[ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Started OpenBSD Secure Shell server. Debian GNU/Linux 9 syzkaller ttyS0 syzkaller login: [ 42.519654][ T8380] sshd (8380) used greatest stack depth: 24552 bytes left Warning: Permanently added '10.128.0.128' (ECDSA) to the list of known hosts. 2020/12/09 02:53:56 fuzzer started 2020/12/09 02:53:56 dialing manager at 10.128.0.26:36529 2020/12/09 02:53:56 syscalls: 3486 2020/12/09 02:53:56 code coverage: enabled 2020/12/09 02:53:56 comparison tracing: enabled 2020/12/09 02:53:56 extra coverage: enabled 2020/12/09 02:53:56 setuid sandbox: enabled 2020/12/09 02:53:56 namespace sandbox: enabled 2020/12/09 02:53:56 Android sandbox: /sys/fs/selinux/policy does not exist 2020/12/09 02:53:56 fault injection: enabled 2020/12/09 02:53:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/12/09 02:53:56 net packet injection: enabled 2020/12/09 02:53:56 net device setup: enabled 2020/12/09 02:53:56 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/12/09 02:53:56 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/12/09 02:53:56 USB emulation: enabled 2020/12/09 02:53:56 hci packet injection: enabled 2020/12/09 02:53:56 wifi device emulation: enabled 02:56:56 executing program 0: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000000), 0x41, 0x0) 02:56:56 executing program 1: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) pwrite64(r0, &(0x7f0000000140)="c1", 0x1, 0x2) 02:56:56 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFCONF(r0, 0x89e1, 0x0) 02:56:57 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r0 = gettid() clone(0x30b2f100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 02:56:57 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000080)={0x0, "a8c9b9e1a0618cfcd3738b0430a26f25c5e88443708ab9a43d1dfd76dae4ef38ae9e579a182786ce7e766030a30dd8ad7495a15cc3fedab676acc69d3871ef00"}, 0x48, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0) 02:56:57 executing program 5: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000001740)) [ 231.969386][ T8467] IPVS: ftp: loaded support on port[0] = 21 [ 232.147102][ T8469] IPVS: ftp: loaded support on port[0] = 21 [ 232.218360][ T8467] chnl_net:caif_netlink_parms(): no params data found [ 232.340221][ T8471] IPVS: ftp: loaded support on port[0] = 21 [ 232.369616][ T8467] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.380294][ T8467] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.404719][ T8467] device bridge_slave_0 entered promiscuous mode [ 232.420063][ T8467] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.427880][ T8467] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.438355][ T8467] device bridge_slave_1 entered promiscuous mode [ 232.506371][ T8467] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.548955][ T8467] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.666592][ T8473] IPVS: ftp: loaded support on port[0] = 21 [ 232.667038][ T8469] chnl_net:caif_netlink_parms(): no params data found [ 232.689557][ T8467] team0: Port device team_slave_0 added [ 232.700088][ T8467] team0: Port device team_slave_1 added [ 232.755996][ T8467] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 232.762977][ T8467] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 232.796234][ T8467] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 232.848071][ T8467] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 232.865157][ T8467] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 232.892697][ T8467] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 233.020256][ T8475] IPVS: ftp: loaded support on port[0] = 21 [ 233.038172][ T8467] device hsr_slave_0 entered promiscuous mode [ 233.050148][ T8467] device hsr_slave_1 entered promiscuous mode [ 233.069709][ T8469] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.077902][ T8469] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.086334][ T8469] device bridge_slave_0 entered promiscuous mode [ 233.152964][ T8471] chnl_net:caif_netlink_parms(): no params data found [ 233.153142][ T8477] IPVS: ftp: loaded support on port[0] = 21 [ 233.180672][ T8469] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.188447][ T8469] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.196927][ T8469] device bridge_slave_1 entered promiscuous mode [ 233.281803][ T8469] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 233.296748][ T8469] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 233.410329][ T8469] team0: Port device team_slave_0 added [ 233.462270][ T8469] team0: Port device team_slave_1 added [ 233.554734][ T8473] chnl_net:caif_netlink_parms(): no params data found [ 233.580229][ T8469] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 233.588801][ T8469] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 233.616882][ T8469] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 233.628890][ T8471] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.636308][ T8471] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.645021][ T8471] device bridge_slave_0 entered promiscuous mode [ 233.655724][ T8471] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.662790][ T8471] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.673194][ T8471] device bridge_slave_1 entered promiscuous mode [ 233.692138][ T8469] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 233.701903][ T8469] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 233.728298][ T8469] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 233.818112][ T8469] device hsr_slave_0 entered promiscuous mode [ 233.826997][ T8469] device hsr_slave_1 entered promiscuous mode [ 233.834751][ T8469] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 233.842576][ T8469] Cannot create hsr debugfs directory [ 233.869321][ T8471] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 233.910671][ T8471] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 233.964774][ T2989] Bluetooth: hci0: command 0x0409 tx timeout [ 234.055354][ T8473] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.062452][ T8473] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.070776][ T8473] device bridge_slave_0 entered promiscuous mode [ 234.111971][ T8473] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.121913][ T8473] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.123407][ T5] Bluetooth: hci1: command 0x0409 tx timeout [ 234.136742][ T8473] device bridge_slave_1 entered promiscuous mode [ 234.145786][ T8471] team0: Port device team_slave_0 added [ 234.179375][ T8471] team0: Port device team_slave_1 added [ 234.193630][ T8473] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.207176][ T8473] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.237875][ T8475] chnl_net:caif_netlink_parms(): no params data found [ 234.252326][ T8477] chnl_net:caif_netlink_parms(): no params data found [ 234.280655][ T8473] team0: Port device team_slave_0 added [ 234.325913][ T8471] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 234.332911][ T8471] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 234.360449][ T8471] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 234.372350][ T8467] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 234.373832][ T3180] Bluetooth: hci2: command 0x0409 tx timeout [ 234.391707][ T8473] team0: Port device team_slave_1 added [ 234.417282][ T8471] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 234.425406][ T8471] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 234.452131][ T8471] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 234.467387][ T8467] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 234.517737][ T8467] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 234.545144][ T8473] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 234.552182][ T8473] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 234.580496][ T8473] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 234.602606][ T8473] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 234.609907][ T2989] Bluetooth: hci3: command 0x0409 tx timeout [ 234.613397][ T8473] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 234.643551][ T8473] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 234.659354][ T8467] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 234.691661][ T8471] device hsr_slave_0 entered promiscuous mode [ 234.699840][ T8471] device hsr_slave_1 entered promiscuous mode [ 234.707210][ T8471] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 234.715987][ T8471] Cannot create hsr debugfs directory [ 234.772102][ T8475] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.779446][ T8475] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.790164][ T8475] device bridge_slave_0 entered promiscuous mode [ 234.801351][ T8475] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.808619][ T8475] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.818511][ T8475] device bridge_slave_1 entered promiscuous mode [ 234.843607][ T3180] Bluetooth: hci4: command 0x0409 tx timeout [ 234.846613][ T8473] device hsr_slave_0 entered promiscuous mode [ 234.859690][ T8473] device hsr_slave_1 entered promiscuous mode [ 234.867156][ T8473] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 234.875535][ T8473] Cannot create hsr debugfs directory [ 234.955263][ T8477] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.962357][ T8477] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.971133][ T8477] device bridge_slave_0 entered promiscuous mode [ 234.987494][ T8475] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.006043][ T2989] Bluetooth: hci5: command 0x0409 tx timeout [ 235.033591][ T8477] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.040720][ T8477] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.050191][ T8477] device bridge_slave_1 entered promiscuous mode [ 235.067941][ T8475] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 235.125677][ T8477] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.147351][ T8475] team0: Port device team_slave_0 added [ 235.169524][ T8477] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 235.192830][ T8475] team0: Port device team_slave_1 added [ 235.209267][ T8469] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 235.222413][ T8469] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 235.266190][ T8475] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 235.273802][ T8475] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 235.302040][ T8475] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 235.329173][ T8469] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 235.384639][ T8475] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 235.391630][ T8475] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 235.419284][ T8475] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 235.448576][ T8469] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 235.469129][ T8477] team0: Port device team_slave_0 added [ 235.504794][ T8475] device hsr_slave_0 entered promiscuous mode [ 235.511699][ T8475] device hsr_slave_1 entered promiscuous mode [ 235.520014][ T8475] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 235.528316][ T8475] Cannot create hsr debugfs directory [ 235.558562][ T8477] team0: Port device team_slave_1 added [ 235.632457][ T8467] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.658921][ T8477] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 235.667723][ T8477] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 235.698109][ T8477] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 235.718175][ T8471] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 235.738397][ T8471] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 235.748689][ T8471] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 235.768823][ T8471] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 235.779567][ T8477] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 235.788573][ T8477] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 235.815571][ T8477] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 235.865382][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.882015][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.923306][ T8477] device hsr_slave_0 entered promiscuous mode [ 235.930637][ T8477] device hsr_slave_1 entered promiscuous mode [ 235.938860][ T8477] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 235.947927][ T8477] Cannot create hsr debugfs directory [ 235.958397][ T8467] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.043716][ T5] Bluetooth: hci0: command 0x041b tx timeout [ 236.090909][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.102298][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.114795][ T3180] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.121997][ T3180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.131786][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.141224][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.150111][ T3180] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.157312][ T3180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.165279][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 236.177150][ T8473] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 236.198917][ T8473] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 236.206039][ T2989] Bluetooth: hci1: command 0x041b tx timeout [ 236.232799][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 236.241331][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 236.260070][ T8473] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 236.272948][ T8473] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 236.317667][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.334101][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.362502][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 236.371539][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.381068][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.416171][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 236.426652][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.436493][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 236.451097][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.461070][ T8475] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 236.481729][ T2989] Bluetooth: hci2: command 0x041b tx timeout [ 236.492981][ T8469] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.517446][ T8475] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 236.528626][ T8467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.570220][ T8475] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 236.592843][ T8475] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 236.607230][ T8469] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.615597][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.624859][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.647874][ T8471] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.693206][ T2989] Bluetooth: hci3: command 0x041b tx timeout [ 236.712191][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 236.721488][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 236.730992][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.740635][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.749437][ T9541] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.756690][ T9541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.765238][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.774832][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.783445][ T9541] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.790570][ T9541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.820278][ T8467] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 236.832208][ T8471] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.841893][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 236.851932][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.860742][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.869011][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 236.905517][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 236.915122][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.926191][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.936847][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.946136][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.956916][ T8477] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 236.957173][ T2989] Bluetooth: hci4: command 0x041b tx timeout [ 236.976481][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.015032][ T8477] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 237.026242][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.037309][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.047251][ T55] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.054453][ T55] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.062563][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.072345][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.081028][ T55] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.083914][ T5] Bluetooth: hci5: command 0x041b tx timeout [ 237.088176][ T55] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.103798][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.112507][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.121435][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.130253][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.139422][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.167267][ T8477] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 237.179992][ T8477] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 237.199551][ T8469] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 237.213636][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.232436][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.241555][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.253922][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.279621][ T8473] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.311516][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.321793][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 237.337473][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 237.369302][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 237.377925][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.388179][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.397814][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.407253][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.416276][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.426234][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.434653][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.445387][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.455057][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 237.477668][ T8475] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.486691][ T8467] device veth0_vlan entered promiscuous mode [ 237.515080][ T8469] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 237.532517][ T8473] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.540530][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 237.551962][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 237.560912][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.569808][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.582191][ T8467] device veth1_vlan entered promiscuous mode [ 237.609072][ T8475] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.618410][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 237.635741][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.644179][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.684523][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 237.696275][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 237.705769][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.716334][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.726842][ T55] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.734203][ T55] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.742195][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.751221][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.760192][ T55] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.767339][ T55] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.775580][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.784806][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.793309][ T55] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.800383][ T55] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.809933][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.818602][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.878647][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.888555][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.899580][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.906737][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.916201][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.925554][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.934633][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.944011][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.952876][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.962287][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.971520][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.994269][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.018934][ T8469] device veth0_vlan entered promiscuous mode [ 238.064821][ T8467] device veth0_macvtap entered promiscuous mode [ 238.076209][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.087428][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.097693][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.107277][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.116547][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 238.125675][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.135118][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.144040][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.152287][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.161846][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.170795][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 238.178741][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 238.186844][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 238.195632][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 238.204460][ T5] Bluetooth: hci0: command 0x040f tx timeout [ 238.215865][ T8475] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 238.230971][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 238.246639][ T8467] device veth1_macvtap entered promiscuous mode [ 238.254943][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.262827][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.271844][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 238.280280][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 238.292069][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.301104][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.310386][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.319538][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.328412][ T5] Bluetooth: hci1: command 0x040f tx timeout [ 238.338592][ T8471] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 238.377742][ T8473] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 238.390632][ T8473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 238.414840][ T8475] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 238.425447][ T8469] device veth1_vlan entered promiscuous mode [ 238.444041][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 238.452646][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.463362][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.471927][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 238.481521][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 238.510099][ T8467] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 238.523652][ T2989] Bluetooth: hci2: command 0x040f tx timeout [ 238.536746][ T8477] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.548364][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 238.557818][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 238.596102][ T8467] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 238.608127][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 238.622174][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 238.634956][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 238.645318][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 238.667484][ T8471] device veth0_vlan entered promiscuous mode [ 238.695164][ T8467] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 238.704815][ T8467] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 238.713850][ T8467] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 238.725305][ T8467] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 238.737339][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 238.748488][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.764272][ T7] Bluetooth: hci3: command 0x040f tx timeout [ 238.770626][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.780242][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.790882][ T8471] device veth1_vlan entered promiscuous mode [ 238.807961][ T8477] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.832889][ T8469] device veth0_macvtap entered promiscuous mode [ 238.842070][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 238.852224][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 238.860546][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 238.868609][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.877253][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.886528][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 238.895690][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 238.910335][ T8473] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 238.940583][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 238.950218][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.960607][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.969661][ T55] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.976853][ T55] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.994132][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.013615][ T7] Bluetooth: hci4: command 0x040f tx timeout [ 239.025086][ T8469] device veth1_macvtap entered promiscuous mode [ 239.070139][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 239.080692][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 239.090626][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 239.100152][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.109748][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.119200][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.127983][ T55] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.135354][ T55] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.143287][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.151925][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.160977][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.163082][ T5] Bluetooth: hci5: command 0x040f tx timeout [ 239.170773][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.187003][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 239.231123][ T8469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 239.272673][ T8469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 239.302441][ T8469] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 239.335053][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 239.344203][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.354319][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.363438][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.372161][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 239.381487][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 239.390491][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 239.399595][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.449404][ T8469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 239.461425][ T8469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 239.474412][ T8469] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 239.493043][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.501053][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 239.510270][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 239.520858][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.529987][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 239.539220][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 239.551645][ T8475] device veth0_vlan entered promiscuous mode [ 