: 000000c4203bc120 RBX: 0000000000000000 RCX: 000000c420000180 [ 2785.611013][ C0] RDX: 0000026a0d9d20d4 RSI: 3f742e72ec966f2f RDI: 00007ffe2aded080 [ 2785.611017][ C0] RBP: 000000c42f89bc00 R08: 00007ffe2aded090 R09: 0000000000084082 [ 2785.611022][ C0] R10: 000000c42f89b9e8 R11: 000000c42f89b9e0 R12: 000000c42f89bb98 [ 2785.611026][ C0] R13: 000000c42f89bb98 R14: 0000000000000000 R15: 0000000000000000 [ 2785.620910][ T8998] 0 pages cma reserved [ 2786.393761][ T1096] Kernel panic - not syncing: hung_task: blocked tasks [ 2786.400684][ T1096] CPU: 1 PID: 1096 Comm: khungtaskd Not tainted 5.5.0-rc1-syzkaller #0 [ 2786.408917][ T1096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2786.418969][ T1096] Call Trace: [ 2786.422263][ T1096] dump_stack+0x197/0x210 [ 2786.426695][ T1096] panic+0x2e3/0x75c [ 2786.430590][ T1096] ? add_taint.cold+0x16/0x16 [ 2786.435285][ T1096] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 2786.440927][ T1096] ? ___preempt_schedule+0x16/0x18 [ 2786.446045][ T1096] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 2786.452324][ T1096] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 2786.458491][ T1096] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 2786.464667][ T1096] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 2786.470922][ T1096] watchdog+0xb22/0x10c0 [ 2786.475191][ T1096] kthread+0x361/0x430 [ 2786.479279][ T1096] ? reset_hung_task_detector+0x30/0x30 [ 2786.484916][ T1096] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 2786.490663][ T1096] ret_from_fork+0x24/0x30 [ 2786.497210][ T1096] Kernel Offset: disabled [ 2786.501603][ T1096] Rebooting in 86400 seconds..