239.571110][ T8475] device veth1_vlan entered promiscuous mode [ 239.586522][ T192] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 239.598198][ T192] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 239.606759][ T8469] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 239.620861][ T8469] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 239.629698][ T8469] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 239.638660][ T8469] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 239.657315][ T8471] device veth0_macvtap entered promiscuous mode [ 239.667033][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.675856][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 239.684552][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 239.694449][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 239.703757][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 239.714150][ T8473] device veth0_vlan entered promiscuous mode [ 239.721149][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 239.733690][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.742003][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.768462][ T8471] device veth1_macvtap entered promiscuous mode [ 239.837765][ T8473] device veth1_vlan entered promiscuous mode [ 239.853864][ T9773] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 239.862034][ T9773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 239.874113][ T9773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 239.882564][ T9773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.893383][ T9773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.907237][ T8477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 239.922510][ T8471] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 239.935912][ T8471] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 239.946841][ T8471] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 239.957900][ T8471] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 239.978986][ T8471] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 240.004127][ T8475] device veth0_macvtap entered promiscuous mode [ 240.035387][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 240.051520][ T26] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 240.060488][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 240.060960][ T26] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 240.076030][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.078322][ T8471] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 240.097784][ T8471] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.108338][ T8471] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 240.119336][ T8471] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.134728][ T8471] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 240.149881][ T8475] device veth1_macvtap entered promiscuous mode [ 240.178036][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.193916][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 240.201874][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 240.213605][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 240.283628][ T7] Bluetooth: hci0: command 0x0419 tx timeout [ 240.291271][ T8471] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 240.310470][ T8471] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 240.328679][ T8471] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 240.340258][ T8471] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 240.363675][ T7] Bluetooth: hci1: command 0x0419 tx timeout 02:57:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) [ 240.378679][ T8475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 240.399308][ T8475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.421254][ T8475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 240.443585][ T8475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.456411][ T8475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 240.468351][ T8475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.483402][ T8475] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 240.522278][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 240.539093][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.550554][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 240.560546][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 02:57:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x9, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000002c0)='GPL\x00', 0x4, 0x1000, &(0x7f00000003c0)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 240.578946][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.603067][ T7] Bluetooth: hci2: command 0x0419 tx timeout [ 240.603725][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.641573][ T8477] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.666399][ T26] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 240.675656][ T8473] device veth0_macvtap entered promiscuous mode [ 240.700552][ T8473] device veth1_macvtap entered promiscuous mode [ 240.712960][ T26] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 240.725664][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 240.741401][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 02:57:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r0 = getpid() syz_open_procfs$namespace(r0, 0x0) [ 240.782324][ T8475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 240.797847][ T8475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.825482][ T8475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 240.837720][ T8475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.849595][ T9773] Bluetooth: hci3: command 0x0419 tx timeout [ 240.856727][ T8475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 240.870688][ T8475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.884805][ C0] hrtimer: interrupt took 45411 ns 02:57:06 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) [ 240.906702][ T8475] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 240.979427][ T9773] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 241.004554][ T9773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 241.014678][ T8473] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 02:57:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x8}]}]}}, &(0x7f0000000240)=""/193, 0x32, 0xc1, 0x1}, 0x20) [ 241.042939][ T8473] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 241.064503][ T8473] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 241.083744][ T9773] Bluetooth: hci4: command 0x0419 tx timeout [ 241.097209][ T8473] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 241.114039][ T8473] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 241.126101][ T8473] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 241.137540][ T8473] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 241.149800][ T8473] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 241.178033][ T8473] batman_adv: batadv0: Interface activated: batadv_slave_0 02:57:07 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002340)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002500)=[{0x10, 0x1, 0x1}], 0x10}, 0x0) [ 241.196566][ T8475] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 241.215018][ T8475] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 241.229365][ T8475] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 241.242797][ T2989] Bluetooth: hci5: command 0x0419 tx timeout 02:57:07 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000014c0)={0x0, 0x2, &(0x7f0000001480)=[{&(0x7f0000001380)='O', 0x1}], 0x300}, 0x0) [ 241.268498][ T8475] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 241.325465][ T9773] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 241.338347][ T9773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 241.364265][ T8473] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 241.401306][ T8473] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 241.435378][ T8473] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 241.446767][ T8473] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 241.457245][ T8473] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 241.468271][ T8473] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 241.488570][ T8473] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 241.499786][ T8473] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 241.511285][ T8473] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 241.530298][ T8473] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 241.541966][ T8473] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 241.552768][ T8473] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 241.561615][ T8473] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 241.592084][ T9773] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 241.601536][ T9773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 241.616257][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 241.638063][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 241.667387][ T26] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 241.677020][ T26] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 241.712835][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 241.720813][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 241.778976][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 241.794795][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.806647][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 241.815948][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.858939][ T8477] device veth0_vlan entered promiscuous mode [ 241.878047][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.900095][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 02:57:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x2}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000000080)=""/196, 0x28, 0xc4, 0x1}, 0x20) [ 241.948527][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 241.989725][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 242.002493][ T8477] device veth1_vlan entered promiscuous mode [ 242.029183][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 242.045674][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 242.114333][ T192] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 242.122332][ T192] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 242.173743][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 242.201835][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 242.215607][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 02:57:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 242.236356][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 242.287301][ T8477] device veth0_macvtap entered promiscuous mode [ 242.321195][ T152] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 242.338820][ T152] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 242.351612][ T8477] device veth1_macvtap entered promiscuous mode [ 242.377033][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 242.415422][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 242.425004][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 242.445190][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 242.458970][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 242.466849][ T152] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 242.476088][ T152] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 242.488242][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 242.500065][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 242.521962][ T8477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 242.547024][ T8477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 02:57:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)='c', 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000003980)={0x0, 0x0, 0x0}, 0x0) [ 242.576144][ T8477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 242.632569][ T8477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.642425][ T8477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 02:57:08 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x8, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000002c0)='GPL\x00', 0x4, 0x1000, &(0x7f00000003c0)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 242.677322][ T8477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.718125][ T8477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 242.772671][ T8477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.792620][ T8477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 242.810236][ T8477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.831249][ T8477] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 242.859964][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 242.869402][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 242.894705][ T8477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 242.905607][ T8477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.917555][ T8477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 242.930143][ T8477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.952628][ T8477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 242.966617][ T8477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.979244][ T8477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 242.992115][ T8477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 243.002096][ T8477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 243.013148][ T8477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 243.026944][ T8477] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 243.043748][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 243.052281][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 243.090646][ T8477] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.101850][ T8477] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.118161][ T8477] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.127600][ T8477] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.231222][ T192] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 243.250634][ T192] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 243.270979][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 243.289731][ T192] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 243.300956][ T192] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 243.315288][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:57:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x3f, [{0x0, 0x2}]}, @volatile={0x0, 0x0, 0x0, 0x2}]}}, 0x0, 0x3e}, 0x20) 02:57:09 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20842, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x420c0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:57:09 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) 02:57:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:09 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000180)="f7", 0x1}], 0x1}, 0x90) close(r0) 02:57:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0xc}]}]}}, &(0x7f0000000240)=""/193, 0x32, 0xc1, 0x1}, 0x20) 02:57:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:09 executing program 1: socketpair(0x29, 0x2, 0x46b, &(0x7f0000000080)) 02:57:09 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x84) 02:57:09 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) 02:57:09 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @remote, 0x1}, 0x1c) 02:57:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x29, 0x4c, 0x0, 0x4) 02:57:09 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000003300)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000080)='m', 0x1}], 0x1}}, {{&(0x7f0000001440)=@in6={0xa, 0x0, 0x0, @private1}, 0x80, &(0x7f0000001840)=[{&(0x7f00000014c0)="80", 0x1}], 0x1, 0x0, 0x700}}, {{0x0, 0x0, &(0x7f0000002a40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x3, 0x0) 02:57:09 executing program 0: syz_genetlink_get_family_id$ethtool(0xffffffffffffffff) 02:57:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x29, 0x21, 0x0, 0x4) 02:57:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, 0x0, &(0x7f0000000080)) 02:57:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:09 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 02:57:09 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000080)={@multicast, @empty, @void, {@ipv4={0x800, @generic={{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @rand_addr=0x64010100, {[@noop, @lsrr={0x83, 0x3, 0xf3}]}}}}}}, 0x0) 02:57:09 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, 0x0, 0x0) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0)=0x20, 0x2) r0 = socket(0x10, 0x80002, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000002740), 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, 0x9c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000002780)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x3ff, 0x3ff, 0x6, 0x4040, 0x10001}, &(0x7f0000002840)=0x98) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100)}], 0x1, 0x0) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_SET(r5, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x0, 0x6, 0x0, "fdfe7702628e443dcebc6e12b20233ed469e267a8ce76596accb9ec4c4383574347f3a44125759c7c3b558a47079cd3a362f8fd728b06914bca98fde28f89139442927f26543c5115f5d45eae676161a"}, 0xd8) 02:57:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000001c80)={0x30, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0x0) 02:57:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x29, 0x22, 0x0, 0x4) 02:57:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 02:57:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x29, 0x12, 0x0, 0x4) 02:57:09 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xffe0}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0xc, 0x2, [@TCA_U32_HASH={0x8}]}}]}, 0x38}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 02:57:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x29, 0x8, 0x0, 0x4) 02:57:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 02:57:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x5) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)={0x24, r1, 0x711, 0x0, 0x0, {0x8}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}]}, 0x24}, 0x1, 0x0, 0x0, 0xc804}, 0x0) 02:57:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x29, 0x3a, 0x0, 0x4) [ 244.239261][T10031] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 244.310266][T10031] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 02:57:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r1, 0x8e0808e8a85f475f}, 0x14}}, 0x0) 02:57:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 02:57:10 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000003300)=[{{0x0, 0x0, 0x0}}], 0x1, 0xf0ff7f) 02:57:10 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000700)={'ip_vti0\x00', &(0x7f0000000680)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @empty}}}}) 02:57:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x29, 0x3c, 0x0, 0x4) 02:57:10 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) sendmmsg$sock(r0, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)='^', 0x1}], 0x1}}], 0x1, 0x0) 02:57:10 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) socket$inet6(0xa, 0x0, 0x6b) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x44050, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) sendmmsg(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000000780)="e5", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) [ 244.770602][T10059] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) 02:57:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e19b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) recvmmsg(r2, &(0x7f0000002440), 0x3ffffffffffff67, 0x0, 0x0) r3 = socket(0x0, 0x803, 0x0) bind$qrtr(r3, &(0x7f0000000100), 0xc) socket$pptp(0x18, 0x1, 0x2) 02:57:10 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000000)=@framed={{}, [@call, @ldst={0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000080)='GPL\x00', 0x1, 0xb4, &(0x7f00000000c0)=""/180, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:57:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, &(0x7f0000000240)=""/193, 0x0, 0xc1, 0x1}, 0x20) 02:57:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8912, &(0x7f0000000000)={'vxcan1\x00', @ifru_map}) 02:57:10 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x5411, &(0x7f0000000040)={'batadv_slave_0\x00', @ifru_map}) 02:57:10 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$DEVLINK_CMD_PORT_SPLIT(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={0x0}}, 0x0) 02:57:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, &(0x7f0000000240)=""/193, 0x0, 0xc1, 0x1}, 0x20) 02:57:10 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000003300)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000080)='m', 0x1}], 0x1}}, {{&(0x7f0000001440)=@in6={0xa, 0x0, 0x0, @private1}, 0x80, &(0x7f0000001840)=[{&(0x7f00000014c0)="80", 0xfffffffffffffd9f}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x3, 0x4004000) 02:57:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) socket$l2tp(0x2, 0x2, 0x73) syz_emit_ethernet(0x4e, &(0x7f00000002c0)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa010100, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0xb, 0x2, 0x0, 0x0, 0x0, {[@fastopen={0x22, 0x2}, @exp_fastopen={0xfe, 0x11, 0xf989, "79ac6faf8b9f9d205b96841be2"}, @fastopen={0x22, 0x2}]}}}}}}}, 0x0) 02:57:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={&(0x7f0000000480)={0x84, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}]}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}]}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0x84}}, 0x0) 02:57:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000040)={'lo\x00', @ifru_map}) 02:57:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, &(0x7f0000000240)=""/193, 0x0, 0xc1, 0x1}, 0x20) 02:57:11 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r0, 0x0, 0x0) 02:57:11 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000740)='net/unix\x00') read$FUSE(r0, 0x0, 0x0) 02:57:11 executing program 5: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="7f", 0x1, 0xfffffffffffffffe) keyctl$clear(0x3, r0) 02:57:11 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x121000, 0x0) 02:57:11 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:57:11 executing program 3: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000002d00)='/sys/kernel/mm/ksm/run\x00', 0x1, 0x0) write$sysctl(r0, &(0x7f0000002d40)='5\x00', 0x2) 02:57:11 executing program 0: r0 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f0000400000/0xc00000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0xd000) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffb000/0x2000)=nil) 02:57:11 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x8, r1, r0) 02:57:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/193, 0x1a, 0xc1, 0x1}, 0x20) 02:57:11 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="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", 0x2e6}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="ecfaba54c0f88c7f0000000001000000d3bfe03281664d64e048bf2420c9dcd752f8295c402f8d00d3208c4dfae5ef62a554d5ce3b231adba7b791b451ef2e7f508d5c5784548fc05ddf18f527d8f0523e94be2a6da316332b6976caebb34801230546da0b7c5e82bf3475b615bf261da876f57c30ef510bd33850204a3f8e0d2b00076ccfa583d92ca7e5666acfe875ea172dbecb543ef49bd02b180d6e689f8d157410985bb59698f1593d65077ae9"]) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) setrlimit(0x0, 0x0) setuid(0x0) r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b", 0xe) recvmmsg(r0, &(0x7f0000002ec0), 0x0, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) ppoll(0x0, 0x0, 0x0, &(0x7f0000006540), 0x8) getrlimit(0x5, &(0x7f0000000040)) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) 02:57:11 executing program 0: r0 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f0000400000/0xc00000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0xd000) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffb000/0x2000)=nil) 02:57:11 executing program 4: request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) 02:57:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/193, 0x1a, 0xc1, 0x1}, 0x20) 02:57:11 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0x10}}, 0x0) 02:57:11 executing program 3: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a000, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) 02:57:11 executing program 0: r0 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f0000400000/0xc00000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0xd000) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffb000/0x2000)=nil) 02:57:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/193, 0x1a, 0xc1, 0x1}, 0x20) 02:57:11 executing program 4: msgget(0x2, 0x206) 02:57:12 executing program 0: r0 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f0000400000/0xc00000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0xd000) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffb000/0x2000)=nil) 02:57:12 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x16, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000ec0)=""/202, 0x20031ec0}], 0x1, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0xc, 0x0}, 0x0) 02:57:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 246.308926][T10148] squashfs: Unknown parameter 'ìúºTÀøŒ' 02:57:12 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sysvipc/msg\x00', 0x0, 0x0) mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 02:57:12 executing program 3: memfd_create(&(0x7f0000000000)='net/unix\x00', 0x6) 02:57:12 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) vmsplice(r0, &(0x7f0000003740)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 02:57:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:12 executing program 0: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x500a) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x3) 02:57:12 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x65, 0x6, 0x0, 0x0) 02:57:12 executing program 4: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(r0, &(0x7f00000000c0)='reno\x00', 0x2) 02:57:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:12 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0x10}}, 0x0) 02:57:12 executing program 0: r0 = socket(0x26, 0x5, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000ac0)='/dev/vcs#\x00', 0x0, 0x0) r2 = dup2(r0, r0) dup2(r1, r2) 02:57:12 executing program 1: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000000)={"a5256b92c80da7ef2c11bf6a5499d934"}) getresuid(&(0x7f0000000300), 0x0, 0x0) 02:57:12 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) mmap$usbmon(&(0x7f0000a7b000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) shmat(0x0, &(0x7f0000a7c000/0x4000)=nil, 0x4800) 02:57:12 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000002200)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000002180)) 02:57:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 02:57:12 executing program 3: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsu(&(0x7f0000001480)='/dev/vcsu#\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000002a80)=[&(0x7f0000001540)={0x0, 0x0, 0x2000000, 0x0, 0x0, r1, 0x0}]) 02:57:12 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x1000000000000001, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000ff2000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) 02:57:12 executing program 1: select(0x0, 0x0, 0x0, &(0x7f0000001240), &(0x7f0000001280)) 02:57:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r1}, 0x14}}, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x401) 02:57:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 02:57:12 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/slabinfo\x00', 0x0, 0x0) 02:57:12 executing program 0: syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') 02:57:12 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002100)='/dev/zero\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, 0x0) 02:57:12 executing program 3: syz_open_procfs(0x0, &(0x7f0000000140)='sched\x00') 02:57:13 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="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", 0x2e6}], 0x0, &(0x7f00000002c0)=ANY=[]) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) fstat(0xffffffffffffffff, &(0x7f00000020c0)) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) setrlimit(0x0, &(0x7f0000000000)) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) ppoll(0x0, 0x0, 0x0, &(0x7f0000006540)={[0x3]}, 0x8) getrlimit(0x0, &(0x7f0000000040)) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) 02:57:13 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x101182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002e00) 02:57:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 02:57:13 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="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", 0x2e6}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB]) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) setrlimit(0x0, &(0x7f0000000000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r1, 0x0, 0x0, 0x2, &(0x7f00000001c0)={0x77359400}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, &(0x7f00000000c0)) ppoll(0x0, 0x0, 0x0, &(0x7f0000006540)={[0x3]}, 0x8) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) 02:57:13 executing program 0: r0 = socket(0x2, 0x3, 0x7) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) 02:57:13 executing program 3: r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKIOOPT(r0, 0xc0189436, &(0x7f0000000000)) 02:57:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1}, 0x20) 02:57:13 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x1c575) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, 0x0) 02:57:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1}, 0x20) 02:57:13 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="6873717307000000911d675f000010000000000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a10200000000000001", 0x2e6}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB]) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) setrlimit(0x0, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) ppoll(0x0, 0x0, 0x0, &(0x7f0000006540)={[0x3]}, 0x8) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) [ 247.636539][ T34] audit: type=1804 audit(1607482633.454:2): pid=10275 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir255266748/syzkaller.mpWHLe/27/file0" dev="sda1" ino=15794 res=1 errno=0 02:57:13 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x101182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002e00) 02:57:13 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1000, 0x68e42) r1 = dup2(r0, r0) write$FUSE_GETXATTR(r1, &(0x7f0000002100)={0x18}, 0xffffff50) r2 = fcntl$dupfd(r0, 0x0, r0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000002080)={0x18, 0x0, 0x0, {0x3}}, 0x18) write$FUSE_DIRENTPLUS(r2, 0x0, 0xb8) sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x9c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x1}}]}, 0x9c}, 0x1, 0x0, 0x0, 0x24000004}, 0x8001) 02:57:14 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="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", 0x2e6}], 0x0, &(0x7f00000002c0)=ANY=[]) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) fstat(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) setrlimit(0x0, &(0x7f0000000000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r2, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) ppoll(0x0, 0x0, 0x0, &(0x7f0000006540)={[0x3]}, 0x8) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 02:57:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1}, 0x20) 02:57:14 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fsetxattr$security_evm(r1, &(0x7f0000000100)='security.evm\x00', 0x0, 0xffffffff00000000, 0x0) 02:57:14 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x442) r1 = fcntl$dupfd(r0, 0x0, r0) read$FUSE(r1, 0x0, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f00000021c0)=ANY=[@ANYBLOB="b80000000000000034f9458d17a453af3ad245dd2b4844beaa7db2b115dc93e6ab21e142dd"], 0xb8) 02:57:14 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x101182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002e00) 02:57:14 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x442) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000000)) 02:57:14 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="6873717307000000911d675f000010000000000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a10200000000000001", 0x2e6}], 0x0, &(0x7f00000002c0)=ANY=[]) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) getrlimit(0x5, 0x0) 02:57:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='net/arp\x00') dup2(r1, r0) 02:57:14 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x442) r1 = fcntl$dupfd(r0, 0x0, r0) read$FUSE(r1, 0x0, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f00000021c0)=ANY=[@ANYBLOB="b80000000000000034f9458d17a453af3ad245dd2b4844beaa7db2b115dc93e6ab21e142dd"], 0xb8) 02:57:14 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x101182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002e00) 02:57:14 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x442) sendfile(r0, r0, 0x0, 0x0) 02:57:15 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000080)) 02:57:15 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000880)={'wg2\x00'}) 02:57:15 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x442) r1 = fcntl$dupfd(r0, 0x0, r0) read$FUSE(r1, 0x0, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f00000021c0)=ANY=[@ANYBLOB="b80000000000000034f9458d17a453af3ad245dd2b4844beaa7db2b115dc93e6ab21e142dd"], 0xb8) 02:57:15 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x8}, 0x0, 0x0, 0x0) [ 249.313299][T10348] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 02:57:15 executing program 1: r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKIOOPT(r0, 0x1268, &(0x7f0000006340)) 02:57:15 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="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", 0x2e6}], 0x0, &(0x7f00000002c0)=ANY=[]) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) fstat(0xffffffffffffffff, &(0x7f00000020c0)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) setrlimit(0x0, &(0x7f0000000000)) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) write(0xffffffffffffffff, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, &(0x7f00000001c0)={0x77359400}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, &(0x7f00000000c0)) ppoll(0x0, 0x0, 0x0, &(0x7f0000006540)={[0x3]}, 0x8) getrlimit(0x5, &(0x7f0000000040)) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) 02:57:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) 02:57:15 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="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", 0x2e6}], 0x0, &(0x7f00000002c0)=ANY=[]) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) getrlimit(0x5, 0x0) 02:57:15 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x442) r1 = fcntl$dupfd(r0, 0x0, r0) read$FUSE(r1, 0x0, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f00000021c0)=ANY=[@ANYBLOB="b80000000000000034f9458d17a453af3ad245dd2b4844beaa7db2b115dc93e6ab21e142dd"], 0xb8) 02:57:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000000)={'vcan0\x00', @ifru_map}) 02:57:15 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKIOMIN(r0, 0x40049409, 0x0) 02:57:15 executing program 1: pselect6(0x32, &(0x7f0000000200), &(0x7f0000000240)={0x6}, 0x0, 0x0, 0x0) 02:57:15 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x8}, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x9}, 0x0, 0x0, 0x0, 0x0) 02:57:15 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 02:57:15 executing program 5: r0 = socket(0x26, 0x5, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 02:57:15 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="6873717307000000911d675f000010000000000004001400d0000200040000001e01000000000000f5020000000000009902000000000000dd020000000000000601000000000000d4010000000000004d020000000000008702000000000000fd377a585a0000016922de3602c01764210110000c14f5cae00063000f5d00399e4bacd2526994d512eda5bf000000004a5579b2000127640fa29cb09042990d010000000001595afd377a585a0000016922de3603c01c9a082101100000000093fc58dee0041900145d00399e4bacd2526994d51508fe16ca84a7aa3689df00988896660001309a080000002ec42d993e300d8b020000000001595a73797a6b616c6c657273cc00fd377a585a0000016922de3603c09401be022101020000002be6a37de0013d008c5d0001001eb04f262e3c2f422bdb8c111c2eea0ff1b7f87c3c98930ae9bef2e6cfbe86642d312630d1c1177c3f02eccf24fa6458574e2954843dbd6bc98680050321638c7a93375db1e71bae623d26e9096427e197374c50e829fa416bd93eb4fcf067eb650be21878e9ae58de233e584bfa0f44d85900daa964d53b67d7a1215e51928921aee72793826611b43c00e599fd790001a801be020000298353f53e300d8b020000000001595a7780010000000000000003000000240000000200040066696c6530480001000300040066696c6531040000000000000001000000000000000200080066696c652e636f6c64860001000100040066696c6530a60004000200040066696c6531e20005000200040066696c6532e20005000200040066696c653338800000000000000000860000000000000024000000000000004800000000000000a600000000000000e2000000000000001e010000000000004d0200000000000008805cf90100535f01008f02000000000000288000000600786174747231060000007861747472310000060078617474723206000000786174747232108000000000000000000200000024000000a10200000000000001", 0x2e6}], 0x0, &(0x7f00000002c0)=ANY=[]) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) getrlimit(0x5, 0x0) 02:57:16 executing program 1: request_key(&(0x7f0000000400)='.dead\x00', 0x0, 0x0, 0xfffffffffffffffe) 02:57:16 executing program 0: r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKIOOPT(r0, 0x301, &(0x7f0000006340)) 02:57:16 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000680)='ns/pid\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') 02:57:16 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1000, 0x68e42) r1 = dup2(r0, r0) write$FUSE_GETXATTR(r1, &(0x7f0000002100)={0x18}, 0xffffff50) r2 = fcntl$dupfd(r0, 0x0, r0) write$FUSE_LSEEK(r1, &(0x7f0000002080)={0x18, 0x0, 0x0, {0x3}}, 0x18) write$FUSE_DIRENTPLUS(r2, 0x0, 0xb8) 02:57:16 executing program 4: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000000)=0x401, 0x3ff, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x3) 02:57:16 executing program 1: move_pages(0x0, 0x1ffffffffffffdfd, &(0x7f0000000080)=[&(0x7f0000ff9000/0x7000)=nil], 0x0, &(0x7f00000000c0), 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:57:16 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="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", 0x2e6}], 0x0, &(0x7f00000002c0)=ANY=[]) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) getrlimit(0x5, 0x0) 02:57:16 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/rt_cache\x00') 02:57:16 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x442) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00}}}, 0x90) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000180)) 02:57:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x2, 0x0, &(0x7f0000000000)=0x5f) 02:57:17 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKIOMIN(r0, 0x125f, 0x0) 02:57:17 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000005f00)='/dev/null\x00', 0xa0802, 0x0) 02:57:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8941, 0x0) 02:57:17 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000000)='\x00', 0x1}], 0x1, 0x4081003, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100007e00) 02:57:17 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) 02:57:17 executing program 5: move_pages(0x0, 0x4a, &(0x7f0000000080), 0x0, &(0x7f00000000c0), 0x0) 02:57:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 02:57:19 executing program 1: add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0xfffff, 0x0) 02:57:19 executing program 2: getgroups(0x6b5498d, 0x0) 02:57:19 executing program 0: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) chown(&(0x7f0000000000)='./bus/file0\x00', 0xee01, 0x0) mount$overlay(0x400002, &(0x7f0000000140)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on,index=on']) rmdir(&(0x7f0000000080)='./bus/file0\x00') 02:57:19 executing program 4: clock_gettime(0x0, &(0x7f0000002200)={0x0, 0x0}) pselect6(0x40, &(0x7f0000002140), &(0x7f0000002180)={0x1ff}, 0x0, &(0x7f0000002240)={0x0, r0+10000000}, &(0x7f00000022c0)={&(0x7f0000002280)={[0x9]}, 0x8}) syz_open_procfs(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 02:57:19 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000005ac0)='/dev/nbd#\x00', 0x0, 0x401) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000005e80)) 02:57:19 executing program 5: request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)=')\'/:%\xa2\x00', 0x0) 02:57:19 executing program 2: mq_open(&(0x7f0000000040)='nt\x03\xfe\xa3?\x13\rW\x14o\x84>\x1c:\xd5\x1f\x00\x00\'<\x14\xfa: .\x9dt%\xc8)\xf1\x89\xd3h\xd5\xa9\x81r1l\xaa\xa0Y{) \xde\xca\xfc\xd3O\xd3\a\xb3\xd8\xc6\xaa\xd8\x00'/72, 0x0, 0x0, 0x0) 02:57:19 executing program 5: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) keyctl$invalidate(0x15, r0) 02:57:19 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="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", 0x2e6}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="ecfaba54c0f88c7f0000000001000000d3bfe03281664d64e048bf2420c9dcd752f8295c402f8d00d3208c4dfae5ef62a554d5ce3b231adba7b791b451ef2e7f508d5c5784548fc05ddf18f527d8f0523e94be2a6da316332b6976caebb34801230546da0b7c5e82bf3475b615bf261da876f57c30ef510bd33850204a3f8e0d2b00076ccfa583d92ca7e5666acfe875ea172dbecb543ef49bd02b180d6e689f8d157410985bb59698f1593d65077ae9f7f5c1e1a30cb4222e"]) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) fstat(0xffffffffffffffff, &(0x7f00000020c0)) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) setrlimit(0x0, &(0x7f0000000000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000000", 0x19) recvmmsg(r2, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) ppoll(0x0, 0x0, 0x0, &(0x7f0000006540)={[0x3]}, 0x8) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 02:57:19 executing program 4: r0 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f0000400000/0xc00000)=nil) shmat(r0, &(0x7f0000ffc000/0x3000)=nil, 0x500a) shmat(r0, &(0x7f000066b000/0x13000)=nil, 0x500a) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2002, 0x2002, 0x3, &(0x7f0000ffb000/0x2000)=nil) 02:57:19 executing program 1: pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x3) [ 253.874384][T10488] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 02:57:19 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000080)) 02:57:19 executing program 5: prctl$PR_SET_MM(0x23, 0xf, &(0x7f0000ffa000/0x3000)=nil) 02:57:19 executing program 2: r0 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f0000400000/0xc00000)=nil) shmat(r0, &(0x7f0000ac9000/0x1000)=nil, 0x5000) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000b3f000/0x2000)=nil], 0x0, &(0x7f0000000040), 0x0) 02:57:19 executing program 1: r0 = shmget(0x2, 0x1000, 0x0, &(0x7f00009c5000/0x1000)=nil) shmat(r0, &(0x7f0000ffc000/0x3000)=nil, 0x500a) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000000)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffb000/0x2000)=nil) 02:57:19 executing program 4: clock_gettime(0x1, &(0x7f00000001c0)) 02:57:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x8953, &(0x7f0000000040)={'batadv_slave_0\x00', @ifru_map}) 02:57:20 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1000, 0x68e42) r1 = dup2(r0, r0) write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000002080)={0x18, 0x0, 0x0, {0x3}}, 0x18) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x8040) 02:57:20 executing program 2: mbind(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000180)=0x7, 0x6, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x2) 02:57:20 executing program 1: syz_mount_image$fuse(&(0x7f0000003540)='fuse\x00', &(0x7f0000003580)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000006200)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) [ 254.637083][T10528] fuse: Bad value for 'fd' [ 254.687220][T10528] fuse: Bad value for 'fd' 02:57:20 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x40c42) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00}}}, 0x90) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0xea, &(0x7f00000005c0)=""/234}, &(0x7f0000000340)="3d2ed1fbdcea", 0x0, 0x0, 0x0, 0x0, 0x0}) 02:57:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x840000000003, 0x2) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) 02:57:20 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001200)='ns/user\x00') ioctl$NS_GET_OWNER_UID(r0, 0x5452, &(0x7f0000000080)) 02:57:20 executing program 5: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r0, 0x5412, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, "68264100e3ffffffffffffff00fffffff100"}) 02:57:20 executing program 2: r0 = socket(0x2, 0x3, 0x7) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000380)=[{0x0}], 0x1}, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 02:57:20 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, 0x0, 0x28}, 0x0) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/user\x00') ioctl$NS_GET_OWNER_UID(r0, 0x5452, &(0x7f0000000080)) [ 254.890793][T10534] [U] ^Z 02:57:20 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x0, 0x0) mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 02:57:20 executing program 2: request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='*(\x00', 0x0) 02:57:20 executing program 0: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsu(&(0x7f0000001480)='/dev/vcsu#\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000002a80)=[&(0x7f0000001540)={0x0, 0x0, 0x0, 0x7, 0x0, r1, 0x0}]) 02:57:20 executing program 4: r0 = socket(0x2, 0x3, 0x7) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @broadcast}, @in={0x2, 0x0, @empty}, @generic={0xf, "a436a89381664cb5a1397213e91c"}, 0xfffd, 0x0, 0x0, 0x0, 0x4}) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 02:57:20 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x3, 0x0, &(0x7f0000000040)) 02:57:20 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setfsuid(r0) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00', 0x1, 0x0) fstatfs(0xffffffffffffffff, 0x0) 02:57:20 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000180)=@phonet={0x23, 0x0, 0x0, 0x1}, 0x80) 02:57:21 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 02:57:21 executing program 0: io_setup(0x288e4128, &(0x7f0000000000)) 02:57:21 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKIOMIN(r0, 0xc0045878, 0x0) 02:57:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() r2 = gettid() ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(0x0, 0x0) sysinfo(0x0) socket(0x0, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="240000001a005f0014f9f50700090900", 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={0x0, 0xdc}}, 0x40800) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000800)={0x53, 0xfffffffffffffffb, 0x7d, 0x6, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000680)="76acaa1534fe5269090c2bd765a25d455f43b3b544d4d972be4bbb13265cbbb650c606f21817895a494170960abf0c70e2c7cbf7ebef317f3bac1c79b0179c8ba80dd11a5445cb43d02b04ac21d0b79fae0668a5464c42fe55ecd395945c705eb396db0e9c97f0f2bec00bd9ce3551798942b5eab93a3c9d121fe8c95b", &(0x7f0000000780)=""/37, 0x3ff, 0x10004, 0x0, 0x0}) write$P9_RATTACH(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4610, 0x0, 0x200, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:57:21 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x0) 02:57:21 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="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", 0x2e6}], 0x0, &(0x7f00000002c0)=ANY=[]) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) write(0xffffffffffffffff, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(0xffffffffffffffff, &(0x7f0000002ec0), 0x400000000000ec0, 0x0, &(0x7f00000001c0)={0x77359400}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) ppoll(0x0, 0x0, 0x0, &(0x7f0000006540)={[0x3]}, 0x8) 02:57:21 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x442) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00}}}, 0x90) ioctl$SG_GET_REQUEST_TABLE(r0, 0x227c, 0x0) 02:57:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x81) 02:57:21 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x4b47, &(0x7f0000000100)={0x0, 0x27f}) 02:57:21 executing program 3: fanotify_mark(0xffffffffffffffff, 0x2, 0x8000002, 0xffffffffffffffff, 0x0) 02:57:21 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="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", 0x2e6}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="ecfaba54c0f88c7f0000000001000000d3bfe03281664d64e048bf2420c9dcd752f8295c402f8d00d3208c4dfae5ef62a554d5ce3b231adba7b791b451ef2e7f508d5c5784548fc05ddf18f527d8f0523e94be2a6da316332b6976caebb34801230546da0b7c5e82bf3475b615bf261da876f57c30ef510bd33850204a3f8e0d2b00076ccfa583d92ca7e5666acfe875ea172dbecb543ef49bd02b180d6e689f8d157410985bb59698f1593d65077ae9f7f5c1e1a30cb4222e40"]) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) fstat(0xffffffffffffffff, &(0x7f00000020c0)) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) setrlimit(0x0, &(0x7f0000000000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r1, 0x0, 0x0, 0x2, &(0x7f00000001c0)={0x77359400}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) ppoll(0x0, 0x0, 0x0, &(0x7f0000006540)={[0x3]}, 0x8) 02:57:21 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x442) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00}}}, 0x90) ioctl$SG_GET_REQUEST_TABLE(r0, 0x227c, 0x0) 02:57:21 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x442) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00}}}, 0x90) ioctl$SG_GET_REQUEST_TABLE(r0, 0x227c, 0x0) 02:57:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) 02:57:21 executing program 3: munmap(&(0x7f0000400000/0xc00000)=nil, 0xc00000) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000997000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) [ 256.010233][ C1] sd 0:0:1:0: [sg0] tag#4978 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 256.020766][ C1] sd 0:0:1:0: [sg0] tag#4978 CDB: opcode=0x76 (reserved) [ 256.027978][ C1] sd 0:0:1:0: [sg0] tag#4978 CDB[00]: 76 ac aa 15 34 fe 52 69 09 0c 2b d7 65 a2 5d 45 [ 256.037599][ C1] sd 0:0:1:0: [sg0] tag#4978 CDB[10]: 5f 43 b3 b5 44 d4 d9 72 be 4b bb 13 26 5c bb b6 [ 256.047307][ C1] sd 0:0:1:0: [sg0] tag#4978 CDB[20]: 50 c6 06 f2 18 17 89 5a 49 41 70 96 0a bf 0c 70 [ 256.057219][ C1] sd 0:0:1:0: [sg0] tag#4978 CDB[30]: e2 c7 cb f7 eb ef 31 7f 3b ac 1c 79 b0 17 9c 8b [ 256.066853][ C1] sd 0:0:1:0: [sg0] tag#4978 CDB[40]: a8 0d d1 1a 54 45 cb 43 d0 2b 04 ac 21 d0 b7 9f [ 256.076723][ C1] sd 0:0:1:0: [sg0] tag#4978 CDB[50]: ae 06 68 a5 46 4c 42 fe 55 ec d3 95 94 5c 70 5e [ 256.086521][ C1] sd 0:0:1:0: [sg0] tag#4978 CDB[60]: b3 96 db 0e 9c 97 f0 f2 be c0 0b d9 ce 35 51 79 [ 256.096516][ C1] sd 0:0:1:0: [sg0] tag#4978 CDB[70]: 89 42 b5 ea b9 3a 3c 9d 12 1f e8 c9 5b [ 256.113082][T10603] squashfs: Unknown parameter 'ìúºTÀøŒ' [ 256.186862][ C0] sd 0:0:1:0: [sg0] tag#4979 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 256.197290][ C0] sd 0:0:1:0: [sg0] tag#4979 CDB: opcode=0x76 (reserved) [ 256.204410][ C0] sd 0:0:1:0: [sg0] tag#4979 CDB[00]: 76 ac aa 15 34 fe 52 69 09 0c 2b d7 65 a2 5d 45 [ 256.214054][ C0] sd 0:0:1:0: [sg0] tag#4979 CDB[10]: 5f 43 b3 b5 44 d4 d9 72 be 4b bb 13 26 5c bb b6 [ 256.223700][ C0] sd 0:0:1:0: [sg0] tag#4979 CDB[20]: 50 c6 06 f2 18 17 89 5a 49 41 70 96 0a bf 0c 70 [ 256.235015][ C0] sd 0:0:1:0: [sg0] tag#4979 CDB[30]: e2 c7 cb f7 eb ef 31 7f 3b ac 1c 79 b0 17 9c 8b [ 256.244640][ C0] sd 0:0:1:0: [sg0] tag#4979 CDB[40]: a8 0d d1 1a 54 45 cb 43 d0 2b 04 ac 21 d0 b7 9f [ 256.254252][ C0] sd 0:0:1:0: [sg0] tag#4979 CDB[50]: ae 06 68 a5 46 4c 42 fe 55 ec d3 95 94 5c 70 5e [ 256.263863][ C0] sd 0:0:1:0: [sg0] tag#4979 CDB[60]: b3 96 db 0e 9c 97 f0 f2 be c0 0b d9 ce 35 51 79 [ 256.273485][ C0] sd 0:0:1:0: [sg0] tag#4979 CDB[70]: 89 42 b5 ea b9 3a 3c 9d 12 1f e8 c9 5b 02:57:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() r2 = gettid() ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(0x0, 0x0) sysinfo(0x0) socket(0x0, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="240000001a005f0014f9f50700090900", 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={0x0, 0xdc}}, 0x40800) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000800)={0x53, 0xfffffffffffffffb, 0x7d, 0x6, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000680)="76acaa1534fe5269090c2bd765a25d455f43b3b544d4d972be4bbb13265cbbb650c606f21817895a494170960abf0c70e2c7cbf7ebef317f3bac1c79b0179c8ba80dd11a5445cb43d02b04ac21d0b79fae0668a5464c42fe55ecd395945c705eb396db0e9c97f0f2bec00bd9ce3551798942b5eab93a3c9d121fe8c95b", &(0x7f0000000780)=""/37, 0x3ff, 0x10004, 0x0, 0x0}) write$P9_RATTACH(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4610, 0x0, 0x200, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:57:22 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="7f", 0x1, 0xfffffffffffffffe) keyctl$clear(0x2, r0) 02:57:22 executing program 0: add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 02:57:22 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1000, 0x68e42) r1 = dup2(r0, r0) write$FUSE_GETXATTR(r1, &(0x7f0000002100)={0x18}, 0xffffff50) r2 = fcntl$dupfd(r0, 0x0, r0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000002080)={0x18, 0x0, 0x0, {0x3}}, 0x18) write$FUSE_DIRENTPLUS(r2, 0x0, 0xb8) 02:57:22 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x442) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00}}}, 0x90) ioctl$SG_GET_REQUEST_TABLE(r0, 0x227c, 0x0) 02:57:22 executing program 4: mlock(&(0x7f0000800000/0x800000)=nil, 0x800000) msync(&(0x7f0000c36000/0x3000)=nil, 0x3000, 0x4) 02:57:22 executing program 2: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 02:57:22 executing program 0: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 02:57:22 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) select(0x40, &(0x7f0000000140)={0x8}, 0x0, &(0x7f00000000c0)={0x8}, 0x0) 02:57:22 executing program 4: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:57:22 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="020a000007000000a7ae16ac12045c8e05001a"], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="020100090e"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 02:57:22 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) pipe2(&(0x7f0000000080), 0x0) pipe2(&(0x7f0000000080), 0x0) pipe2(&(0x7f00000006c0), 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) dup2(r0, r1) select(0x40, &(0x7f0000001180), &(0x7f0000000080)={0xcde}, 0x0, 0x0) [ 256.997135][ C1] sd 0:0:1:0: [sg0] tag#4981 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 257.007634][ C1] sd 0:0:1:0: [sg0] tag#4981 CDB: opcode=0x76 (reserved) [ 257.014769][ C1] sd 0:0:1:0: [sg0] tag#4981 CDB[00]: 76 ac aa 15 34 fe 52 69 09 0c 2b d7 65 a2 5d 45 [ 257.024437][ C1] sd 0:0:1:0: [sg0] tag#4981 CDB[10]: 5f 43 b3 b5 44 d4 d9 72 be 4b bb 13 26 5c bb b6 [ 257.034122][ C1] sd 0:0:1:0: [sg0] tag#4981 CDB[20]: 50 c6 06 f2 18 17 89 5a 49 41 70 96 0a bf 0c 70 [ 257.043722][ C1] sd 0:0:1:0: [sg0] tag#4981 CDB[30]: e2 c7 cb f7 eb ef 31 7f 3b ac 1c 79 b0 17 9c 8b [ 257.053322][ C1] sd 0:0:1:0: [sg0] tag#4981 CDB[40]: a8 0d d1 1a 54 45 cb 43 d0 2b 04 ac 21 d0 b7 9f [ 257.062929][ C1] sd 0:0:1:0: [sg0] tag#4981 CDB[50]: ae 06 68 a5 46 4c 42 fe 55 ec d3 95 94 5c 70 5e [ 257.072529][ C1] sd 0:0:1:0: [sg0] tag#4981 CDB[60]: b3 96 db 0e 9c 97 f0 f2 be c0 0b d9 ce 35 51 79 [ 257.082482][ C1] sd 0:0:1:0: [sg0] tag#4981 CDB[70]: 89 42 b5 ea b9 3a 3c 9d 12 1f e8 c9 5b 02:57:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() r2 = gettid() ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(0x0, 0x0) sysinfo(0x0) socket(0x0, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="240000001a005f0014f9f50700090900", 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={0x0, 0xdc}}, 0x40800) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000800)={0x53, 0xfffffffffffffffb, 0x7d, 0x6, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000680)="76acaa1534fe5269090c2bd765a25d455f43b3b544d4d972be4bbb13265cbbb650c606f21817895a494170960abf0c70e2c7cbf7ebef317f3bac1c79b0179c8ba80dd11a5445cb43d02b04ac21d0b79fae0668a5464c42fe55ecd395945c705eb396db0e9c97f0f2bec00bd9ce3551798942b5eab93a3c9d121fe8c95b", &(0x7f0000000780)=""/37, 0x3ff, 0x10004, 0x0, 0x0}) write$P9_RATTACH(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4610, 0x0, 0x200, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:57:23 executing program 0: r0 = socket$inet6(0x18, 0x3, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffe58) 02:57:23 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) execve(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchownat(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 02:57:23 executing program 3: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) chown(&(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0) 02:57:23 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="020a000007000000a7ae16ac12045c8e05001a"], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="020100090e"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 02:57:23 executing program 4: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 02:57:23 executing program 0: getgroups(0x7, &(0x7f0000000040)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) setregid(0x0, r0) 02:57:23 executing program 1: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 02:57:23 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="020a000007000000a7ae16ac12045c8e05001a"], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="020100090e"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 02:57:23 executing program 0: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) accept$inet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 02:57:23 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg(r0, &(0x7f0000002080)={&(0x7f0000001500)=@un=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000001b40)=[{&(0x7f0000001540)="dd", 0x1}, {0x0}, {&(0x7f00000016c0)='i', 0x1}], 0x3}, 0x0) 02:57:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, 0x0) [ 257.739724][ C0] sd 0:0:1:0: [sg0] tag#4982 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 257.750241][ C0] sd 0:0:1:0: [sg0] tag#4982 CDB: opcode=0x76 (reserved) [ 257.757368][ C0] sd 0:0:1:0: [sg0] tag#4982 CDB[00]: 76 ac aa 15 34 fe 52 69 09 0c 2b d7 65 a2 5d 45 [ 257.766981][ C0] sd 0:0:1:0: [sg0] tag#4982 CDB[10]: 5f 43 b3 b5 44 d4 d9 72 be 4b bb 13 26 5c bb b6 [ 257.776590][ C0] sd 0:0:1:0: [sg0] tag#4982 CDB[20]: 50 c6 06 f2 18 17 89 5a 49 41 70 96 0a bf 0c 70 [ 257.786219][ C0] sd 0:0:1:0: [sg0] tag#4982 CDB[30]: e2 c7 cb f7 eb ef 31 7f 3b ac 1c 79 b0 17 9c 8b [ 257.795837][ C0] sd 0:0:1:0: [sg0] tag#4982 CDB[40]: a8 0d d1 1a 54 45 cb 43 d0 2b 04 ac 21 d0 b7 9f [ 257.805471][ C0] sd 0:0:1:0: [sg0] tag#4982 CDB[50]: ae 06 68 a5 46 4c 42 fe 55 ec d3 95 94 5c 70 5e [ 257.815195][ C0] sd 0:0:1:0: [sg0] tag#4982 CDB[60]: b3 96 db 0e 9c 97 f0 f2 be c0 0b d9 ce 35 51 79 [ 257.824833][ C0] sd 0:0:1:0: [sg0] tag#4982 CDB[70]: 89 42 b5 ea b9 3a 3c 9d 12 1f e8 c9 5b 02:57:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() r2 = gettid() ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(0x0, 0x0) sysinfo(0x0) socket(0x0, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="240000001a005f0014f9f50700090900", 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={0x0, 0xdc}}, 0x40800) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000800)={0x53, 0xfffffffffffffffb, 0x7d, 0x6, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000680)="76acaa1534fe5269090c2bd765a25d455f43b3b544d4d972be4bbb13265cbbb650c606f21817895a494170960abf0c70e2c7cbf7ebef317f3bac1c79b0179c8ba80dd11a5445cb43d02b04ac21d0b79fae0668a5464c42fe55ecd395945c705eb396db0e9c97f0f2bec00bd9ce3551798942b5eab93a3c9d121fe8c95b", &(0x7f0000000780)=""/37, 0x3ff, 0x10004, 0x0, 0x0}) write$P9_RATTACH(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4610, 0x0, 0x200, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:57:23 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) ftruncate(r0, 0x0) 02:57:23 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="020a000007000000a7ae16ac12045c8e05001a"], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="020100090e"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 02:57:23 executing program 0: r0 = socket(0x2, 0x3, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 02:57:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x15555555555553d3, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x2001, 0x0, 0xae7, 0x0, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:57:23 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r0, 0x5405, 0x0) [ 257.924256][T10705] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 02:57:23 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000040), 0x10) 02:57:23 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{0x0}], 0x1) 02:57:23 executing program 0: nanosleep(&(0x7f00000000c0)={0xffffffffffffffe0}, 0x0) 02:57:23 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) r1 = dup(r0) getsockname$inet(r1, 0x0, &(0x7f0000000100)) 02:57:24 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x410, 0x0) 02:57:24 executing program 3: r0 = socket(0x2, 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0x37dcd16654d90f6) [ 258.465623][ C0] sd 0:0:1:0: [sg0] tag#4983 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 258.476262][ C0] sd 0:0:1:0: [sg0] tag#4983 CDB: opcode=0x76 (reserved) [ 258.484051][ C0] sd 0:0:1:0: [sg0] tag#4983 CDB[00]: 76 ac aa 15 34 fe 52 69 09 0c 2b d7 65 a2 5d 45 [ 258.493687][ C0] sd 0:0:1:0: [sg0] tag#4983 CDB[10]: 5f 43 b3 b5 44 d4 d9 72 be 4b bb 13 26 5c bb b6 [ 258.503344][ C0] sd 0:0:1:0: [sg0] tag#4983 CDB[20]: 50 c6 06 f2 18 17 89 5a 49 41 70 96 0a bf 0c 70 [ 258.513389][ C0] sd 0:0:1:0: [sg0] tag#4983 CDB[30]: e2 c7 cb f7 eb ef 31 7f 3b ac 1c 79 b0 17 9c 8b [ 258.523042][ C0] sd 0:0:1:0: [sg0] tag#4983 CDB[40]: a8 0d d1 1a 54 45 cb 43 d0 2b 04 ac 21 d0 b7 9f [ 258.532680][ C0] sd 0:0:1:0: [sg0] tag#4983 CDB[50]: ae 06 68 a5 46 4c 42 fe 55 ec d3 95 94 5c 70 5e [ 258.542366][ C0] sd 0:0:1:0: [sg0] tag#4983 CDB[60]: b3 96 db 0e 9c 97 f0 f2 be c0 0b d9 ce 35 51 79 [ 258.552004][ C0] sd 0:0:1:0: [sg0] tag#4983 CDB[70]: 89 42 b5 ea b9 3a 3c 9d 12 1f e8 c9 5b 02:57:24 executing program 1: r0 = socket(0x2, 0x3, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x18, 0x2}, 0xc) 02:57:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001200)=""/4096, 0x1000}, 0x1) 02:57:24 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x1, 0x0) 02:57:24 executing program 5: mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000000000/0x3000)=nil, 0x20001, 0x0) 02:57:24 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(r0, 0x40087468, &(0x7f0000000000)) 02:57:24 executing program 3: r0 = socket(0x2, 0x3, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000100)={0x0, 0xfffffffffffffff9}, 0x10) 02:57:24 executing program 0: r0 = socket(0x2, 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 02:57:24 executing program 2: clock_gettime(0x0, &(0x7f00000008c0)) 02:57:24 executing program 5: pipe2(&(0x7f0000000500)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x1010, r0, 0x0) 02:57:24 executing program 4: mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) munlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 02:57:24 executing program 1: chown(&(0x7f0000000080)='.\x00', 0x0, 0x0) 02:57:24 executing program 2: sendmsg$unix(0xffffffffffffff9c, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000680)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 02:57:24 executing program 5: r0 = socket(0x2, 0x3, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1004, 0x0, 0x0) 02:57:24 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ftruncate(r0, 0x0) 02:57:24 executing program 0: open$dir(0x0, 0x400, 0x0) 02:57:24 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) 02:57:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7}, 0x40) 02:57:25 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001440)={0x9, 0x9, 0x6, 0x8, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) 02:57:25 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000180)) 02:57:25 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) 02:57:25 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:57:25 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000380)={r1}) 02:57:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x32e3, 0x0, 0x1}, 0x40) 02:57:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000080)="a75cdbe0e8cc91ea4c88337b5a1046dccaa940600e81d1c08653fde656e7f63c750308609bf51721806f0e5497f14ff7773b544c7ee4f5a469a797e5e8c6691420270110056caf3cb72cccfc040659490c6985c1a1e51e90356ad386b6d6befd14364064a1f082f4d752dcc6631ec9435de6af62a5d9de33b290915a5e5bd4aa502c7f77789dcc32cb69f5ff7d2ee705aef541d6523b7050b2f5d947d72025744434ad572dd9d7f42b9d", 0x7ffff000}, {&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001680)="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", 0xe17}], 0x3}, 0x0) 02:57:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x3, 0x5}]}]}}, &(0x7f0000000340)=""/128, 0x32, 0x80, 0x1}, 0x20) 02:57:25 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x0, 0x200, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) 02:57:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x0, 0x200, 0x1, 0x402}, 0x40) 02:57:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) 02:57:25 executing program 5: socketpair(0xa, 0x2, 0x8, &(0x7f0000000040)) 02:57:25 executing program 2: socketpair(0x3, 0x0, 0x0, &(0x7f0000000280)) 02:57:25 executing program 3: bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) 02:57:25 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x10000, 0x0) 02:57:25 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:57:25 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000000c0)) 02:57:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400201) socketpair(0x6, 0x5, 0x4, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0xfd, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 02:57:25 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/ipc\x00') 02:57:25 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) close(r0) 02:57:25 executing program 1: socketpair(0x25, 0x5, 0xd8, &(0x7f0000000080)) 02:57:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x2b, 0x0, 0x0) socketpair(0x0, 0x0, 0x4, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0xfd, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:57:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0xfd, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 02:57:25 executing program 1: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x304, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) 02:57:25 executing program 3: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f000000c540)=0xffffffffffffffff, 0x4) 02:57:25 executing program 0: socketpair(0x25, 0x5, 0x4, &(0x7f0000000080)) 02:57:26 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:57:26 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x0) 02:57:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, 0x0, 0x0, 0x0, 0x13a0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='/\x93posix_acl_access\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffcca}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b708030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 02:57:26 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:57:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0x40) 02:57:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x100, 0x84, &(0x7f0000000080)=""/132, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:57:26 executing program 0: socketpair(0x22, 0x80000, 0x74f4, &(0x7f0000000000)) 02:57:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f000000b380)={0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001780)='\v', 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x0) 02:57:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, 0x0, 0x0, 0x0, 0x13a0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='/\x93posix_acl_access\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffcca}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b708030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 02:57:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=""/82, 0x52}, 0x2) sendmsg$sock(r0, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0x0) 02:57:26 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000000c0)=0x10, 0x4) 02:57:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @empty, {[@timestamp_prespec={0x44, 0xc, 0x0, 0x3, 0x0, [{@local}]}, @rr={0x7, 0x17, 0x0, [@dev, @broadcast, @multicast1, @private, @multicast2]}, @timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x0, [{@broadcast}, {@remote}, {@multicast1}]}]}}}}}) 02:57:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'tunl0\x00', &(0x7f0000000580)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @multicast2, {[@end]}}}}}) 02:57:26 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @local}}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x4, 0x20, 0x0, 0x2d, @mcast1, @remote, 0x700, 0x7, 0x800, 0x3}}) pipe(0x0) 02:57:26 executing program 0: socketpair(0x1d, 0x0, 0x1, &(0x7f0000000140)) 02:57:26 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x410a00, 0x0) 02:57:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8982, &(0x7f0000000140)={'gre0\x00', 0x0}) 02:57:26 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x541b, 0x0) 02:57:26 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000340)) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000780)={'ip6_vti0\x00', 0x0}) 02:57:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x4, 0x5}, 0x40) 02:57:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x890d, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) 02:57:27 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000400)={'sit0\x00', &(0x7f0000000380)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @private0}}) 02:57:27 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8970, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) 02:57:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8919, &(0x7f0000000140)={'gre0\x00', 0x0}) 02:57:27 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000080)=@ethernet={0x0, @broadcast}, 0x80, 0x0}, 0x0) 02:57:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:57:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x2}, 0x40) 02:57:27 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000640)={'ip6_vti0\x00', &(0x7f00000005c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @empty}}) 02:57:27 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x20, 0x0, 0x0, @dev, @remote}}) 02:57:27 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x2022) 02:57:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 02:57:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) 02:57:27 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000440)="65749c2c", 0x4) 02:57:27 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @local}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x4, 0x0, 0x0, 0x2d, @mcast1, @remote, 0x700, 0x0, 0x0, 0x3}}) pipe(0x0) 02:57:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_buf(r0, 0x0, 0x29, 0x0, &(0x7f0000000140)) 02:57:27 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8912, &(0x7f0000000e40)={'batadv_slave_0\x00'}) 02:57:27 executing program 0: pipe(&(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x1, &(0x7f0000000180)=@raw=[@call], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) 02:57:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}]}]}, 0x2c}}, 0x0) 02:57:27 executing program 4: socketpair(0x28, 0x0, 0x0, &(0x7f00000001c0)) 02:57:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_buf(r0, 0x0, 0x29, 0x0, &(0x7f0000000140)) 02:57:27 executing program 0: pipe(&(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x10, r0, 0x0) 02:57:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000200)="bb3c5aabf0263b8a36b81f747fccc43045274a047d0762e2c5b223451b38c0831cc93779430b841b7679b5ad195e13fb0c13280ab5c263c4cdd12d801f99eaa4daa03a1a698e6774d61b7be2e4441ac6f5b40ea7d2fcbcb6e41eb38ae0bcc15ddc93d1431f0a000b5e668feaaaef60f31584fbd405c50743117c417a3e2ca3e3bf010742522d2efe0f61b1ae6cf821f108", 0x91) 02:57:27 executing program 3: setitimer(0x0, &(0x7f0000000040)={{0x0, 0x500}, {0x0, 0x9}}, 0x0) 02:57:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x4, 0x4, 0x6, 0x0, 0x1}, 0x40) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x8000, r0}, 0x38) 02:57:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) sendto$inet(r0, &(0x7f0000000140)='|', 0x1, 0x401c005, 0x0, 0x0) 02:57:27 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x2}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) 02:57:27 executing program 0 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:27 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000001400)="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"/3584, 0xe00) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766606e6f3dab82fa75e1b5597dcc7dba988190491a7f158f497bf44160bd53ee53491a91038095f78c92111b32820270f54fda457620d4f385b0e0b6c1a5c4c3773d2ddaf8d209926abe5ced3d036aa1236816c5533a96766228d556d45f3f039ea1492a01347283", @ANYRESHEX=r0, @ANYBLOB=',\x00']) sendfile(r0, r1, 0x0, 0x11f08) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000040)={0x401, 0x9, 0x6417, 0x9dd}) 02:57:27 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000880)='ns/cgroup\x00') ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 02:57:27 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=[{0x28, 0x0, 0x0, "b3c0d140abd9c98ee547cf6dd59c863aa7"}, {0x1010, 0x0, 0x0, "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"}, {0xa0, 0x0, 0x0, "d78b377f7d566840ae5a3e0dbe2e567a43ef3a943edac59f814f523263777f000b6afb7bbaf35414d64ac89cae9b813db3da903a073ff3e117d7624baf5fc7742c78ea12e094af349eb3e393be4c3fd3a78d54633c89004563ff00653970863abaf319f562b39d633b888ab8ba3163bfeaf18bfe03e031a01fc3501640328f87a97fe9751eb434ebb2"}, {0x70, 0x0, 0x0, "d3e480390b1f5ca27cf451762874af2cebffb09e2a6465b0d7da223d08f4693f716492be50767101df82974712b34a79166fb264db1b44dc49589f59e190a3a08ac9663aef324d349bec1b78feed19d9519ecb97f1016afc72"}, {0x100, 0x0, 0x0, "960b07815d8ed9af25d023b0a4f88c29d1625b82d0088b7a7828e1bf86fb7e58f74f6a4446cecb67d4db46ea16a81292f9223303de7fe1dfd9bb37d181a1755cb16eb6d528acbe5ff563122de3a021048ab681d1001b5ca5815044dea46842a54cd1d6552a87dce69e9ebb6b6cf9e7fb615ba7d5f434ac122d72322969d2e76ce1cfeda714b8b9cc6a85703fd1c8bdabd6fc999672237bdd1eb482a5c6fa5f814fa242cdb9d01cdf3634c4a8688dd75175555e728ffcce5d0d8c63e41d9d617e068285ba373b900f563eb4cd9e7cb43ede5a4fd994ed6f05e0c7fad75946238c2ba444e9338a651a3d"}, {0xdc0, 0x0, 0x0, "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"}], 0x2008}, 0x0) 02:57:27 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$char_raw_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/raw/rawctl\x00', 0x0, 0x0) ioctl$RAW_CHAR_CTRL_SETBIND(r1, 0xac00, &(0x7f0000000100)={0x1, 0x7, 0x0}) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x4924924924926d3, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000040)=0x8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000140)={0xf000, &(0x7f0000000080), 0x0, 0xffffffffffffffff, 0x1}) [ 262.042882][T11020] FAULT_INJECTION: forcing a failure. [ 262.042882][T11020] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 262.109264][ T34] audit: type=1800 audit(1607482647.925:3): pid=11027 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15885 res=0 errno=0 [ 262.117389][T11020] CPU: 0 PID: 11020 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 262.136595][T11020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.146673][T11020] Call Trace: [ 262.150006][T11020] dump_stack+0x137/0x1be [ 262.154355][T11020] should_fail+0x384/0x4b0 02:57:28 executing program 2: socketpair(0x11, 0x3, 0x0, &(0x7f00000000c0)) [ 262.158793][T11020] _copy_from_user+0x2d/0x170 [ 262.163499][T11020] __do_sys_bpf+0x137/0x11590 [ 262.168228][T11020] ? ksys_write+0x1b1/0x220 [ 262.172754][T11020] ? syscall_enter_from_user_mode+0x24/0x170 [ 262.178764][T11020] ? lockdep_hardirqs_on+0x8d/0x130 [ 262.184089][T11020] ? syscall_enter_from_user_mode+0x24/0x170 [ 262.190092][T11020] do_syscall_64+0x2d/0x70 02:57:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_buf(r0, 0x0, 0x9, 0x0, &(0x7f0000000040)) [ 262.191550][ T34] audit: type=1804 audit(1607482647.935:4): pid=11027 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir017032435/syzkaller.4FybYU/55/file0" dev="sda1" ino=15885 res=1 errno=0 [ 262.194510][T11020] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 262.194523][T11020] RIP: 0033:0x45e0f9 [ 262.194535][T11020] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.194543][T11020] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 262.255277][T11020] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 262.263270][T11020] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 262.271253][T11020] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 262.279381][T11020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 262.287360][T11020] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c [ 262.316165][T11027] 9pnet: Insufficient options for proto=fd 02:57:28 executing program 1: socket$netlink(0x10, 0x3, 0x15) unshare(0x40000000) pipe(&(0x7f0000001980)={0xffffffffffffffff}) ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r0, 0x0, 0x0) 02:57:28 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000005f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@ip_tos_u8={{0x11}}], 0x18}}], 0x1, 0x0) 02:57:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x44, &(0x7f0000000040)={0x0, 0x0}, 0x10) [ 262.428277][T11027] 9pnet: Insufficient options for proto=fd [ 262.511032][T11044] IPVS: ftp: loaded support on port[0] = 21 [ 262.728798][T11044] IPVS: ftp: loaded support on port[0] = 21 02:57:28 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000005f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 02:57:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private1, @local}}) 02:57:28 executing program 0 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:28 executing program 5: socketpair(0xa, 0x2, 0x0, &(0x7f0000001600)) 02:57:28 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000340)) [ 262.936178][T11102] FAULT_INJECTION: forcing a failure. [ 262.936178][T11102] name failslab, interval 1, probability 0, space 0, times 1 [ 263.003684][T11102] CPU: 1 PID: 11102 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 263.012482][T11102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.022545][T11102] Call Trace: [ 263.025869][T11102] dump_stack+0x137/0x1be [ 263.030232][T11102] should_fail+0x384/0x4b0 [ 263.034661][T11102] ? btf_new_fd+0x10e/0x2210 [ 263.039258][T11102] should_failslab+0x5/0x20 [ 263.043766][T11102] kmem_cache_alloc_trace+0x65/0x300 [ 263.049084][T11102] btf_new_fd+0x10e/0x2210 [ 263.053524][T11102] ? cap_capable+0x27a/0x2d0 [ 263.058164][T11102] ? safesetid_security_capable+0xad/0x1d0 [ 263.063985][T11102] ? bpf_lsm_capable+0x5/0x10 [ 263.068693][T11102] ? security_capable+0xb1/0xd0 [ 263.073561][T11102] __do_sys_bpf+0x1790/0x11590 [ 263.078375][T11102] ? ksys_write+0x1b1/0x220 [ 263.082908][T11102] ? syscall_enter_from_user_mode+0x24/0x170 [ 263.088897][T11102] ? lockdep_hardirqs_on+0x8d/0x130 [ 263.094104][T11102] ? syscall_enter_from_user_mode+0x24/0x170 [ 263.100098][T11102] do_syscall_64+0x2d/0x70 [ 263.104528][T11102] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 263.110473][T11102] RIP: 0033:0x45e0f9 [ 263.114386][T11102] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.134000][T11102] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 263.142430][T11102] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 02:57:29 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x89a2, &(0x7f0000000e40)={'batadv_slave_0\x00'}) 02:57:29 executing program 4: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000240)=@ethernet={0x0, @broadcast}, 0x80, 0x0}, 0x0) 02:57:29 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001880)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x3}, 0x5}, 0x1c, 0x0}}], 0x1, 0x0) [ 263.150416][T11102] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 263.158404][T11102] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 263.166382][T11102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 263.174363][T11102] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x7800, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @loopback}}}}) 02:57:29 executing program 1: socket$netlink(0x10, 0x3, 0x15) unshare(0x40000000) pipe(&(0x7f0000001980)={0xffffffffffffffff}) ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r0, 0x0, 0x0) 02:57:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2a, &(0x7f0000000040)={0x0, 0x0}, 0x10) [ 263.335654][T11121] IPVS: ftp: loaded support on port[0] = 21 02:57:29 executing program 0 (fault-call:0 fault-nth:2): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:29 executing program 2: socket$netlink(0x10, 0x3, 0x15) unshare(0x40000000) pipe(&(0x7f0000001980)={0xffffffffffffffff}) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x0) 02:57:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x17, 0x1, 0x0, 0x3, 0x0, 0x1}, 0x40) 02:57:29 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001e40)=[{{&(0x7f0000000240)={0x2, 0x4e23}, 0x10, 0x0, 0x0, &(0x7f0000000480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010102, @dev}}}, @ip_retopts={{0x10}}], 0x30}}], 0x1, 0x0) [ 263.537107][T11150] FAULT_INJECTION: forcing a failure. [ 263.537107][T11150] name failslab, interval 1, probability 0, space 0, times 0 [ 263.577074][T11150] CPU: 1 PID: 11150 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 02:57:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2d, &(0x7f0000000040)={0x0, 0x0}, 0x10) [ 263.585874][T11150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.595947][T11150] Call Trace: [ 263.599252][T11150] dump_stack+0x137/0x1be [ 263.603603][T11150] should_fail+0x384/0x4b0 [ 263.608039][T11150] ? btf_new_fd+0x252/0x2210 [ 263.612677][T11150] should_failslab+0x5/0x20 [ 263.617209][T11150] kmem_cache_alloc_trace+0x65/0x300 [ 263.622512][T11150] ? btf_new_fd+0x10e/0x2210 [ 263.625870][T11152] IPVS: ftp: loaded support on port[0] = 21 [ 263.627289][T11150] btf_new_fd+0x252/0x2210 [ 263.627316][T11150] ? cap_capable+0x27a/0x2d0 [ 263.642201][T11150] ? safesetid_security_capable+0xad/0x1d0 [ 263.648046][T11150] ? bpf_lsm_capable+0x5/0x10 [ 263.652729][T11150] ? security_capable+0xb1/0xd0 [ 263.657592][T11150] __do_sys_bpf+0x1790/0x11590 [ 263.662410][T11150] ? ksys_write+0x1b1/0x220 [ 263.666940][T11150] ? syscall_enter_from_user_mode+0x24/0x170 [ 263.672952][T11150] ? lockdep_hardirqs_on+0x8d/0x130 [ 263.678162][T11150] ? syscall_enter_from_user_mode+0x24/0x170 [ 263.684157][T11150] do_syscall_64+0x2d/0x70 [ 263.688579][T11150] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 263.694497][T11150] RIP: 0033:0x45e0f9 [ 263.698401][T11150] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.718426][T11150] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 263.726872][T11150] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 263.734865][T11150] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 263.742863][T11150] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 263.750875][T11150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 263.758889][T11150] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:29 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001e40)=[{{&(0x7f0000000240)={0x2, 0x4e23}, 0x10, 0x0, 0x0, &(0x7f0000000480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010102, @dev}}}], 0x20}}], 0x1, 0x0) 02:57:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x890d, 0x0) 02:57:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000000)={0x2, 0x15, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x8}, @sadb_x_nat_t_type={0x1}]}, 0x20}}, 0x0) 02:57:29 executing program 0 (fault-call:0 fault-nth:3): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f0000000140)={'gre0\x00', 0x0}) 02:57:29 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 264.052801][T11192] FAULT_INJECTION: forcing a failure. [ 264.052801][T11192] name failslab, interval 1, probability 0, space 0, times 0 [ 264.121112][T11192] CPU: 0 PID: 11192 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 264.129915][T11192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.139985][T11192] Call Trace: [ 264.143292][T11192] dump_stack+0x137/0x1be [ 264.147640][T11192] should_fail+0x384/0x4b0 [ 264.152074][T11192] ? kvmalloc_node+0x81/0xf0 [ 264.156679][T11192] should_failslab+0x5/0x20 [ 264.161199][T11192] __kmalloc_node+0x87/0x3b0 [ 264.165804][T11192] ? btf_new_fd+0x252/0x2210 02:57:30 executing program 2: pipe(&(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$qrtr(r0, 0x0, 0x0) [ 264.170419][T11192] kvmalloc_node+0x81/0xf0 [ 264.174883][T11192] btf_new_fd+0x294/0x2210 [ 264.179327][T11192] ? safesetid_security_capable+0xad/0x1d0 [ 264.185149][T11192] ? bpf_lsm_capable+0x5/0x10 [ 264.189834][T11192] ? security_capable+0xb1/0xd0 [ 264.194706][T11192] __do_sys_bpf+0x1790/0x11590 [ 264.199553][T11192] ? ksys_write+0x1b1/0x220 [ 264.204083][T11192] ? syscall_enter_from_user_mode+0x24/0x170 [ 264.210083][T11192] ? lockdep_hardirqs_on+0x8d/0x130 [ 264.215297][T11192] ? syscall_enter_from_user_mode+0x24/0x170 [ 264.221767][T11192] do_syscall_64+0x2d/0x70 [ 264.226227][T11192] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 264.232130][T11192] RIP: 0033:0x45e0f9 [ 264.236033][T11192] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.255730][T11192] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 264.264165][T11192] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 02:57:30 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x3d, &(0x7f0000000040)={0x0, 0x0}, 0x10) 02:57:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x0}, 0x10) 02:57:30 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000005f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@ip_tos_u8={{0x11}}], 0x18}}], 0x1, 0x4000005) 02:57:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f00000001c0)={'bond0\x00', @ifru_hwaddr=@remote}) [ 264.272144][T11192] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 264.280129][T11192] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 264.288115][T11192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 264.296099][T11192] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:30 executing program 2: r0 = socket$inet(0x2, 0x3, 0x80) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 02:57:30 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x40049409, 0x0) 02:57:30 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) socketpair(0x11, 0x4552fe0622a67652, 0x5, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000080), &(0x7f0000000340)=0x4) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000000)=0x7, 0x4) pipe(&(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, 0x0) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f0000000100)=0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'syztnl0\x00', 0x0, 0x2f, 0x80, 0x4, 0x5, 0x42, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x1a}, 0x8, 0x8000, 0xfffffff8, 0x2}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r4, 0x89f6, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000440)={'ip6tnl0\x00', r5, 0x29, 0xc0, 0xd5, 0x2, 0x40, @local, @private1, 0x10, 0x80, 0xfffffff9}}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000040), 0x10) 02:57:30 executing program 2: socket$netlink(0x10, 0x3, 0x15) unshare(0x40000000) pipe(&(0x7f0000001980)={0xffffffffffffffff}) ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x0) [ 264.602119][T11218] IPVS: ftp: loaded support on port[0] = 21 [ 264.752881][T11218] IPVS: ftp: loaded support on port[0] = 21 02:57:30 executing program 0 (fault-call:0 fault-nth:4): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001e40)=[{{&(0x7f0000000240)={0x2, 0x4e23}, 0x10, 0x0, 0x0, &(0x7f0000000480)=[@ip_retopts={{0x10}}], 0x10}}], 0x1, 0x0) 02:57:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8935, &(0x7f0000000200)={'\x00', @ifru_mtu}) 02:57:30 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x5, &(0x7f0000000040)={0x0, 0x0}, 0x10) 02:57:30 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000080)) pipe(&(0x7f0000000000)) 02:57:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2e, &(0x7f0000000040)={0x0, 0x0}, 0x10) [ 264.948980][T11273] FAULT_INJECTION: forcing a failure. [ 264.948980][T11273] name fail_usercopy, interval 1, probability 0, space 0, times 0 02:57:30 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 265.041157][T11273] CPU: 1 PID: 11273 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 265.049959][T11273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.060286][T11273] Call Trace: [ 265.063596][T11273] dump_stack+0x137/0x1be [ 265.067946][T11273] should_fail+0x384/0x4b0 [ 265.072386][T11273] _copy_from_user+0x2d/0x170 [ 265.077094][T11273] btf_new_fd+0x302/0x2210 [ 265.081537][T11273] ? safesetid_security_capable+0xad/0x1d0 02:57:30 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)) 02:57:30 executing program 4: unshare(0x54000800) [ 265.087357][T11273] ? bpf_lsm_capable+0x5/0x10 [ 265.092042][T11273] ? security_capable+0xb1/0xd0 [ 265.096943][T11273] __do_sys_bpf+0x1790/0x11590 [ 265.101761][T11273] ? ksys_write+0x1b1/0x220 [ 265.106404][T11273] ? syscall_enter_from_user_mode+0x24/0x170 [ 265.112400][T11273] ? lockdep_hardirqs_on+0x8d/0x130 [ 265.117636][T11273] ? syscall_enter_from_user_mode+0x24/0x170 [ 265.123639][T11273] do_syscall_64+0x2d/0x70 [ 265.128068][T11273] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 265.134702][T11273] RIP: 0033:0x45e0f9 02:57:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x14, r1, 0xe8feafcb27f54f77}, 0x14}}, 0x0) [ 265.138602][T11273] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.158221][T11273] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 265.173783][T11273] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 265.181773][T11273] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 265.189777][T11273] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 265.197760][T11273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 265.205749][T11273] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:31 executing program 4: pipe(&(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(r0, &(0x7f0000001900), 0xfffffffffffffdef) 02:57:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 02:57:31 executing program 0 (fault-call:0 fault-nth:5): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000001940)={0x9}, 0x0, 0x0, 0x0, 0x0) 02:57:31 executing program 1: socketpair(0x2, 0x6, 0x0, &(0x7f0000009c00)) 02:57:31 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) [ 265.636766][T11312] FAULT_INJECTION: forcing a failure. [ 265.636766][T11312] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 265.690662][T11312] CPU: 1 PID: 11312 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 265.699477][T11312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.709544][T11312] Call Trace: [ 265.712855][T11312] dump_stack+0x137/0x1be [ 265.717208][T11312] should_fail+0x384/0x4b0 [ 265.721672][T11312] _copy_to_user+0x2d/0x130 [ 265.726212][T11312] bpf_verifier_vlog+0x19e/0x330 [ 265.731185][T11312] __btf_verifier_log+0x6c/0x90 [ 265.736048][T11312] ? btf_parse_hdr+0x2c8/0xb70 [ 265.740822][T11312] btf_parse_hdr+0x320/0xb70 [ 265.745451][T11312] btf_new_fd+0x367/0x2210 [ 265.749885][T11312] ? safesetid_security_capable+0xad/0x1d0 [ 265.755699][T11312] ? bpf_lsm_capable+0x5/0x10 [ 265.760371][T11312] ? security_capable+0xb1/0xd0 [ 265.765239][T11312] __do_sys_bpf+0x1790/0x11590 [ 265.770051][T11312] ? ksys_write+0x1b1/0x220 [ 265.774575][T11312] ? syscall_enter_from_user_mode+0x24/0x170 [ 265.780564][T11312] ? lockdep_hardirqs_on+0x8d/0x130 [ 265.785776][T11312] ? syscall_enter_from_user_mode+0x24/0x170 [ 265.791771][T11312] do_syscall_64+0x2d/0x70 [ 265.796193][T11312] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 265.802091][T11312] RIP: 0033:0x45e0f9 [ 265.805988][T11312] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.825600][T11312] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 265.834032][T11312] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 265.842007][T11312] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 265.849984][T11312] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 265.857961][T11312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 265.866461][T11312] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:32 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00'}) 02:57:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000480)=@newtaction={0xec4, 0x30, 0x0, 0x0, 0x0, {}, [{0x4}, {0xeac, 0x1, [@m_skbmod={0xf4, 0x15, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x78, 0x2, 0x0, 0x1, [@TCA_SKBMOD_PARMS={0x24, 0x2, {{0x0, 0x0, 0x0, 0x2}}}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x0, 0x0, 0x1}}}, @TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x0, 0x0, 0x10000000, 0x0, 0x1}}}]}, {0x51, 0x6, "8ff77625d7a8467f4dd4cdb79bf2f72f17970fcb77f319abe4b3d31ae366468be13037fca09711a55c2fc00295158bccd517d81005501e200615f4d2cf80fd5d2c5110aabe9b655ee88b324a0d"}, {0xc}, {0xc}}}, @m_police={0xd80, 0x0, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0xd18, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x5, 0x0, 0x0, 0x0, {0x0, 0x0, 0x2, 0x4ee4}, {0x9, 0x1, 0x0, 0xffc0, 0x67b6}}}], [@TCA_POLICE_PEAKRATE64={0xc}, @TCA_POLICE_RATE64={0xc}], [@TCA_POLICE_AVRATE={0x8, 0x4, 0x4}, @TCA_POLICE_RESULT={0x8}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4230, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x9, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15a8, 0x0, 0x0, 0x7a, 0x6, 0x0, 0x0, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xfff, 0x0, 0xfffff037, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x307, 0x0, 0x1d, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xba3b, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x100, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x10000, 0x0, 0x0, 0x2, 0x5, 0x0, 0x0, 0x0, 0x600000]}, @TCA_POLICE_AVRATE={0x8}, @TCA_POLICE_PEAKRATE64={0xc}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x6, 0x0, 0x1}, {0x1, 0x2, 0x0, 0x0, 0x0, 0xffff6dea}}}, @TCA_POLICE_TBF={0x3c}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7f}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9190, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58]}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x5, 0x1000, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8001, 0x6, 0x0, 0x0, 0x3, 0x0, 0x200, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff01, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x9, 0x172, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x872c0000, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0xf37d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8001, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x800, 0x7c61, 0x0, 0x80c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x10000, 0x7fffffff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1f, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x5, 0x0, 0x2, 0x0, 0x0, 0xffff, 0x400, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfaaf, 0x0, 0x0, 0x9]}, @TCA_POLICE_PEAKRATE64={0xc}]]}, {0x3d, 0x6, "1ece1f016a6477a98dc4e890bc41c445335a807dcea7d4e49d93bacefccadbc2bf02f74134a2d13f20381566d307348886ae41d152ff2c3ed0"}, {0xc}, {0xc}}}, @m_pedit={0x34, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x8, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x4}]}, {0x4}, {0xc, 0x7, {0x1}}, {0xc}}}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x1}, 0x0) 02:57:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @local}}) socket$l2tp6(0xa, 0x2, 0x73) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002580)={0x0, @rand_addr, @local}, 0xc) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x2b, 0x4, 0x20, 0x4, 0x2d, @mcast1, @remote, 0x700, 0x7, 0x800, 0x3}}) 02:57:32 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000040)={@mcast2}, 0x14) 02:57:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@mcast1}, 0x14) 02:57:32 executing program 0 (fault-call:0 fault-nth:6): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 267.036694][T11331] FAULT_INJECTION: forcing a failure. [ 267.036694][T11331] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 267.095893][T11331] CPU: 0 PID: 11331 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 267.104689][T11331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.114755][T11331] Call Trace: [ 267.118066][T11331] dump_stack+0x137/0x1be [ 267.122418][T11331] should_fail+0x384/0x4b0 [ 267.126855][T11331] _copy_to_user+0x2d/0x130 [ 267.131381][T11331] bpf_verifier_vlog+0x19e/0x330 [ 267.136343][T11331] __btf_verifier_log+0x6c/0x90 [ 267.141242][T11331] ? bpf_verifier_vlog+0x1ab/0x330 [ 267.146477][T11331] btf_parse_hdr+0x351/0xb70 [ 267.151101][T11331] btf_new_fd+0x367/0x2210 [ 267.155554][T11331] ? safesetid_security_capable+0xad/0x1d0 [ 267.161407][T11331] ? bpf_lsm_capable+0x5/0x10 [ 267.166102][T11331] ? security_capable+0xb1/0xd0 [ 267.170985][T11331] __do_sys_bpf+0x1790/0x11590 [ 267.175813][T11331] ? ksys_write+0x1b1/0x220 [ 267.180358][T11331] ? syscall_enter_from_user_mode+0x24/0x170 [ 267.186359][T11331] ? lockdep_hardirqs_on+0x8d/0x130 [ 267.191586][T11331] ? syscall_enter_from_user_mode+0x24/0x170 [ 267.197597][T11331] do_syscall_64+0x2d/0x70 [ 267.202047][T11331] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 267.207949][T11331] RIP: 0033:0x45e0f9 [ 267.211872][T11331] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.233605][T11331] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 02:57:33 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) recvmsg(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) 02:57:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x42, &(0x7f0000000040)={0x0, 0x0}, 0x10) 02:57:33 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 02:57:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000040)={@mcast2}, 0x14) [ 267.242043][T11331] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 267.250055][T11331] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 267.258033][T11331] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 267.266022][T11331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 267.274367][T11331] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:33 executing program 0 (fault-call:0 fault-nth:7): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x5452, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @empty, 0x4e22, 0x0, 'nq\x00', 0x10, 0x5, 0x45}, 0x2c) [ 267.492809][T11354] FAULT_INJECTION: forcing a failure. [ 267.492809][T11354] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 267.518456][T11354] CPU: 0 PID: 11354 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 267.527254][T11354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.537326][T11354] Call Trace: [ 267.540637][T11354] dump_stack+0x137/0x1be [ 267.545077][T11354] should_fail+0x384/0x4b0 [ 267.549520][T11354] _copy_to_user+0x2d/0x130 [ 267.554055][T11354] bpf_verifier_vlog+0x19e/0x330 [ 267.559016][T11354] __btf_verifier_log+0x6c/0x90 [ 267.563891][T11354] ? bpf_verifier_vlog+0x1ab/0x330 [ 267.569025][T11354] btf_parse_hdr+0x380/0xb70 [ 267.573653][T11354] btf_new_fd+0x367/0x2210 [ 267.578108][T11354] ? safesetid_security_capable+0xad/0x1d0 [ 267.583945][T11354] ? bpf_lsm_capable+0x5/0x10 [ 267.588654][T11354] ? security_capable+0xb1/0xd0 [ 267.593527][T11354] __do_sys_bpf+0x1790/0x11590 [ 267.598356][T11354] ? ksys_write+0x1b1/0x220 [ 267.603006][T11354] ? syscall_enter_from_user_mode+0x24/0x170 [ 267.609025][T11354] ? lockdep_hardirqs_on+0x8d/0x130 [ 267.614243][T11354] ? syscall_enter_from_user_mode+0x24/0x170 [ 267.620244][T11354] do_syscall_64+0x2d/0x70 [ 267.624675][T11354] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 267.630586][T11354] RIP: 0033:0x45e0f9 [ 267.634493][T11354] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.654170][T11354] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 267.664073][T11354] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 267.672156][T11354] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 267.680182][T11354] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 267.688216][T11354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 267.696234][T11354] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:35 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001e40)=[{{&(0x7f0000000240)={0x2, 0x4e23}, 0x10, 0x0, 0x0, &(0x7f0000000480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @dev}}}], 0x20}}], 0x1, 0x0) 02:57:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x20, 0x0, &(0x7f0000000100)) 02:57:35 executing program 1: socketpair(0xb, 0x0, 0x0, &(0x7f0000000500)) 02:57:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x3}]}, 0x1c}}, 0x0) 02:57:35 executing program 0 (fault-call:0 fault-nth:8): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback}}) [ 269.911672][T11376] FAULT_INJECTION: forcing a failure. [ 269.911672][T11376] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 269.929551][T11375] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 02:57:35 executing program 4: sendto$llc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 269.984845][T11382] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 269.995433][T11376] CPU: 0 PID: 11376 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 270.004219][T11376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.014291][T11376] Call Trace: [ 270.017607][T11376] dump_stack+0x137/0x1be [ 270.021963][T11376] should_fail+0x384/0x4b0 [ 270.026403][T11376] _copy_to_user+0x2d/0x130 02:57:35 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x403}, 0x40) 02:57:35 executing program 5: syz_emit_ethernet(0x22, &(0x7f0000000000)={@dev, @broadcast, @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @dev, "", @broadcast}}}}, 0x0) [ 270.030937][T11376] bpf_verifier_vlog+0x19e/0x330 [ 270.035895][T11376] __btf_verifier_log+0x6c/0x90 [ 270.040754][T11376] ? bpf_verifier_vlog+0x1ab/0x330 [ 270.045902][T11376] btf_parse_hdr+0x3b3/0xb70 [ 270.050549][T11376] btf_new_fd+0x367/0x2210 [ 270.054993][T11376] ? safesetid_security_capable+0xad/0x1d0 [ 270.060817][T11376] ? bpf_lsm_capable+0x5/0x10 [ 270.065504][T11376] ? security_capable+0xb1/0xd0 [ 270.070406][T11376] __do_sys_bpf+0x1790/0x11590 [ 270.075316][T11376] ? ksys_write+0x1b1/0x220 02:57:35 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000740)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) [ 270.079854][T11376] ? syscall_enter_from_user_mode+0x24/0x170 [ 270.085853][T11376] ? lockdep_hardirqs_on+0x8d/0x130 [ 270.091079][T11376] ? syscall_enter_from_user_mode+0x24/0x170 [ 270.097077][T11376] do_syscall_64+0x2d/0x70 [ 270.101499][T11376] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 270.107396][T11376] RIP: 0033:0x45e0f9 [ 270.111327][T11376] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.131123][T11376] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 270.139569][T11376] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 270.147588][T11376] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 270.155605][T11376] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 270.164939][T11376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 270.172934][T11376] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:36 executing program 1: socket$netlink(0x10, 0x3, 0x0) unshare(0x40000000) pipe(&(0x7f0000001980)={0xffffffffffffffff}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r0, 0x0, 0x0) 02:57:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x45, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}, 0x10) 02:57:36 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 02:57:36 executing program 4: r0 = socket(0x10, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000000)="e21d052cdf43cd17e3f0d79bcfae342328e715a0e90a9214bdcacf45610347a4ac828eead0330794f405056092e64d7aaf2b157fcebd303bd9a79a7d18801ac579dbb57a48cee1e76d7ec338259c3d35f1c4b70eba2558bc", 0x58, 0x44040, 0x0, 0xfffffffffffffc82) 02:57:36 executing program 5: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) write$FUSE_INIT(r0, 0x0, 0x0) [ 270.358845][T11395] IPVS: ftp: loaded support on port[0] = 21 02:57:36 executing program 4: r0 = socket(0x10, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x938fbcf14b59900b, 0x0, 0x0) 02:57:36 executing program 0 (fault-call:0 fault-nth:9): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:36 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000080)="f6", 0x1, 0x44040, 0x0, 0x0) 02:57:36 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, &(0x7f0000000040)=0x1, 0x4, 0x0) 02:57:36 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x880, 0x0, 0x5d) 02:57:36 executing program 4: r0 = socket(0x10, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000040)="d7d8405c13a83361001aa007316368bc5e78ea4d7f2cd5a4676031b9a8fbd4765ad73dc6abfe226fca7e3ec6d285ddb209b537aadb8bbfbd7336c95acc6e7de2bc4b7668b97a74a5624cdd357e7760f2b7e01a888a4e5a98d3e49dd0df4db376727c41e66639c03cf320b8c1b6f87d29dc7f26de80c3a91a26ddfe4934759ea85f9435a35de155aca8a3759a6988d8a840db35674e3771ce266d85a524472cfd8a06ba59f226a52fff5bce5ae11e8fd6d11dc98baee4c1aa0c96bcd61e0e", 0xbe, 0x2000c844, 0x0, 0xfcc3) 02:57:36 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000080)="f7", 0xfffffe0f, 0x890, 0x0, 0x0) 02:57:36 executing program 4: r0 = socket(0x10, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x4004001, 0x0, 0xfffffdcd) 02:57:36 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000040)="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", 0x18e, 0x938fbcf14f5d10cf, 0x0, 0x62) [ 270.688813][T11439] FAULT_INJECTION: forcing a failure. [ 270.688813][T11439] name fail_usercopy, interval 1, probability 0, space 0, times 0 02:57:36 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x880, 0x0, 0x0) 02:57:36 executing program 2: r0 = socket(0x1, 0x3, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x0) 02:57:36 executing program 1: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x64) 02:57:36 executing program 4: r0 = socket(0x10, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x938fbcf14b59180b, 0x0, 0x0) [ 270.803609][T11439] CPU: 0 PID: 11439 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 270.812411][T11439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.822486][T11439] Call Trace: [ 270.825795][T11439] dump_stack+0x137/0x1be [ 270.830144][T11439] should_fail+0x384/0x4b0 [ 270.834587][T11439] _copy_to_user+0x2d/0x130 [ 270.839109][T11439] bpf_verifier_vlog+0x19e/0x330 [ 270.844082][T11439] __btf_verifier_log+0x6c/0x90 [ 270.848956][T11439] ? bpf_verifier_vlog+0x1ab/0x330 [ 270.854098][T11439] btf_parse_hdr+0x3e1/0xb70 [ 270.858719][T11439] btf_new_fd+0x367/0x2210 [ 270.863166][T11439] ? safesetid_security_capable+0xad/0x1d0 [ 270.868980][T11439] ? bpf_lsm_capable+0x5/0x10 [ 270.873662][T11439] ? security_capable+0xb1/0xd0 [ 270.878532][T11439] __do_sys_bpf+0x1790/0x11590 [ 270.883350][T11439] ? ksys_write+0x1b1/0x220 [ 270.887879][T11439] ? syscall_enter_from_user_mode+0x24/0x170 [ 270.893874][T11439] ? lockdep_hardirqs_on+0x8d/0x130 [ 270.899093][T11439] ? syscall_enter_from_user_mode+0x24/0x170 [ 270.905172][T11439] do_syscall_64+0x2d/0x70 [ 270.909594][T11439] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 270.915496][T11439] RIP: 0033:0x45e0f9 [ 270.919484][T11439] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.939110][T11439] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 270.947552][T11439] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 270.955538][T11439] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 270.963778][T11439] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 270.971753][T11439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 270.979732][T11439] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:36 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="cb4962f597dfc8f256faaaf8f2f2f40b280b38b080e272716038c9f55f0fe8bf56f7774893b2192853c62884d9c09ecbd91810fca32122733732d94711b2aac63ecacf971419a8692f3a07cf42de2cd23f4135793c6c61301fbdb349b3098cc95d31d51c5c010da4d7d9c648caa659d80453f1e5a6760b9dff1b0300000000000000ad79c8bee5787508caa4e895050066f66ae7767743bda9a3b918a09984c48254d97984be324c1d", 0x0, 0x880, 0x0, 0xffffffffffffff16) 02:57:36 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x0) 02:57:36 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="cb", 0x1, 0x22008001, 0x0, 0x0) 02:57:36 executing program 3: wait4(0x0, 0x0, 0x40000000, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) 02:57:36 executing program 0 (fault-call:0 fault-nth:10): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:36 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_rr_get_interval(0xffffffffffffffff, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) 02:57:37 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x66200, 0x0) 02:57:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000000)=0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) setsockopt$packet_tx_ring(r1, 0xb11, 0xd, 0x0, 0x0) 02:57:37 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x541b, 0x0) [ 271.234455][T11471] FAULT_INJECTION: forcing a failure. [ 271.234455][T11471] name fail_usercopy, interval 1, probability 0, space 0, times 0 02:57:37 executing program 3: setpriority(0x0, 0x0, 0x7fff) 02:57:37 executing program 4: write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000002980), 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000002b80)='net_prio.ifpriomap\x00', 0x2, 0x0) [ 271.347138][T11471] CPU: 0 PID: 11471 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 271.355953][T11471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.366019][T11471] Call Trace: [ 271.369320][T11471] dump_stack+0x137/0x1be [ 271.373675][T11471] should_fail+0x384/0x4b0 [ 271.378106][T11471] _copy_to_user+0x2d/0x130 [ 271.382622][T11471] bpf_verifier_vlog+0x19e/0x330 [ 271.387588][T11471] __btf_verifier_log+0x6c/0x90 [ 271.392453][T11471] ? bpf_verifier_vlog+0x1ab/0x330 [ 271.397578][T11471] btf_parse_hdr+0x40f/0xb70 [ 271.402187][T11471] btf_new_fd+0x367/0x2210 [ 271.406623][T11471] ? safesetid_security_capable+0xad/0x1d0 [ 271.412437][T11471] ? bpf_lsm_capable+0x5/0x10 [ 271.417138][T11471] ? security_capable+0xb1/0xd0 [ 271.422008][T11471] __do_sys_bpf+0x1790/0x11590 [ 271.426845][T11471] ? ksys_write+0x1b1/0x220 [ 271.431372][T11471] ? syscall_enter_from_user_mode+0x24/0x170 [ 271.437369][T11471] ? lockdep_hardirqs_on+0x8d/0x130 02:57:37 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept$inet(r0, 0x0, 0x0) [ 271.442579][T11471] ? syscall_enter_from_user_mode+0x24/0x170 [ 271.448572][T11471] do_syscall_64+0x2d/0x70 [ 271.453018][T11471] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 271.458918][T11471] RIP: 0033:0x45e0f9 [ 271.462826][T11471] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.482469][T11471] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 271.490904][T11471] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 271.498886][T11471] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 271.506869][T11471] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 271.514857][T11471] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 271.524326][T11471] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:37 executing program 1: getresgid(&(0x7f0000002600), &(0x7f0000002640), 0x0) 02:57:37 executing program 0 (fault-call:0 fault-nth:11): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:37 executing program 5: readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/40, 0x28) 02:57:37 executing program 4: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000540)=[{0x0}], 0x0, &(0x7f0000000800)=ANY=[]) 02:57:37 executing program 2: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) [ 271.783560][T11500] FAULT_INJECTION: forcing a failure. [ 271.783560][T11500] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 271.797109][T11500] CPU: 1 PID: 11500 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 271.805883][T11500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.816565][T11500] Call Trace: [ 271.819857][T11500] dump_stack+0x137/0x1be [ 271.824279][T11500] should_fail+0x384/0x4b0 [ 271.828714][T11500] _copy_to_user+0x2d/0x130 [ 271.833318][T11500] bpf_verifier_vlog+0x19e/0x330 [ 271.838277][T11500] __btf_verifier_log+0x6c/0x90 [ 271.843141][T11500] ? bpf_verifier_vlog+0x1ab/0x330 [ 271.848261][T11500] btf_parse_hdr+0x43d/0xb70 [ 271.852866][T11500] btf_new_fd+0x367/0x2210 [ 271.857320][T11500] ? safesetid_security_capable+0xad/0x1d0 [ 271.863146][T11500] ? bpf_lsm_capable+0x5/0x10 [ 271.867824][T11500] ? security_capable+0xb1/0xd0 [ 271.872679][T11500] __do_sys_bpf+0x1790/0x11590 [ 271.877473][T11500] ? ksys_write+0x1b1/0x220 [ 271.881984][T11500] ? syscall_enter_from_user_mode+0x24/0x170 [ 271.887961][T11500] ? lockdep_hardirqs_on+0x8d/0x130 [ 271.893331][T11500] ? syscall_enter_from_user_mode+0x24/0x170 [ 271.899307][T11500] do_syscall_64+0x2d/0x70 [ 271.903717][T11500] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 271.909604][T11500] RIP: 0033:0x45e0f9 [ 271.913512][T11500] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:57:37 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) [ 271.933812][T11500] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 271.942228][T11500] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 271.950196][T11500] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 271.958166][T11500] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 271.966143][T11500] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b [ 271.974114][T11500] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:37 executing program 5: ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 02:57:37 executing program 2: statx(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002700)) 02:57:37 executing program 0 (fault-call:0 fault-nth:12): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 272.187873][T11512] FAULT_INJECTION: forcing a failure. [ 272.187873][T11512] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 272.259729][T11512] CPU: 1 PID: 11512 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 272.268555][T11512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.278626][T11512] Call Trace: [ 272.281962][T11512] dump_stack+0x137/0x1be [ 272.286317][T11512] should_fail+0x384/0x4b0 [ 272.290758][T11512] _copy_to_user+0x2d/0x130 [ 272.295403][T11512] bpf_verifier_vlog+0x19e/0x330 [ 272.300376][T11512] __btf_verifier_log+0x6c/0x90 02:57:38 executing program 3: r0 = getpgid(0x0) tkill(r0, 0x20) 02:57:38 executing program 4: syz_mount_image$fuse(&(0x7f00000020c0)='fuse\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002140)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id'}}) 02:57:38 executing program 2: read$FUSE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 02:57:38 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="3001159a528e9da31076bba6e0437538b13a72984cbf6c7739b9b5a49903139cbb020db2d025429f5a4c9bba6f700aed42c84c463431640f8d975e83b5b06ded7cd00828ba223803a7288e18fecf117013c41ce994871cee8abf27b95ef03ab0aed92bcdd6846300b9e264a270a3bb50e365436d931d247c6fb21644040078060000000000001846400657e244268edffe7d1046119906cb833593febb000000000000000000000000000000b0a1fd69402c1d00cad1d4d11a3806a98be463e407f91efd691089a33094e9c7bb30d701", 0xac, 0x40804, 0x0, 0xfffffffffffffd0b) 02:57:38 executing program 5: getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) [ 272.305272][T11512] ? bpf_verifier_vlog+0x1ab/0x330 [ 272.310927][T11512] btf_parse_hdr+0x469/0xb70 [ 272.315550][T11512] btf_new_fd+0x367/0x2210 [ 272.319991][T11512] ? safesetid_security_capable+0xad/0x1d0 [ 272.325811][T11512] ? bpf_lsm_capable+0x5/0x10 [ 272.330499][T11512] ? security_capable+0xb1/0xd0 [ 272.335387][T11512] __do_sys_bpf+0x1790/0x11590 [ 272.340210][T11512] ? ksys_write+0x1b1/0x220 [ 272.344740][T11512] ? syscall_enter_from_user_mode+0x24/0x170 [ 272.350760][T11512] ? lockdep_hardirqs_on+0x8d/0x130 [ 272.355980][T11512] ? syscall_enter_from_user_mode+0x24/0x170 [ 272.361980][T11512] do_syscall_64+0x2d/0x70 [ 272.366417][T11512] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 272.372320][T11512] RIP: 0033:0x45e0f9 [ 272.376224][T11512] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.395845][T11512] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 02:57:38 executing program 3: tkill(0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 272.404277][T11512] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 272.412346][T11512] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 272.420334][T11512] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 272.428322][T11512] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c [ 272.436322][T11512] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:38 executing program 2: geteuid() read$FUSE(0xffffffffffffffff, 0x0, 0x0) 02:57:38 executing program 1: write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x7f}}, 0x18) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x9) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020}, 0x2020) write$FUSE_DIRENT(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000002840)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000002800)=[{}, {}], 0x0, [{}]}, 0x88) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000002900)=0x2) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000002940)={0x30, 0x5, 0x0, {0x0, 0x6, 0x1, 0x4}}, 0x30) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f0000002980), &(0x7f00000029c0)=0x4) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000002a00)) openat$null(0xffffffffffffff9c, &(0x7f0000002a40)='/dev/null\x00', 0x200, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000002a80)={{0xff, @local, 0x4e24, 0x1, 'none\x00', 0x10, 0x5, 0x64}, {@loopback, 0x4e23, 0x2, 0x20, 0x3, 0x4}}, 0x44) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000002b00)={@id={0x2, 0x0, @d='~\xb8\n\xf3\xf2N\xf0\x86rjL\xea:\x15L\xe0'}}) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000002b40)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000002b80)='net_prio.ifpriomap\x00', 0x2, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000002bc0)={&(0x7f00007fe000/0x800000)=nil, 0x800000}, &(0x7f0000002c00)=0x10) write$cgroup_freezer_state(r0, &(0x7f0000002c40)='FREEZING\x00', 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 02:57:38 executing program 4: utimensat(0xffffffffffffff9c, 0x0, &(0x7f0000000040)={{0x77359400}}, 0x0) 02:57:38 executing program 5: getresgid(&(0x7f0000002600), &(0x7f0000002640), &(0x7f0000002680)) 02:57:38 executing program 3: timer_create(0x0, &(0x7f0000000100)={0x0, 0x3f, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) 02:57:38 executing program 1: rt_sigaction(0x17, &(0x7f0000000140)={&(0x7f0000000040)="c402453609262ed8dd3636660f3a0894d2008000000046d8c93e673e67660f16869636bce73e364599f20fab9000000000c4225d2d610fd1da2e41029800000000", 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000240)) 02:57:38 executing program 0 (fault-call:0 fault-nth:13): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:38 executing program 3: prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 02:57:38 executing program 5: getresuid(&(0x7f0000002c80), 0x0, 0x0) 02:57:38 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') 02:57:38 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{0x0}], 0x0, 0x0) 02:57:38 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0xe40a768051b68efd, 0x0) [ 272.971007][T11554] FAULT_INJECTION: forcing a failure. [ 272.971007][T11554] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 272.985222][T11554] CPU: 1 PID: 11554 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 272.994000][T11554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.004058][T11554] Call Trace: [ 273.007360][T11554] dump_stack+0x137/0x1be [ 273.011718][T11554] should_fail+0x384/0x4b0 [ 273.016164][T11554] _copy_to_user+0x2d/0x130 [ 273.020682][T11554] bpf_verifier_vlog+0x19e/0x330 [ 273.025661][T11554] __btf_verifier_log+0x6c/0x90 [ 273.030539][T11554] ? bpf_verifier_vlog+0x1ab/0x330 [ 273.035666][T11554] btf_parse_hdr+0x47e/0xb70 [ 273.040277][T11554] btf_new_fd+0x367/0x2210 [ 273.044716][T11554] ? safesetid_security_capable+0xad/0x1d0 [ 273.050536][T11554] ? bpf_lsm_capable+0x5/0x10 [ 273.055224][T11554] ? security_capable+0xb1/0xd0 [ 273.060089][T11554] __do_sys_bpf+0x1790/0x11590 [ 273.064909][T11554] ? ksys_write+0x1b1/0x220 [ 273.069433][T11554] ? syscall_enter_from_user_mode+0x24/0x170 [ 273.075423][T11554] ? lockdep_hardirqs_on+0x8d/0x130 [ 273.080631][T11554] ? syscall_enter_from_user_mode+0x24/0x170 [ 273.086634][T11554] do_syscall_64+0x2d/0x70 [ 273.091056][T11554] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 273.096972][T11554] RIP: 0033:0x45e0f9 [ 273.100875][T11554] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:57:38 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x8, 0x2, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000500)="e0", 0x1}], 0x0, 0x0) 02:57:38 executing program 4: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000000180)="f9", 0x1}, {&(0x7f0000000280)="0eb7186963e97e5e8bdf88a1756fba78f729a741225067eb17696f156af53fd6bf06da0dae82529126151fade7b90e33812346f21de79e3f31306de1d2e808bed0548ac953d6c8f46e6190c6025a1a745129f0ec769cd40487bbb52f6374442392d5d2d02a9ecfa47fdd5fd41117c33475316ae77fa47475dd1a17d8cbff01b6f5bfc0336477c0f398bbfb9953e489032d9baff2d37d353057fb66e549dc942084186dc14cdc90b602", 0xa9, 0x7}], 0x0, 0x0) 02:57:38 executing program 3: rt_sigaction(0x17, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000240)) [ 273.120667][T11554] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 273.129090][T11554] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 273.137064][T11554] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 273.145061][T11554] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 273.153042][T11554] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d [ 273.161020][T11554] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:39 executing program 2: fchownat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xee00, 0xffffffffffffffff, 0x0) 02:57:39 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xb8d240, 0x0) 02:57:39 executing program 0 (fault-call:0 fault-nth:14): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:39 executing program 1: r0 = getpid() capset(&(0x7f0000000240)={0x19980330, r0}, 0x0) 02:57:39 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) [ 273.507129][T11575] FAULT_INJECTION: forcing a failure. [ 273.507129][T11575] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 273.564095][T11581] capability: warning: `syz-executor.1' uses 32-bit capabilities (legacy support in use) 02:57:39 executing program 5: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 273.683444][T11575] CPU: 0 PID: 11575 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 273.692292][T11575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.702380][T11575] Call Trace: [ 273.705692][T11575] dump_stack+0x137/0x1be [ 273.710149][T11575] should_fail+0x384/0x4b0 [ 273.715022][T11575] _copy_to_user+0x2d/0x130 [ 273.719542][T11575] bpf_verifier_vlog+0x19e/0x330 [ 273.724516][T11575] __btf_verifier_log+0x6c/0x90 [ 273.729388][T11575] __btf_verifier_log_type+0x347/0x5d0 [ 273.734859][T11575] ? sort_r+0x1072/0x1090 [ 273.739197][T11575] ? btf_enum_check_meta+0xae/0x8a0 [ 273.744399][T11575] ? sort_r+0x1ed/0x1090 [ 273.748659][T11575] btf_enum_check_meta+0x796/0x8a0 [ 273.753792][T11575] btf_check_all_metas+0x21b/0x840 [ 273.758921][T11575] btf_new_fd+0x733/0x2210 [ 273.763363][T11575] ? safesetid_security_capable+0xad/0x1d0 [ 273.769273][T11575] ? bpf_lsm_capable+0x5/0x10 [ 273.773967][T11575] ? security_capable+0xb1/0xd0 [ 273.778857][T11575] __do_sys_bpf+0x1790/0x11590 [ 273.783671][T11575] ? ksys_write+0x1b1/0x220 [ 273.788198][T11575] ? syscall_enter_from_user_mode+0x24/0x170 [ 273.794196][T11575] ? lockdep_hardirqs_on+0x8d/0x130 [ 273.799417][T11575] ? syscall_enter_from_user_mode+0x24/0x170 [ 273.805406][T11575] do_syscall_64+0x2d/0x70 [ 273.809840][T11575] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 273.815738][T11575] RIP: 0033:0x45e0f9 [ 273.819661][T11575] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.839292][T11575] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 273.847729][T11575] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 273.861707][T11575] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 273.869702][T11575] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 02:57:39 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000000180)="f9", 0x1}, {0x0}], 0x0, 0x0) 02:57:39 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002380), 0xd490a10a6268cc8b, 0x0, 0x0) clone(0x4100, 0x0, 0x0, 0x0, 0x0) getgroups(0x0, 0x0) [ 273.877695][T11575] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000e [ 273.885681][T11575] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:39 executing program 3: clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x0) r1 = getpid() rt_sigqueueinfo(r1, 0x39, &(0x7f0000000000)) 02:57:39 executing program 0 (fault-call:0 fault-nth:15): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:39 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0}) r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) clone(0x4100, 0x0, 0x0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) r1 = gettid() ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) pipe(&(0x7f00000001c0)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x40000000000007, 0x0) r2 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) r3 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r3, 0x0) sendfile(r2, r3, &(0x7f00000003c0)=0x9, 0x0) tkill(r1, 0x18) 02:57:39 executing program 1: clone(0x4100, 0x0, 0x0, 0x0, 0x0) r0 = gettid() r1 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) r2 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) sendfile(r1, r2, 0x0, 0x2) tkill(r0, 0x18) 02:57:39 executing program 5: clone(0x4100, 0x0, 0x0, 0x0, 0x0) r0 = gettid() r1 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r1, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) r2 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) sendfile(r1, r2, &(0x7f00000003c0), 0x2) tkill(r0, 0x18) 02:57:39 executing program 3: clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() pipe(&(0x7f0000000000)={0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x101, 0x0) rt_sigqueueinfo(r0, 0x39, &(0x7f0000002200)) [ 274.114733][T11602] FAULT_INJECTION: forcing a failure. [ 274.114733][T11602] name fail_usercopy, interval 1, probability 0, space 0, times 0 02:57:40 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000003340)='/dev/urandom\x00', 0x0, 0x0) dup2(r0, r1) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 02:57:40 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x00') ioctl$TIOCGISO7816(r0, 0x40045431, 0x0) [ 274.228225][T11602] CPU: 1 PID: 11602 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 274.237023][T11602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.247095][T11602] Call Trace: [ 274.250413][T11602] dump_stack+0x137/0x1be [ 274.254773][T11602] should_fail+0x384/0x4b0 [ 274.259208][T11602] _copy_to_user+0x2d/0x130 [ 274.263726][T11602] bpf_verifier_vlog+0x19e/0x330 [ 274.268682][T11602] btf_verifier_log+0x181/0x210 [ 274.273548][T11602] ? bpf_verifier_vlog+0x1ab/0x330 [ 274.278680][T11602] __btf_verifier_log_type+0x3c4/0x5d0 [ 274.284158][T11602] ? sort_r+0x1072/0x1090 [ 274.288502][T11602] ? btf_enum_check_meta+0xae/0x8a0 [ 274.293709][T11602] ? sort_r+0x1ed/0x1090 [ 274.297973][T11602] btf_enum_check_meta+0x796/0x8a0 [ 274.303110][T11602] btf_check_all_metas+0x21b/0x840 [ 274.308247][T11602] btf_new_fd+0x733/0x2210 [ 274.312871][T11602] ? safesetid_security_capable+0xad/0x1d0 [ 274.318702][T11602] ? bpf_lsm_capable+0x5/0x10 [ 274.323392][T11602] ? security_capable+0xb1/0xd0 [ 274.328294][T11602] __do_sys_bpf+0x1790/0x11590 [ 274.333113][T11602] ? ksys_write+0x1b1/0x220 [ 274.337643][T11602] ? syscall_enter_from_user_mode+0x24/0x170 [ 274.343647][T11602] ? lockdep_hardirqs_on+0x8d/0x130 [ 274.348869][T11602] ? syscall_enter_from_user_mode+0x24/0x170 [ 274.354899][T11602] do_syscall_64+0x2d/0x70 [ 274.359325][T11602] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 274.365225][T11602] RIP: 0033:0x45e0f9 [ 274.369131][T11602] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.388773][T11602] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 274.397209][T11602] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 274.405196][T11602] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 274.413205][T11602] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 274.421213][T11602] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000f 02:57:40 executing program 5: clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() timer_create(0x0, &(0x7f0000001100)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040)="816083a962d547cd0a12e525c83e117b4eb36e70707def96cdf257af4aad4fb45cb1b54e85b89d0016bd583e56908b5ff9fd95cdcf0d714ffd47b3278fda14df9f", 0x0}}, 0x0) io_setup(0x0, &(0x7f0000000080)) rt_sigqueueinfo(r0, 0xe, &(0x7f0000001240)) 02:57:40 executing program 1: clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) pipe(&(0x7f0000000000)) r2 = socket$inet_udp(0x2, 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x19400, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x39, &(0x7f0000002200)) 02:57:40 executing program 5: clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) rt_sigqueueinfo(r0, 0xe, &(0x7f0000001240)) [ 274.429256][T11602] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:40 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000040), 0x0, 0x24008080, 0x0, 0x0) 02:57:40 executing program 3: clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x0, 0x0) r0 = getpid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_COOKIE(r1, 0x1, 0x39, 0x0, 0x0) rt_sigqueueinfo(r0, 0x39, &(0x7f0000000000)) 02:57:40 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000003280)='.\x00', 0x4000, 0x8, &(0x7f0000000040)) 02:57:40 executing program 2: pipe2(&(0x7f0000003780)={0xffffffffffffffff}, 0x0) read$char_usb(r0, &(0x7f0000000040), 0x0) 02:57:40 executing program 0 (fault-call:0 fault-nth:16): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:40 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000040)='\x00', 0x1000, 0x80, &(0x7f00000001c0)) [ 274.998511][T11658] FAULT_INJECTION: forcing a failure. [ 274.998511][T11658] name fail_usercopy, interval 1, probability 0, space 0, times 0 02:57:40 executing program 3: statx(0xffffffffffffff9c, &(0x7f0000000040)='\x00', 0x1100, 0x800, &(0x7f0000000180)) [ 275.087091][T11658] CPU: 1 PID: 11658 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 275.095885][T11658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.105956][T11658] Call Trace: [ 275.109262][T11658] dump_stack+0x137/0x1be [ 275.113616][T11658] should_fail+0x384/0x4b0 [ 275.118049][T11658] _copy_to_user+0x2d/0x130 [ 275.122566][T11658] bpf_verifier_vlog+0x19e/0x330 [ 275.127610][T11658] __btf_verifier_log+0x6c/0x90 [ 275.132475][T11658] ? __btf_verifier_log_type+0x403/0x5d0 [ 275.138211][T11658] __btf_verifier_log_type+0x41d/0x5d0 [ 275.143688][T11658] ? sort_r+0x1072/0x1090 [ 275.148039][T11658] ? btf_enum_check_meta+0xae/0x8a0 [ 275.153246][T11658] ? sort_r+0x1ed/0x1090 [ 275.157510][T11658] btf_enum_check_meta+0x796/0x8a0 [ 275.162658][T11658] btf_check_all_metas+0x21b/0x840 [ 275.167807][T11658] btf_new_fd+0x733/0x2210 [ 275.172259][T11658] ? safesetid_security_capable+0xad/0x1d0 [ 275.178079][T11658] ? bpf_lsm_capable+0x5/0x10 [ 275.182765][T11658] ? security_capable+0xb1/0xd0 [ 275.187630][T11658] __do_sys_bpf+0x1790/0x11590 [ 275.192448][T11658] ? ksys_write+0x1b1/0x220 [ 275.197151][T11658] ? syscall_enter_from_user_mode+0x24/0x170 [ 275.203155][T11658] ? lockdep_hardirqs_on+0x8d/0x130 [ 275.208386][T11658] ? syscall_enter_from_user_mode+0x24/0x170 [ 275.214402][T11658] do_syscall_64+0x2d/0x70 [ 275.218855][T11658] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 275.224782][T11658] RIP: 0033:0x45e0f9 [ 275.228714][T11658] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.249986][T11658] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 275.258420][T11658] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 275.266402][T11658] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 275.274393][T11658] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 02:57:40 executing program 4: statx(0xffffffffffffff9c, &(0x7f0000000040)='\x00', 0x1000, 0x20, &(0x7f00000001c0)) 02:57:40 executing program 2: socketpair(0x11, 0x0, 0x0, &(0x7f00000001c0)) 02:57:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x541b, 0x0) [ 275.282517][T11658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 275.290498][T11658] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:43 executing program 1: statx(0xffffffffffffff9c, &(0x7f0000000040)='\x00', 0x1000, 0x800, &(0x7f00000001c0)) 02:57:43 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$sock(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x4000) 02:57:43 executing program 2: statx(0xffffffffffffff9c, &(0x7f0000003280)='.\x00', 0x4000, 0x20, &(0x7f0000000040)) 02:57:43 executing program 3: statx(0xffffffffffffff9c, &(0x7f0000003280)='.\x00', 0x2000, 0x200, &(0x7f00000032c0)) 02:57:43 executing program 4: pipe2(&(0x7f0000003780)={0xffffffffffffffff}, 0x0) statx(r0, &(0x7f0000000000)='\x00', 0x1100, 0x10, &(0x7f0000000180)) 02:57:43 executing program 0 (fault-call:0 fault-nth:17): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 277.518881][T11689] FAULT_INJECTION: forcing a failure. [ 277.518881][T11689] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 277.573531][T11689] CPU: 1 PID: 11689 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 277.582701][T11689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.592772][T11689] Call Trace: [ 277.596072][T11689] dump_stack+0x137/0x1be [ 277.600435][T11689] should_fail+0x384/0x4b0 [ 277.604898][T11689] _copy_to_user+0x2d/0x130 [ 277.609425][T11689] bpf_verifier_vlog+0x19e/0x330 [ 277.614378][T11689] __btf_verifier_log_type+0x452/0x5d0 [ 277.619853][T11689] ? sort_r+0x1072/0x1090 [ 277.624195][T11689] ? btf_enum_check_meta+0xae/0x8a0 [ 277.629429][T11689] ? sort_r+0x1ed/0x1090 [ 277.633692][T11689] btf_enum_check_meta+0x796/0x8a0 [ 277.638862][T11689] btf_check_all_metas+0x21b/0x840 [ 277.644006][T11689] btf_new_fd+0x733/0x2210 [ 277.648442][T11689] ? safesetid_security_capable+0xad/0x1d0 [ 277.654349][T11689] ? bpf_lsm_capable+0x5/0x10 [ 277.659027][T11689] ? security_capable+0xb1/0xd0 [ 277.663890][T11689] __do_sys_bpf+0x1790/0x11590 [ 277.668725][T11689] ? ksys_write+0x1b1/0x220 02:57:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 02:57:43 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002840)={0x0, 0x0, 0x0, 0xff1d}, 0x0) 02:57:43 executing program 4: pipe2(&(0x7f0000003780)={0xffffffffffffffff}, 0x0) read$eventfd(r0, 0x0, 0x0) [ 277.673249][T11689] ? syscall_enter_from_user_mode+0x24/0x170 [ 277.679240][T11689] ? lockdep_hardirqs_on+0x8d/0x130 [ 277.684450][T11689] ? syscall_enter_from_user_mode+0x24/0x170 [ 277.690441][T11689] do_syscall_64+0x2d/0x70 [ 277.694877][T11689] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 277.701391][T11689] RIP: 0033:0x45e0f9 02:57:43 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x80) [ 277.705294][T11689] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.724909][T11689] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 277.733349][T11689] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 277.741334][T11689] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 277.749313][T11689] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 277.757321][T11689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000011 [ 277.765306][T11689] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:43 executing program 5: r0 = shmget(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f00000000c0)=""/252) 02:57:43 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) futimesat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{}, {0x0, 0xea60}}) 02:57:43 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000100)="f7", 0x1, 0x2000c015, 0x0, 0x0) 02:57:43 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$netlink(r0, 0x0, 0x0) 02:57:43 executing program 2: statx(0xffffffffffffff9c, &(0x7f0000003280)='.\x00', 0x2000, 0x0, &(0x7f00000032c0)) 02:57:43 executing program 5: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_BMAP(r0, 0x0, 0x0) 02:57:43 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$sock(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)='\\', 0x1}], 0x1}, 0x0) 02:57:44 executing program 0 (fault-call:0 fault-nth:18): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:44 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) getpid() sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000400)=[{0x0}, {0x0}, {&(0x7f0000000380)='k', 0x1}], 0x3, &(0x7f0000000540)=[@cred], 0x20}, 0x0) 02:57:44 executing program 2: sync() syz_emit_ethernet(0x32, &(0x7f0000000000), 0x0) 02:57:44 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) getpid() sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000400)=[{0x0}, {0x0}, {&(0x7f0000000380)='k', 0x33fe0}], 0x3, &(0x7f0000000540)=[@cred], 0x20}, 0xee) 02:57:44 executing program 5: symlinkat(&(0x7f00000002c0)='\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00') renameat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') 02:57:44 executing program 3: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000001600)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, 0x0) 02:57:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0) 02:57:44 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x1203, &(0x7f0000000280), &(0x7f0000000000)=0x8) 02:57:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/78, 0x4e}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000280)=""/187, 0xbb}, {0x0}, {0x0}], 0x3}, 0x40002) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) recvfrom$unix(r5, &(0x7f0000001700)=""/102400, 0x19000, 0x0, 0x0, 0x0) shutdown(r4, 0x0) 02:57:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/78, 0x4e}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f0000000680)=[{&(0x7f0000000700)=""/54, 0x36}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) shutdown(r4, 0x0) [ 278.329952][T11741] FAULT_INJECTION: forcing a failure. [ 278.329952][T11741] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 278.405217][T11741] CPU: 0 PID: 11741 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 278.414011][T11741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.424176][T11741] Call Trace: [ 278.427490][T11741] dump_stack+0x137/0x1be [ 278.431850][T11741] should_fail+0x384/0x4b0 [ 278.436295][T11741] _copy_to_user+0x2d/0x130 [ 278.440907][T11741] bpf_verifier_vlog+0x19e/0x330 [ 278.445868][T11741] __btf_verifier_log+0x6c/0x90 [ 278.450731][T11741] ? bpf_verifier_vlog+0x1ab/0x330 [ 278.455858][T11741] __btf_verifier_log_type+0x471/0x5d0 [ 278.461359][T11741] ? sort_r+0x1072/0x1090 [ 278.465726][T11741] ? btf_enum_check_meta+0xae/0x8a0 [ 278.470934][T11741] ? sort_r+0x1ed/0x1090 [ 278.475224][T11741] btf_enum_check_meta+0x796/0x8a0 [ 278.480362][T11741] btf_check_all_metas+0x21b/0x840 [ 278.485501][T11741] btf_new_fd+0x733/0x2210 [ 278.489944][T11741] ? safesetid_security_capable+0xad/0x1d0 [ 278.495768][T11741] ? bpf_lsm_capable+0x5/0x10 [ 278.500462][T11741] ? security_capable+0xb1/0xd0 [ 278.505339][T11741] __do_sys_bpf+0x1790/0x11590 [ 278.510156][T11741] ? ksys_write+0x1b1/0x220 [ 278.514688][T11741] ? syscall_enter_from_user_mode+0x24/0x170 [ 278.520688][T11741] ? lockdep_hardirqs_on+0x8d/0x130 [ 278.525900][T11741] ? syscall_enter_from_user_mode+0x24/0x170 [ 278.531921][T11741] do_syscall_64+0x2d/0x70 [ 278.536348][T11741] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 278.542247][T11741] RIP: 0033:0x45e0f9 [ 278.546177][T11741] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.567448][T11741] RSP: 002b:00007fe7a5ae1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 278.575883][T11741] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 [ 278.583902][T11741] RDX: 0000000000000020 RSI: 0000000020000340 RDI: 0000000000000012 [ 278.591888][T11741] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 02:57:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/108, 0x6c}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000440)=[{&(0x7f0000000100)=""/67, 0x43}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) recvfrom$inet(r3, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e0051f) shutdown(r2, 0x0) readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/106, 0x6a}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) shutdown(r3, 0x0) [ 278.599875][T11741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000012 [ 278.607890][T11741] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:44 executing program 0 (fault-call:0 fault-nth:19): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 278.710497][ T3202] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 278.767906][T11767] FAULT_INJECTION: forcing a failure. [ 278.767906][T11767] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 278.795349][T11767] CPU: 0 PID: 11767 Comm: syz-executor.0 Not tainted 5.10.0-rc7-syzkaller #0 [ 278.804137][T11767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.814214][T11767] Call Trace: [ 278.817530][T11767] dump_stack+0x137/0x1be [ 278.821891][T11767] should_fail+0x384/0x4b0 [ 278.826333][T11767] _copy_to_user+0x2d/0x130 [ 278.830855][T11767] simple_read_from_buffer+0xd9/0x160 [ 278.836249][T11767] proc_fail_nth_read+0x14c/0x1a0 [ 278.841295][T11767] ? rw_verify_area+0x198/0x340 [ 278.846163][T11767] ? proc_fault_inject_write+0x2b0/0x2b0 [ 278.851815][T11767] vfs_read+0x213/0xa80 [ 278.856045][T11767] ? mutex_lock_nested+0x1a/0x20 [ 278.860995][T11767] ? __fdget_pos+0x24b/0x2e0 [ 278.865616][T11767] ksys_read+0x11b/0x220 [ 278.869913][T11767] do_syscall_64+0x2d/0x70 [ 278.874341][T11767] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 278.880247][T11767] RIP: 0033:0x4179f1 [ 278.884148][T11767] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 278.903767][T11767] RSP: 002b:00007fe7a5ae1c70 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 02:57:44 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) [ 278.912214][T11767] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00000000004179f1 [ 278.920202][T11767] RDX: 000000000000000f RSI: 00007fe7a5ae1cb0 RDI: 0000000000000003 [ 278.928189][T11767] RBP: 00007fe7a5ae1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 278.936207][T11767] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000013 [ 278.944203][T11767] R13: 00007fff4cd64b6f R14: 00007fe7a5ae29c0 R15: 000000000119bf8c 02:57:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 279.030421][ T3202] usb 4-1: device descriptor read/64, error 18 02:57:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f00000001c0), 0x2) 02:57:44 executing program 0: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:45 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 279.300486][ T3202] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 279.500387][ T3202] usb 4-1: device descriptor read/64, error 18 [ 279.622625][ T3202] usb usb4-port1: attempt power cycle [ 280.350284][ T3202] usb 4-1: new high-speed USB device number 4 using dummy_hcd [ 280.440952][ T3202] usb 4-1: Invalid ep0 maxpacket: 0 [ 280.590370][ T3202] usb 4-1: new high-speed USB device number 5 using dummy_hcd [ 280.680918][ T3202] usb 4-1: Invalid ep0 maxpacket: 0 [ 280.687042][ T3202] usb usb4-port1: unable to enumerate USB device 02:57:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) read(r0, &(0x7f0000000640)=""/69, 0x45) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000080)={0x0, 0x10000}, 0x10) readv(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/65, 0x41}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) recvfrom$inet(r1, 0x0, 0x350, 0x0, 0x0, 0x800e004df) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r3, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) shutdown(r1, 0x0) 02:57:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) connect$inet(r1, &(0x7f0000000040)={0x10, 0x2}, 0x10) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 02:57:47 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000740)=""/4091, 0xffb}], 0x1, 0x0, 0xfffffffffffffd0a}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000400)=""/195, 0xc3}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00549) shutdown(r2, 0x0) readv(r3, &(0x7f0000001d40)=[{&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f0000001800)=""/223, 0xdf}, {&(0x7f0000001900)=""/161, 0xa1}, {&(0x7f00000019c0)=""/165, 0xa5}, {&(0x7f0000001a80)=""/162, 0xa2}, {&(0x7f0000001b40)=""/223, 0xdf}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f0000001c40)=""/80, 0x50}, {&(0x7f0000001cc0)=""/97, 0x61}], 0x9) shutdown(r3, 0x0) 02:57:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000004c0)=""/223, 0xdf}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000002c0)=""/66, 0x42}], 0x1}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}], 0x2}, 0x0) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0xd051, 0x0, 0x0, 0x800e00550) shutdown(r5, 0x0) r7 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r7, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0, 0x0) shutdown(r6, 0x0) shutdown(r3, 0x0) 02:57:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xb) 02:57:47 executing program 0: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/78, 0x4e}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)=""/191}], 0x9}, 0x40002) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) recvfrom$unix(r5, &(0x7f0000001700)=""/102400, 0x19000, 0x0, 0x0, 0x0) shutdown(r4, 0x0) 02:57:47 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c}, 0x1c) 02:57:47 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:47 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100), 0x27) 02:57:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/108, 0x6c}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000440)=[{&(0x7f0000000100)=""/67, 0x43}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) recvfrom$inet(r3, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e0051f) shutdown(r2, 0x0) readv(r3, &(0x7f0000000700)=[{&(0x7f0000000080)=""/60, 0x3c}], 0x1) shutdown(r3, 0x0) 02:57:48 executing program 0: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000340)=""/4106, 0x100a}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xb, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000080)=""/118, 0x76}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x310, 0x0, 0x0, 0x800e005ad) shutdown(r3, 0x0) r5 = socket(0x2, 0x1, 0x0) connect$inet(r5, &(0x7f00000000c0)={0x34, 0x2}, 0x10) shutdown(r4, 0x0) 02:57:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/108, 0x6c}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000440)=[{&(0x7f0000000100)=""/67, 0x43}, {0x0}, {0x0}, {0x0}], 0x4) recvfrom$inet(r3, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e0051f) shutdown(r2, 0x0) readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/106, 0x6a}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) shutdown(r3, 0x0) 02:57:48 executing program 2: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 02:57:48 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @empty, @val, {@ipv4}}, 0x0) 02:57:48 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:48 executing program 2: syz_emit_ethernet(0x12e, &(0x7f0000000100)={@local, @local, @val, {@ipv6}}, 0x0) 02:57:48 executing program 4: syz_emit_ethernet(0x74, &(0x7f0000000000)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:48 executing program 2: syz_emit_ethernet(0x5a, &(0x7f0000000000)={@local, @random="c2ca035017d4", @val, {@ipv6}}, 0x0) 02:57:48 executing program 0: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:48 executing program 2: syz_emit_ethernet(0x22, &(0x7f0000000080)={@broadcast, @local, @val, {@ipv4}}, 0x0) 02:57:49 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000040)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:49 executing program 4: syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @random="c2ca035017d4", @val, {@ipv6}}, 0x0) 02:57:49 executing program 0: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:49 executing program 2: syz_emit_ethernet(0x4f, &(0x7f0000000100)={@local, @empty, @val, {@ipv6}}, 0x0) 02:57:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) faccessat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x3) 02:57:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0xffffffffffffffff, 0x0) utimes(&(0x7f0000000000)='./file0\x00', 0x0) 02:57:49 executing program 0: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:49 executing program 2: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @local, @val, {@ipv6}}, 0x0) 02:57:49 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000040)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:49 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f00000000c0)) 02:57:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 02:57:49 executing program 5: syz_emit_ethernet(0x146, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60b5ff8501103c0092f7014d05599a8538b94f68ab65d5c2fe8000000000000000000000000000aa622000000000000001fe"], 0x0) 02:57:49 executing program 2: symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') unlinkat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) 02:57:49 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:49 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:49 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000240)={@local, @broadcast, @val, {@ipv6}}, 0x0) 02:57:49 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000080)={@broadcast, @local, @val, {@ipv4}}, 0x0) 02:57:49 executing program 4: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@broadcast, @local, @val, {@ipv4}}, 0x0) 02:57:49 executing program 2: syz_emit_ethernet(0x70, &(0x7f0000000000)={@local, @empty, @val, {@ipv6}}, 0x0) 02:57:49 executing program 1: syz_emit_ethernet(0x2e, &(0x7f00000002c0)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:49 executing program 4: syz_emit_ethernet(0x56, &(0x7f00000004c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60d1eeb337ee6e0000000000000000000000000000000000fe8000000000000000000000000000aa"], 0x0) 02:57:49 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000040)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:49 executing program 3: symlinkat(&(0x7f0000000080)='.\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') 02:57:49 executing program 0: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:49 executing program 1: syz_emit_ethernet(0x7e, &(0x7f0000000100)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:49 executing program 2: syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @empty, @val, {@ipv6}}, 0x0) 02:57:49 executing program 5: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@local, @empty, @val, {@ipv6}}, 0x0) 02:57:49 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000040)={@local, @empty, @val, {@ipv6}}, 0x0) 02:57:49 executing program 4: syz_emit_ethernet(0xb8, &(0x7f0000000000)={@local, @random="c2ca035017d4", @val, {@ipv6}}, 0x0) 02:57:49 executing program 0: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:49 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000140)={@local, @broadcast, @val, {@ipv4}}, 0x0) 02:57:49 executing program 5: syz_emit_ethernet(0x22, &(0x7f0000000080)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:49 executing program 1: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @local, @val, {@ipv6}}, 0x0) 02:57:49 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:49 executing program 3: syz_emit_ethernet(0x4f, &(0x7f0000000040)={@local, @empty, @val, {@ipv6}}, 0x0) 02:57:50 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:50 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000040)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:50 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000080)={@random="af709016a83d", @empty, @val, {@ipv4}}, 0x0) 02:57:50 executing program 1: syz_emit_ethernet(0x7b, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffff0000000000008847"], 0x0) 02:57:50 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @local, @val, {@ipv6}}, 0x0) 02:57:50 executing program 4: r0 = socket(0x18, 0x2, 0x0) r1 = dup(r0) getsockopt$sock_int(r1, 0xffff, 0x1007, 0x0, 0x0) 02:57:50 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:50 executing program 2: syz_emit_ethernet(0x56, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60d1ee3b00012b000000000000cdb081440e8f13486d08a3fe"], 0x0) 02:57:50 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000200)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:50 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:50 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto(r0, &(0x7f0000001880)='&', 0x1, 0x4c041, 0x0, 0x0) 02:57:50 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @local, 0x0, 0x700}}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x2b, 0x4, 0x20, 0x4, 0x2d, @mcast1, @remote, 0x700, 0x7, 0x800, 0x3}}) pipe(&(0x7f0000000240)) 02:57:50 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0xed1cf56daab2b4b1, 0x0, 0x0, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x1c}}, 0x0) 02:57:50 executing program 0: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:50 executing program 0: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:50 executing program 4: syz_emit_ethernet(0x77, &(0x7f0000000000)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:50 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000040)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:50 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000080)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:50 executing program 5: symlinkat(&(0x7f0000000080)='.\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') r0 = open$dir(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file0/file0\x00') 02:57:50 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @local, @val, {@ipv6}}, 0x0) 02:57:50 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000200)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:50 executing program 5: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@local, @empty, @val, {@ipv6}}, 0x0) 02:57:50 executing program 1: syz_emit_ethernet(0x42, &(0x7f0000000000)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:50 executing program 4: syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 02:57:50 executing program 0: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:50 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000100)={@local, @local, @val, {@ipv6}}, 0x0) 02:57:50 executing program 0: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:51 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000200)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:51 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 02:57:51 executing program 1: r0 = socket(0x18, 0x2, 0x0) getsockname(r0, &(0x7f0000000780), &(0x7f00000017c0)=0x1002) 02:57:51 executing program 0: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:51 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000100)={@local, @empty, @val, {@ipv4}}, 0x0) 02:57:51 executing program 4: syz_emit_ethernet(0x52, &(0x7f00000005c0)={@local, @random="c2ca035017d4", @val, {@ipv6}}, 0x0) 02:57:51 executing program 3: syz_emit_ethernet(0x7e, &(0x7f0000000040)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:51 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 02:57:51 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000040)={@local, @empty, @val, {@ipv6}}, 0x0) 02:57:51 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x80, &(0x7f0000000000), 0x4) 02:57:51 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty, @val, {@ipv6}}, 0x0) 02:57:51 executing program 5: mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) syz_emit_ethernet(0x56, &(0x7f0000000040)=ANY=[], 0x0) mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) 02:57:51 executing program 1: syz_emit_ethernet(0x70, &(0x7f0000000340)={@local, @empty, @val, {@ipv6}}, 0x0) 02:57:51 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_O_TEI={0x8, 0x9, 0x2}, @GTPA_O_TEI={0x8, 0x9, 0x1}, @GTPA_NET_NS_FD={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x44001) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, 0x0, 0xd00, 0x70bd2d, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @GTPA_NET_NS_FD={0x8}, @GTPA_VERSION={0x8, 0x2, 0x1f}, @GTPA_TID={0xc, 0x3, 0x3}]}, 0x40}}, 0x4000004) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x3c, r1, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xc8}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x3c}, 0x1, 0x0, 0x0, 0x90}, 0x40801) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x1ff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000040)={0x0, 0x0}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000001880)={&(0x7f00000017c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001840)={&(0x7f0000001800)={0x2c, 0x0, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x804}, 0x20000000) 02:57:51 executing program 0: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:51 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @random, @val, {@ipv6}}, 0x0) 02:57:51 executing program 2: ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000000)={0x0, 0x7fffffff, 0x0, 0x1, 0x0, 0x1}) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x100000000, 0x80) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000080)=""/15) ioctl$EVIOCGID(r0, 0x80084502, 0x0) syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x1, 0x80, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x7, 0x1, 0x0, 0x82, "", {{{0x9, 0x5, 0x1, 0x2, 0x200, 0x6, 0x20, 0x8}}}}}]}}]}}, &(0x7f0000000680)={0xa, &(0x7f0000000240)={0xa, 0x6, 0x310, 0xcc, 0x0, 0x4, 0xff, 0x2}, 0x3b, &(0x7f0000000280)={0x5, 0xf, 0x3b, 0x4, [@wireless={0xb, 0x10, 0x1, 0x2, 0x26, 0x20, 0x2, 0x3, 0x58}, @wireless={0xb, 0x10, 0x1, 0xc, 0xc2, 0x0, 0x0, 0xa65e, 0x3f}, @ssp_cap={0xc, 0x10, 0xa, 0xf8, 0x0, 0x10001, 0xddb6d499fbaa1494}, @ss_container_id={0x14, 0x10, 0x4, 0x57, "8debd2110d01d5a1f3de89417862dc48"}]}, 0x6, [{0x4, &(0x7f00000002c0)=@lang_id={0x4}}, {0x0, 0x0}, {0x0, 0x0}, {0x2, &(0x7f0000000480)=@string={0x2}}, {0x4, &(0x7f0000000580)=@lang_id={0x4}}, {0x4, &(0x7f0000000640)=@lang_id={0x4}}]}) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x4, &(0x7f00000007c0)={[{}]}) ioctl$HIDIOCGSTRING(0xffffffffffffffff, 0x81044804, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000a00)=[0x6]) syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000ac0)=""/207, 0xcf) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000c00)=""/64) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000c80)) syz_usb_connect$uac1(0x4, 0x98, &(0x7f0000000cc0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0xff, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x86, 0x3, 0x1, 0xff, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@processing_unit={0x7}, @processing_unit={0x7, 0x24, 0x7, 0x5, 0x5}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x2, 0x4, {0x7, 0x25, 0x1, 0x0, 0x2}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x9}, @format_type_ii_discrete={0x9, 0x24, 0x2, 0x2, 0x0, 0x8}, @as_header={0x7, 0x24, 0x1, 0x0, 0x2}]}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x7e, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f0000001040)={0x0, 0x0, 0x10, &(0x7f0000000e00)={0x5, 0xf, 0x10, 0x1, [@wireless={0xb}]}, 0x1, [{0x0, 0x0}]}) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f00000010c0)) 02:57:51 executing program 0: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:51 executing program 1: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x200}}}}}]}}]}}, 0x0) syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000cc0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 02:57:51 executing program 5: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, 0x0) 02:57:51 executing program 3: syz_usb_connect$hid(0x2, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x20, 0x56a, 0x319, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x6, 0x30, 0x40, [{{0x9, 0x4, 0x0, 0x3, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x91, 0x8, 0x1, {0x22, 0xe70}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0xff, 0xa5}}, [{{0x9, 0x5, 0x2, 0x3, 0x400, 0x0, 0x20, 0x8}}]}}}]}}]}}, &(0x7f00000003c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x110, 0xff, 0xef, 0x7f, 0x20}, 0x27, &(0x7f0000000080)={0x5, 0xf, 0x27, 0x3, [@wireless={0xb, 0x10, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x7}, @ptm_cap={0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "62d5490b5900b38d00ffa6149f68695f"}]}, 0x7, [{0x0, 0x0}, {0x0, 0x0}, {0x4, &(0x7f00000001c0)=@lang_id={0x4}}, {0x4, &(0x7f0000000200)=@lang_id={0x4}}, {0x0, 0x0}, {0x4, &(0x7f0000000340)=@lang_id={0x4}}, {0x4, &(0x7f0000000380)=@lang_id={0x4}}]}) r0 = syz_open_dev$evdev(0x0, 0x6, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000004c0)=0x7ff) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, &(0x7f0000000600)) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000640)=0x7) ioctl$EVIOCGID(r0, 0x80084502, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000780)='/dev/input/event#\x00', 0x8, 0x200201) ioctl$EVIOCGPROP(r1, 0x80404509, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000008c0)=""/212) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000c00)=0x4) ioctl$EVIOCSABS20(r1, 0x401845e0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000f00)=""/2) syz_usb_connect(0x2, 0x0, 0x0, 0x0) 02:57:51 executing program 4: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x1}}]}}]}}, 0x0) 02:57:51 executing program 0: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:51 executing program 0: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:51 executing program 0: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:51 executing program 0: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 286.090108][T11336] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 286.100144][ T9541] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 286.110110][ T9731] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 286.130939][T11333] usb 4-1: new full-speed USB device number 6 using dummy_hcd 02:57:52 executing program 0: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 286.204703][ T9773] usb 5-1: new high-speed USB device number 2 using dummy_hcd 02:57:52 executing program 0: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 286.350208][T11336] usb 2-1: Using ep0 maxpacket: 8 [ 286.355432][ T9541] usb 3-1: Using ep0 maxpacket: 8 [ 286.361123][ T9731] usb 6-1: Using ep0 maxpacket: 8 [ 286.450951][ T9773] usb 5-1: Using ep0 maxpacket: 8 [ 286.461654][T11333] usb 4-1: not running at top speed; connect to a high speed hub [ 286.481676][ T9731] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 286.494707][T11336] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 286.507636][ T9541] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 286.560564][T11333] usb 4-1: config 1 interface 0 altsetting 3 endpoint 0x81 has invalid wMaxPacketSize 0 [ 286.580020][T11333] usb 4-1: config 1 interface 0 altsetting 3 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 286.600429][ T9773] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 286.614195][T11333] usb 4-1: config 1 interface 0 has no altsetting 0 [ 286.691414][ T9731] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 286.700978][T11336] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 286.715635][ T9731] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 286.727958][T11336] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 286.754763][ T9731] usb 6-1: Product: syz [ 286.761111][T11336] usb 2-1: Product: syz [ 286.768824][ T9731] usb 6-1: Manufacturer: syz [ 286.777036][T11336] usb 2-1: Manufacturer: syz [ 286.782610][ T9731] usb 6-1: SerialNumber: syz [ 286.787357][T11336] usb 2-1: SerialNumber: syz [ 286.790622][ T9773] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 286.821893][ T9773] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 286.833478][ T9773] usb 5-1: Product: syz [ 286.843987][ T9773] usb 5-1: Manufacturer: syz [ 286.849510][ T9773] usb 5-1: SerialNumber: syz [ 286.911005][T11333] usb 4-1: string descriptor 0 read error: -22 [ 286.917313][T11333] usb 4-1: New USB device found, idVendor=056a, idProduct=0319, bcdDevice= 0.40 [ 286.940212][T11333] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 287.000862][T12130] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 287.048195][T12118] udc-core: couldn't find an available UDC or it's busy [ 287.054052][ T9731] usb 6-1: USB disconnect, device number 2 [ 287.058830][T12118] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 287.110573][ T9541] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 287.119624][ T9541] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 287.132626][T11336] usb 2-1: USB disconnect, device number 2 [ 287.166012][T11334] usb 5-1: USB disconnect, device number 2 [ 287.320131][T11333] usbhid 4-1:1.0: can't add hid device: -71 [ 287.327759][T11333] usbhid: probe of 4-1:1.0 failed with error -71 [ 287.343033][T11333] usb 4-1: USB disconnect, device number 6 [ 287.476679][ T9541] usb 3-1: USB disconnect, device number 2 [ 287.830031][T11333] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 287.880230][ T9773] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 287.950172][ T3202] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 288.020082][ T2989] usb 4-1: new full-speed USB device number 7 using dummy_hcd [ 288.071564][T11333] usb 6-1: Using ep0 maxpacket: 8 [ 288.160025][ T9773] usb 2-1: Using ep0 maxpacket: 8 [ 288.170505][ T9541] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 288.190502][T11333] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 288.219919][ T3202] usb 5-1: Using ep0 maxpacket: 8 [ 288.300284][ T9773] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 288.356172][ T2989] usb 4-1: not running at top speed; connect to a high speed hub [ 288.360566][T11333] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 288.374483][T11333] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 288.380226][ T3202] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 288.385311][T11333] usb 6-1: Product: syz [ 288.401394][T11333] usb 6-1: Manufacturer: syz [ 288.406092][T11333] usb 6-1: SerialNumber: syz [ 288.431101][ T9541] usb 3-1: Using ep0 maxpacket: 8 [ 288.460383][ T2989] usb 4-1: config 1 interface 0 altsetting 3 endpoint 0x81 has invalid wMaxPacketSize 0 [ 288.474060][ T2989] usb 4-1: config 1 interface 0 altsetting 3 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 288.491218][ T2989] usb 4-1: config 1 interface 0 has no altsetting 0 [ 288.510376][ T9773] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 288.519641][ T9773] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 288.529802][ T9773] usb 2-1: Product: syz [ 288.536039][ T9773] usb 2-1: Manufacturer: syz [ 288.541809][ T9773] usb 2-1: SerialNumber: syz [ 288.553354][ T9541] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 288.570167][ T3202] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 288.579220][ T3202] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 288.609194][ T3202] usb 5-1: Product: syz [ 288.619764][ T3202] usb 5-1: Manufacturer: syz [ 288.627191][ T3202] usb 5-1: SerialNumber: syz [ 288.674385][ T9773] usb 6-1: USB disconnect, device number 3 [ 288.760623][ T2989] usb 4-1: string descriptor 0 read error: -22 [ 288.766924][ T2989] usb 4-1: New USB device found, idVendor=056a, idProduct=0319, bcdDevice= 0.40 [ 288.780912][ T2989] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 288.796589][T11333] usb 2-1: USB disconnect, device number 3 [ 288.811168][T12130] raw-gadget gadget: fail, usb_ep_enable returned -22 02:57:54 executing program 2: close(0xffffffffffffff9c) 02:57:54 executing program 0: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:54 executing program 1: nanosleep(0x0, &(0x7f0000000040)) 02:57:54 executing program 5: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x7, 0x1, 0x0, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x0, 0x6, 0x20, 0x8}}}}}]}}]}}, &(0x7f0000000680)={0xa, &(0x7f0000000240)={0xa, 0x6, 0x310, 0xcc, 0x0, 0x0, 0xff, 0x2}, 0x3b, &(0x7f0000000280)={0x5, 0xf, 0x3b, 0x4, [@wireless={0xb, 0x10, 0x1, 0x2, 0x26, 0x20, 0x2, 0x3, 0x58}, @wireless={0xb, 0x10, 0x1, 0xc, 0x0, 0x0, 0x0, 0xa65e}, @ssp_cap={0xc, 0x10, 0xa, 0xf8, 0x0, 0x10001, 0xddb6d499fbaa1494}, @ss_container_id={0x14, 0x10, 0x4, 0x57, "8debd2110d01d5a1f3de89417862dc48"}]}, 0x3, [{0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}]}) [ 288.894532][T11334] usb 5-1: USB disconnect, device number 3 02:57:54 executing program 4: read(0xffffffffffffffff, &(0x7f00000002c0)=""/238, 0xee) 02:57:54 executing program 3: unlink(&(0x7f0000000200)='./file0\x00') [ 288.970102][ T9541] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 288.985729][ T9541] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 289.000323][ T2989] usb 4-1: can't set config #1, error -71 02:57:54 executing program 0: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 289.021996][ T2989] usb 4-1: USB disconnect, device number 7 [ 289.040152][ T9541] usb 3-1: can't set config #1, error -71 [ 289.061296][ T9541] usb 3-1: USB disconnect, device number 3 02:57:54 executing program 3: getcwd(&(0x7f0000000140)=""/4096, 0x1000) 02:57:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x8) 02:57:54 executing program 1: syz_usb_connect$uac1(0x4, 0x0, 0x0, 0x0) syz_usb_control_io$printer(0xffffffffffffffff, 0x0, 0x0) syz_usb_connect$uac1(0x0, 0x71, &(0x7f00000017c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x2b, 0x0, {0x7}}}}}}}]}}, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) 02:57:55 executing program 4: syz_usb_connect$cdc_ncm(0x4, 0x6e, &(0x7f0000003e00)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) 02:57:55 executing program 0: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:55 executing program 2: syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xb5, 0xa8, 0x70, 0x10, 0x411, 0x158, 0x5b7e, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xf3, 0x3f, 0xe5}}]}}]}}, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_connect$uac1(0x0, 0x0, 0x0, 0x0) 02:57:55 executing program 3: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000280)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_connect$cdc_ncm(0x6, 0x6e, &(0x7f0000000a00)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000011c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_connect$uac1(0x3, 0x78, &(0x7f0000001240)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x66, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@as_header={0x7}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) syz_usb_connect$uac1(0x6, 0x71, &(0x7f0000002940)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000002c00)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, 0x0) 02:57:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 289.289987][ T9731] usb 6-1: new high-speed USB device number 4 using dummy_hcd [ 289.500131][ T5] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 289.539943][ T9731] usb 6-1: Using ep0 maxpacket: 8 [ 289.624895][ T2989] usb 3-1: new high-speed USB device number 4 using dummy_hcd [ 289.660416][ T9731] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 289.670368][ T9731] usb 6-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 289.683655][ T9731] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 289.710101][ T9773] usb 4-1: new high-speed USB device number 8 using dummy_hcd [ 289.767006][ T5] usb 2-1: Using ep0 maxpacket: 16 [ 289.890184][ T5] usb 2-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 289.899041][ T2989] usb 3-1: Using ep0 maxpacket: 16 [ 289.923171][ T5] usb 2-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 289.930220][ T9731] usb 6-1: string descriptor 0 read error: -22 [ 289.940170][ T9731] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 289.943799][ T5] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 289.949220][ T9731] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 290.141107][ T5] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 290.150716][ T5] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 290.158760][ T5] usb 2-1: Product: syz [ 290.163960][ T5] usb 2-1: Manufacturer: syz [ 290.168691][ T5] usb 2-1: SerialNumber: syz [ 290.240470][ T2989] usb 3-1: New USB device found, idVendor=0411, idProduct=0158, bcdDevice=5b.7e [ 290.251774][ T2989] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 290.261828][ T2989] usb 3-1: Product: syz [ 290.265297][ T9731] usb 6-1: USB disconnect, device number 4 [ 290.275011][ T2989] usb 3-1: Manufacturer: syz [ 290.281328][ T2989] usb 3-1: SerialNumber: syz [ 290.300596][ T9773] usb 4-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 290.316023][ T2989] usb 3-1: config 0 descriptor?? [ 290.321569][ T9773] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 290.336456][ T9773] usb 4-1: Product: syz [ 290.341628][ T9773] usb 4-1: Manufacturer: syz [ 290.352737][ T9773] usb 4-1: SerialNumber: syz [ 290.401440][ T9773] usb 4-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 290.520753][ T5] usb 2-1: 0:2 : does not exist [ 290.562216][ T5] usb 2-1: USB disconnect, device number 4 [ 290.584426][ T2989] usb 3-1: USB disconnect, device number 4 [ 291.039897][T11334] usb 6-1: new high-speed USB device number 5 using dummy_hcd [ 291.160286][ T9773] usb 4-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 291.199851][ T9731] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 291.279861][T11334] usb 6-1: Using ep0 maxpacket: 8 [ 291.359991][T11333] usb 3-1: new high-speed USB device number 5 using dummy_hcd [ 291.372134][T12303] udc-core: couldn't find an available UDC or it's busy [ 291.379099][T12303] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 291.393128][T12303] udc-core: couldn't find an available UDC or it's busy [ 291.401361][T11334] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 291.411655][T11334] usb 6-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 291.412159][T12303] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 291.427721][T11334] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 291.442423][ T9731] usb 2-1: Using ep0 maxpacket: 16 [ 291.443124][T12303] udc-core: couldn't find an available UDC or it's busy [ 291.455685][T12303] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 291.470064][ T9541] usb 4-1: USB disconnect, device number 8 [ 291.566102][ T9731] usb 2-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 291.580783][ T9731] usb 2-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 291.596862][ T9731] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 291.640363][T11333] usb 3-1: Using ep0 maxpacket: 16 [ 291.690053][T11334] usb 6-1: string descriptor 0 read error: -22 [ 291.696292][T11334] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 291.707910][T11334] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 291.760866][ T9731] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 291.770908][ T9731] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 291.779162][ T9731] usb 2-1: Product: syz [ 291.785289][ T9731] usb 2-1: Manufacturer: syz [ 291.790733][ T9731] usb 2-1: SerialNumber: syz 02:57:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:57 executing program 5: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x4, "", {{{0x9, 0x5, 0x1, 0x2, 0x7d7}}}}}]}}]}}, 0x0) syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000680)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 02:57:57 executing program 4: syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xb5, 0xa8, 0x70, 0x10, 0x411, 0x158, 0x5b7e, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xf3, 0x3f, 0xe5}}]}}]}}, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_connect$uac1(0x0, 0x78, &(0x7f0000002f40)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x66, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x0, 0x58}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7, 0x25, 0x1, 0x0, 0x0, 0x5}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@as_header={0x7}]}, {{0x9, 0x5, 0x82, 0x9, 0x3ff, 0x0, 0x3, 0x0, {0x7}}}}}}}]}}, 0x0) [ 291.905282][ T5] usb 6-1: USB disconnect, device number 5 [ 291.919931][T11333] usb 3-1: New USB device found, idVendor=0411, idProduct=0158, bcdDevice=5b.7e [ 291.929002][T11333] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 02:57:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 291.991579][T11333] usb 3-1: Product: syz [ 292.009972][T11333] usb 3-1: Manufacturer: syz [ 292.018464][T11333] usb 3-1: SerialNumber: syz [ 292.031630][T11333] usb 3-1: config 0 descriptor?? 02:57:57 executing program 3: io_setup(0x800, &(0x7f0000000000)=0x0) io_destroy(r0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) 02:57:57 executing program 1: process_vm_readv(0x0, &(0x7f0000004080)=[{&(0x7f00000000c0)=""/254, 0xfe}, {&(0x7f00000001c0)=""/162, 0xa2}, {&(0x7f0000003ec0)=""/137, 0x89}, {&(0x7f0000000340)=""/13, 0xd}, {&(0x7f0000000380)=""/8, 0x8}, {&(0x7f0000003cc0)=""/148, 0x94}, {&(0x7f0000003d80)=""/134, 0x86}, {&(0x7f0000003f80)=""/194, 0xc2}, {&(0x7f0000000280)=""/110, 0x6e}, {&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000300)=""/35, 0x23}], 0xb, &(0x7f0000000440), 0x7, 0x0) 02:57:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 292.110839][ T9731] usb 2-1: 0:2 : does not exist [ 292.145906][ T9731] usb 2-1: USB disconnect, device number 5 02:57:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x15, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:57:58 executing program 1: syz_emit_ethernet(0xf, &(0x7f0000000040)={@broadcast, @link_local, @val={@void}, {@llc_tr={0x11, {@llc={0x0, 0x0, 't'}}}}}, 0x0) [ 292.199862][ T9773] ath9k_htc 4-1:1.0: ath9k_htc: Target is unresponsive [ 292.207540][ T9773] ath9k_htc: Failed to initialize the device [ 292.230202][ T2989] usb 5-1: new high-speed USB device number 4 using dummy_hcd [ 292.270273][ T9541] usb 4-1: ath9k_htc: USB layer deinitialized [ 292.287571][ T7] usb 3-1: USB disconnect, device number 5 02:57:58 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000200)={@multicast, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "aa83b7", 0x8, 0x2c, 0x0, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {[@hopopts]}}}}}, 0x0) 02:57:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 02:57:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x18, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 292.390148][ T5] usb 6-1: new high-speed USB device number 6 using dummy_hcd 02:57:58 executing program 1: syz_usb_connect(0x0, 0x36, &(0x7f0000000800)={{0x12, 0x1, 0x0, 0x88, 0xd, 0xf6, 0x20, 0x1fb9, 0x202, 0x8df6, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x5f, 0x16, 0xc4, 0x0, [], [{{0x9, 0x5, 0x0, 0x0, 0x3bf}}, {}]}}]}}]}}, 0x0) [ 292.475520][ T2989] usb 5-1: Using ep0 maxpacket: 16 [ 292.639890][ T5] usb 6-1: Using ep0 maxpacket: 8 [ 292.770798][ T5] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 292.799896][ T2989] usb 5-1: New USB device found, idVendor=0411, idProduct=0158, bcdDevice=5b.7e [ 292.809333][ T2989] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 292.825159][ T2989] usb 5-1: Product: syz [ 292.829334][ T2989] usb 5-1: Manufacturer: syz [ 292.836054][ T2989] usb 5-1: SerialNumber: syz [ 292.846555][ T2989] usb 5-1: config 0 descriptor?? [ 292.856137][ T7] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 292.979974][ T5] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 293.003836][ T5] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 293.036144][ T5] usb 6-1: Product: syz [ 293.042157][ T5] usb 6-1: Manufacturer: syz [ 293.067928][ T5] usb 6-1: SerialNumber: syz [ 293.099946][ T7] usb 2-1: Using ep0 maxpacket: 32 [ 293.103610][T12389] udc-core: couldn't find an available UDC or it's busy [ 293.117615][T12389] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 293.125979][T12395] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 293.136223][ T9731] usb 5-1: USB disconnect, device number 4 [ 293.250323][ T7] usb 2-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 293.260997][ T7] usb 2-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 293.368025][T12395] udc-core: couldn't find an available UDC or it's busy [ 293.375030][T12395] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 293.423331][ T5] usb 6-1: USB disconnect, device number 6 [ 293.480140][ T7] usb 2-1: New USB device found, idVendor=1fb9, idProduct=0202, bcdDevice=8d.f6 [ 293.489232][ T7] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 293.500063][ T7] usb 2-1: Product: syz [ 293.504238][ T7] usb 2-1: Manufacturer: syz [ 293.508860][ T7] usb 2-1: SerialNumber: syz [ 293.516818][ T7] usb 2-1: config 0 descriptor?? [ 293.571453][ T7] cp210x 2-1:0.0: cp210x converter detected [ 293.800036][ T7] cp210x 2-1:0.0: failed to get vendor val 0x370b size 1: -71 [ 293.807551][ T7] cp210x 2-1:0.0: querying part number failed [ 293.849991][ T7] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 293.857787][ T7] cp210x: probe of ttyUSB0 failed with error -71 [ 293.870457][ T7] usb 2-1: USB disconnect, device number 6 [ 293.877804][ T7] cp210x 2-1:0.0: device disconnected [ 293.929784][ T2989] usb 5-1: new high-speed USB device number 5 using dummy_hcd [ 294.179774][ T5] usb 6-1: new high-speed USB device number 7 using dummy_hcd [ 294.199850][ T2989] usb 5-1: Using ep0 maxpacket: 16 [ 294.439776][ T5] usb 6-1: Using ep0 maxpacket: 8 [ 294.520404][ T2989] usb 5-1: New USB device found, idVendor=0411, idProduct=0158, bcdDevice=5b.7e [ 294.529538][ T2989] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 294.539535][ T2989] usb 5-1: Product: syz [ 294.546083][ T2989] usb 5-1: Manufacturer: syz [ 294.551516][ T2989] usb 5-1: SerialNumber: syz [ 294.565388][ T2989] usb 5-1: config 0 descriptor?? [ 294.571621][ T7] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 294.600561][ T5] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 294.800397][ T5] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 294.809496][ T5] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 294.818800][ T5] usb 6-1: Product: syz [ 294.823927][ T5] usb 6-1: Manufacturer: syz [ 294.828526][ T5] usb 6-1: SerialNumber: syz [ 294.834674][ T7] usb 2-1: Using ep0 maxpacket: 32 [ 294.841244][T12509] udc-core: couldn't find an available UDC or it's busy [ 294.848233][T12509] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 294.866619][ T9773] usb 5-1: USB disconnect, device number 5 [ 294.890809][T12395] raw-gadget gadget: fail, usb_ep_enable returned -22 02:58:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x47e3, &(0x7f00000001c0)=0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/shm\x00', 0x0, 0x0) io_submit(r1, 0x2, &(0x7f0000000300)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r3}]) 02:58:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2c, 0x1, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}]}]}, 0x2c}}, 0x0) 02:58:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) 02:58:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x30, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:00 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x12f}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 294.992898][ T7] usb 2-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 295.004299][ T5] usb 6-1: USB disconnect, device number 7 [ 295.032821][ T7] usb 2-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping 02:58:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) 02:58:00 executing program 2: fanotify_mark(0xffffffffffffffff, 0x2, 0x40000000, 0xffffffffffffffff, 0x0) 02:58:00 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0xa, [@const, @typedef, @var, @struct={0x0, 0x4, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}]}, @enum, @struct={0x0, 0x9, 0x0, 0x4, 0x0, 0x0, [{0xa, 0x4}, {}, {0x0, 0x0, 0x61a}, {}, {}, {}, {}, {}, {}]}, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], "7f"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x156}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 02:58:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x28, 0x2, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_MASK={0x8}]}]}, 0x28}}, 0x0) 02:58:01 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 295.270247][ T7] usb 2-1: New USB device found, idVendor=1fb9, idProduct=0202, bcdDevice=8d.f6 [ 295.279332][ T7] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 295.323844][ T7] usb 2-1: Product: syz [ 295.342680][ T7] usb 2-1: Manufacturer: syz [ 295.353491][ T7] usb 2-1: SerialNumber: syz [ 295.370470][ T7] usb 2-1: config 0 descriptor?? [ 295.421068][ T7] cp210x 2-1:0.0: cp210x converter detected 02:58:01 executing program 1: migrate_pages(0x0, 0x2b00, &(0x7f0000000180), &(0x7f00000001c0)=0x6085) 02:58:01 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000002cc0)={&(0x7f00000001c0)={0xa, 0x4e23, 0x0, @empty}, 0x1c, &(0x7f00000002c0)=[{0x0}, {&(0x7f0000000280)='Z', 0x1}], 0x2}, 0x0) 02:58:01 executing program 3: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) io_submit(r0, 0x1, &(0x7f00000015c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x4}]) 02:58:01 executing program 4: timer_create(0x3, 0x0, &(0x7f0000001900)) clock_gettime(0x0, &(0x7f0000001980)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000019c0)={{}, {0x0, r0+60000000}}, 0x0) 02:58:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:01 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000100)={@local, @local, @val, {@ipv6}}, 0x0) [ 295.567731][ T7] cp210x 2-1:0.0: failed to get vendor val 0x370b size 1: -71 [ 295.586416][ T7] cp210x 2-1:0.0: querying part number failed 02:58:01 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000001080)='ns/user\x00') ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, 0x0) 02:58:01 executing program 1: msgsnd(0x0, &(0x7f0000000040)={0x2, "84429e1489f1e9426710b0f940b1ad0af415e53af25d5c7743f5fc0bf6350c1a83efbc1feb59611d4a4a9c1e68ae52bbee49d3129a5422b629fa29c62d5757e5101b5ebb6a9d327ce247e04e511b17241c518b136e1a843dc90edd064dd79334234f0a4514950f5ad25b1364d9c171e12cf2ff02e49efeaa2484880f5dde54cc5e068d978f0bd20ea3a7f297b5c529468dc7775938280e3ca0fc574875171bed3fea80dddc5b2d8d0a2220c8d46ce61000aba075dcbe0e7ecb458bfaa60f09e6da58dd5e601ee3fc02248d115374dc5e9ad3dc5879f54337f94b37ecb28c42b500d2dbabe668c8b4521db45327d98dc6c08c254cbe307267a670a811004cfc84248d55979c06164426a2b5b2d57860bb54e28a0dc97dc83e9b818691e2bde72e6f6439342f354cf477c569a74231c9b405c4ffde0c32bfdbcfff4651d69f34ffcc16beb4d24e8e0371222ab4f210afe5fd937b3b5e8710f5b24257adf9246ef99e4bccbbc4f5e76f692a596705c7d4d8b61ffaa5570a9dbaa73ce90d73de930f1f496c80041710a6968e50a1c1f4cb1439210aee43bf56a0383095c6b72ecd1d0156c5f220fddeb6ae1fe59159c21e8cabaecab814494761eb27b9db2676ba4852ab5b52ce9c661dcd7705a7fec6097e4fcd1aad4f52ba815f2767e429c529a2f583add8a6f1238f26a32edb5a0d8e1e77f56249fac7772e80d1fbab95a7f0c3508b82345a1bf6435e765bac86f8430e043043fbcb644cf169bf1e7d86013a64cd81903f497b58bce63eb8d7ade8080fa319e95095cb2da0902ab8fad4759642db2ace2abdbba185d691819bd3de812476bb7c422d838efa1c9ef0aa1bd67d34279ba8042c48ca7805623b975fa72e620e8485bf18206d2b6565354f9d12e158c8723fe6ffb828e705435b52bbc6998258f25c06d426cd39a0bf547ef918d9db2f98dd758b753b39e7187ee6e1cf53ea6e8d69340ca43ba7c58c263368edf641dbb5f4de4e24a31abcfe8c929c9857e63b52ad3ff0cd478aa15587628653926784dc64a9b822605e2951bf1da9530bb6696ddde601b52ec48c7deba3f275face09f8d23fa527548151a19acf187cb8f06ff0005ff3699ac289e97102bb90df1d67e18ea31aaf614f15f6d172f1635fd438aad909358db251081e2a6a63ef9e08e27fc4d0b85d7f80bd457edfd4623c56cf00778d5b302248f67ea282e7cf63a5b2cb52184843c8b59cd150c5237b91d216b1a97182f48665fa8cf41d5546d59ec647b8b4f46415e4f0ce0d788166c7e71cc7514c18bf94f7e74b9431f2f0c5669816a72e54632a3e5bcb74478ea8fdd66eaad33cfd9c6aee7c3ec5780a4fc8f1363b482e29f414a4d21ef32cfa3dc5ac61d65b4be9ebde4a57a60cff702fa7772fa7d2b1560073dd19f2f748575167cb898fcba86822c2998ebe18774c77700c0c2f5ffde3df6cdce3710f45651001a57cd4b0e788ed8840a90a7cc146d2c50a9bcb43cffb5986673a8f9170c8c40e2eea818edef5d530c0777ddafa371a055558e68380fb591dd9f436f98477f20e15fd44c9bf972f8c0051b8f11487c4268ce15235d1a9527380bf512b297a2ade67d5f5c71e7c95353274bb4ed7c75de05e53a7f1f3eddbb16da3b263a1065d5579b7b0984e802205a50fa8c9e1ed17a9a212ebf20e07ba456a8968e7681073153c211458d4b2e35d46dd4b768f1e0cdc257216afff84c7147050b7d6242039b2d775bbfb614f961f790a076e913edc958d1fa0bc5a0411d2e48eb2f9c8c50ab200698caea7d8243a149d6e70f061312c96636604571ea448a9b10da5fa469f61de9a76636ba21e87316809a477325c52dd5b71b3fe0b2c08453f359c19599db9005d490a339d43e427bdc1f117c35b2c920b4f2a470056335a12369a844e42d16fc236cc8436291da957e0d9ecfa72c0180dd0836fe6ecb1dda2eb880a913fb5957de2b1283b4315fd693054e7b9594745496499e1cddde54a29452d403b263219082db026809f2cb98bce1cc790a46637f87c8150ab00a3c2eb8e889e43296d78a389784d3f29023be92bebcf387418c707742ca1187a98fa172e11990bafdef3d61b8832f40b2d0ffd44d52c6bf5d7781e2e70f0c6647b0f481780eff705c3b25571ecd5199809ba3023e4ebb88b704a1711bb030a026296e012b6ff985f089a4137a302f38992c5e87786b0490e90971ae2a48d60b7c3594f5c369db4f809b3b4b7bc9ce9ea775fec4b340d490014e8a730fb61341021fd19b40a49682a26b622d6f89356c2efc1182aaee6fbbe4fdd9e2233b063a206001b66253ffdfc183decbdb70c5d6f2d5ae81eaccedc564a5161c0b2ad82c1aa508cfaa01dacc78832c6d8428eb6fe9e5cc70440655a407b8aff8badac7f9d7821ef855394b99fb9647cc23b18803800f47bdca210626ab64fcad95b21a0b2aac18d155565f916dbeebdcf93a9374dad0db56606d8f7ec0d319ac70e750da578d1c160e5db89c16f8f29b77cf012cb0a8bb811f96d06a0a8d69e4780f48f5e039323178cf45ecdc7925e70e56de6684840e156a2d40c75847ab1f03627c908f9e37cbf9ca6e9fce506531543f3247f30ce60beed747b4a8628547011c1aebcce0612e513fa17fb017e7555d8d3856f25be6c8aa56c7a95c18a1d272d16389f6ca1cfbe24f4865d9de953028ed6ceead46f0ac0dd589b4fd974ae9fbcc23965b56c908438066c9556a89a6bf44ff067e967127e126478d95a9382f11f43e5e958b09361888ea72bb03ec0cc0fe3d69d46cf01c9724d077ab7c734003122053215a2e004e6334f17ff33317c029665b5b013f2e1fc0ebf415b255257b060871d97d652e3a641ff2906165f4bee8f143a5f049fde287680f0f9680caa0728f0b68ef51941af3d9773194c5f1795bf1e919aedbf0ee6c4687795cf078b12fee87f625f6ef3f0ae83ea685b9639232b32f617f62851eb079cc1740434c40509589f8f79e5e0ade57a3ffcdb9941452b59b877ff29f7d0cc868845188f3059e3d5e80505d1228a04cb823002c1c029219fcb645518566e6e0316f5b7ccf88fee8d924324cb415f9250a4038d2b6b3ca6acb0c5a1b8c5928106807efed896cd29601165031c1dc77b8f9f8f7c6a7b857506d4ab71db4148844cf7094e60f47c7386dd9d623627086f491fb7a384ec0c8e92338dfdc18dd2c38a9a6860f4e32a85570f063d0e93ffa9d6477422fe95e5675f26795fda924801827bb406a20cf76e2c8d5b4e89f273e1153a55752a47c38860f1aa0ad2bc5112a74ec3e326bb393572c85327021473e0db4466539e9a35494b958c17c674cce79b911c0223a5ae31d1abc8d9570e2d75c80b519ebbb0b418d5622b478bde4eb38623159a221935d58a5d4b9a16b6eb2f9a4d1ba488759e3f4b1e28e75b74f796b350fde1f3f7e8f22999aee014b4fc576ae91d48cc0fecb36dbe60a4e2b9b6daddd6cd57fe3c2ceb637bb7d887ccbfa97c08fff354b169539885d0d18dc18942105029ada39891bd1473757b2f0036cee1e9e15d51eecb4b5e5a4ca8221380a4bf2394654341ae46f447a01d82f9933e59e14203cce8321aec417718bb21f7788230dbf7141dd9cb50b7d60dc06220f02d32b975d2b2f0ce0b735d5d18fc407a5bcd0189755c6ac9ba76948b0eb9f0a12aa682f46028519eeb22db4509ff233322376ab9aa00000000010000006cb6cb10a1a87b4e1134c26b30af67b87f84ad65c1735d48c3d8a5ce635844883b1ce6279f7074b2b7d95367244a0aa8fd7a54a72f1d222f9b7386bead7e97da4b227b811cab931a16231be94090d732ffbc9919dfed520cd1194453fc3746858f9f311ad9b26798446886a3da7ae1cf57994632c2208f24ad943f3b9d8aa2f4170055c44052ea6dcdb9318878c88ed19d6f39e5d6a1ad55e0dc58b8e67e18e981a6d049c3b1bfd180e75bf7b9e958e2157a9abfd8df1b999a12922c51449335839c861711ad46729993df9ffc29b24f09e66de7368119694e2576aba9d59385216c8a9a1370867582ebfcfc47745518e17c7a3b930776d78aada9aef15fead808a8f97b9759684f90b65ae2e0424671436d3847c4a74a88457f6150c77e385a2b619ae8ba379ea40c4b3896786d2a01da4dc334ea83972febed4b1bba4b4d1f1cde56980d83bcbd65e5bf1c4ac5440ba732be0d9e1ece38c848f4c6b11ae7e55f7484a56a7ea902c1e9efa77e44c225d44225542f74d481ce19f2e4ef749197ba8733944d66a904c2ecdf5d6485e616ebadb3a6c22246e256c0e3ca3759dd43cef5da22031f6dbd41944a163e4660d19f5c83a7161bb0fbfe6b4ad6ae927025a2bff7a2becc33cc03edaa18fd22d155bec5add740bf51de0456a853157758b385d8c857c894d208349984d1f752f8a705c52bad2e79b4c724c9df449c65f74fab20d65c7e96d45f0aa599ea250a1b0bd0812a2a568e6d86285b0712b9ee03a992339b6b00397afd79148bd5ad2497359ba6bd67e944adfa0fd505ae2b047ce4f17b7869b7dee3bf8189d86df7c2ca78407df5fb1b00d87e71aa14920400554c4250018d03c62d0bb8224ca38829c0b0c2734360b5196ce06d8bb3247619d267690dda4618c7c66ddb67b852ffc3cdfd41bb69c4c5a4268c5a2180162ffa1d8e120f2e63b17096447848ab8ddcfb603239672fcf52553c5d0572aa235a0e8bdcff670fb910552c3fd785e7464e84ccef71d0765d597db3f464840f24508f61c8bee8f1b9c24ef0e161432948a39f16e956148aee2a2a2c1e9835de211ca449f622bfbe9ef875e9b3e58d77264f103b794dd60eef5fee4a35af7fc0992ef4470cc945dfae3b99306e729dd1ea2eb93f9ea857983cd89d01071908fb043b6c3d0d8f001bd1ed1aa3c823f0bf34ab40aab8a12541d0d86fba2fe50bd14d23801c5d616cb70b712eb66d6d2b37cacde2d85ef53ccb98e66b15bec212052de5cf9a041efbba070800a2b260cfdb7aa3ae74fdc904f5947db76cd3b814fe31c02ac4a74b04f054475cd41179a53d3b627c193a6d68a83ce66d2dfb293865f65320070765f774cdee218e04a5fa385b3e42f3ea51840c7937ba58ed29c62d668a10a9a1329625a5d22eff810e5669ff99e1261c4ff17c3f1f6c52b2ce41a18ecd89b6029709ba4c10700d83de7b00157af9e717ecfce2c1be66322a482fa4b56cb0e1dbd6d17d250a0fea48a1f9566e2b9e1aeacbc1e89e7b6f66345c1cb5cf0d000ffe64562ed8fb2a7c055dc15b107b941fc3e55857e466bf23d862a7c1b786a3e7af7dcdd270498c37def9c5506db21acfc87d37c835a2468dc11207155dd4e8eea9df38b966bb4182fd1bc7eba4889f3ae40fa4876bdfd92ab27ba8bec329353c0eb523c36ea7322a3bb7c95c8a6ef5ab021479e51e75dbee1f14d1ca7aa85829e75b01fc8f591eae7510aa5df82bca2541fe273354e1182c29580eea5c9c5aeb4af8ba59a38e6c98f9b670392b7e552eb0b6b1cafb79ce7d892dbbef6ac6d90ca24ccd12f5889f5b2405d6e77ffbb6f316eaa60ab03076f23939a053ac4c2fd7a3be034ecdb01ea6fd8d67d8d3bd7aabec6b50c8778565586e24e96512ee4458032848143a3ce277b5c58a4182a3f750594f730865d9cd11c7c21c35858cbc315e94c2e65eb95e7e62fa26990d5de604cfd2b4ff5ee4f244161487960000000000"}, 0xfd1, 0x800) [ 295.650092][ T7] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 02:58:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:01 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/132, 0x84}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x2f, 0x0) [ 295.693430][ T7] cp210x: probe of ttyUSB0 failed with error -71 02:58:01 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) io_setup(0x8, &(0x7f0000000100)=0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r1, 0x2, &(0x7f00000012c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) 02:58:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r0, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="66326563de6b7271e799c48c6e0b4e", 0xf}, {&(0x7f0000000480)='{', 0x1}], 0x2, &(0x7f0000000500)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_ttl={{0x14}}], 0x38}}], 0x1, 0x0) [ 295.760395][ T7] usb 2-1: USB disconnect, device number 7 [ 295.767098][ T7] cp210x 2-1:0.0: device disconnected 02:58:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x3, 0x0, 0x0, 0xffffff80}]}) 02:58:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000680)=@ipv6_deladdrlabel={0x38, 0x49, 0x1, 0x0, 0x0, {}, [@IFAL_ADDRESS={0x14, 0x1, @loopback}, @IFAL_LABEL={0x8}]}, 0x38}}, 0x0) 02:58:01 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, 0x0, 0x7) 02:58:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000014c0)={0x3f, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) 02:58:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000001c80)={&(0x7f0000001c00)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) 02:58:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000003680)=[{{&(0x7f0000000000)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000040)="fa6c68c1c2414c42e74be7de02f18e039ac96832d493c2f2405224066dd13be3423370457548b809c05c8bb2d0be83378970885a572113554a33f21518f7e351d3f0180fd27f31aa8325c86b5f7dff97a41b47c2be4379905d51036fd2cf4d82bf43e98366fbe2bc59374f8b5d6b372296e453784e764ba76fd9fbf22bb7", 0x7e}, {&(0x7f0000000280)="73d2e7f9d5a12a", 0x7}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 02:58:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 02:58:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20000040, 0x0, 0x0) 02:58:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 02:58:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:02 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000100)={@link_local, @random="c34c2f25e22f", @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "d139d4", 0x28, 0x6, 0x0, @private1, @local, {[], @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}, 0x0) 02:58:02 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xcd, 0xcd, 0x2, [@const, @typedef, @struct={0x0, 0x4, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}]}, @enum, @ptr, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "7f"}]}}, 0x0, 0xea}, 0x20) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 02:58:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:02 executing program 4: syz_emit_ethernet(0x51, &(0x7f0000000000)={@broadcast, @local, @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @rand_addr, {[@timestamp_prespec={0x44, 0x4, 0x30}]}}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, {[@ra={0x94, 0x4}, @end, @timestamp_addr={0x44, 0x4}]}}, "6695f7"}}}}}, 0x0) 02:58:02 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000200)={@multicast, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "aa83b7", 0x28, 0x0, 0x0, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {[@hopopts={0x0, 0x4, [], [@calipso={0x7, 0x8}, @calipso={0x7, 0x8}, @jumbo, @jumbo]}]}}}}}, 0x0) 02:58:02 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000001b00)='logon\x00', &(0x7f0000001b40)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000001b80)={0x0, "983855598b46bfb0a85fd01cfab795d82c02e9053408f18f8448bff9c22278d4aa671c89329f94f054d851c141e5b3f27211a22bd455940fb32a24de40108881"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r0, 0x0, 0x0) 02:58:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) 02:58:02 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}}}}}}, 0x0) 02:58:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:02 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) 02:58:02 executing program 1: r0 = mq_open(&(0x7f0000000000)='%&:\x00', 0x0, 0x0, 0x0) mq_notify(r0, &(0x7f0000000040)) 02:58:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000980)={0x14, 0x2, 0x7, 0x5}, 0x14}}, 0x0) 02:58:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:02 executing program 2: syz_emit_ethernet(0xa2, &(0x7f0000000080)={@multicast, @broadcast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "95c1b4", 0x6c, 0x11, 0x0, @dev, @local, {[@hopopts], {0x0, 0x0, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "fea60bd616a85114918340606ff1a3267e5ef2a77dc9ca636f1c526ad1193efb", "8ca03e8b74ba0102df5c901716346a7f", {"8f2252d44a6320e89b7433cd8c2806f5", "45915d4b91e7c96f079d05c29db2aab7"}}}}}}}}, 0x0) 02:58:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5}]}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x50}}, 0x0) 02:58:02 executing program 3: syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) 02:58:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x30, 0x0, &(0x7f0000000040)) 02:58:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, 0x1, 0x2, 0x3, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) 02:58:02 executing program 2: syz_emit_ethernet(0xd5, &(0x7f00000000c0)={@local, @broadcast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "5ba375", 0x48, 0x11, 0x0, @local, @mcast2, {[], {0x0, 0x0, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "1fdd97eacb1e6bd40d1b2015ca9ca7cfcff249ec2d59dbdc", "9730dc60f472288b4ddd74f45c4584d0dececadf4cd172047d71d2bdb3fe460a"}}}}}}}, 0x0) 02:58:02 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007ad, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 02:58:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda0602", 0x11}], 0x1) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$netlink(0x10, 0x3, 0x0) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 02:58:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:02 executing program 3: syz_emit_ethernet(0x56, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60d1ee3b00202b000000000000cdb081440e8f13486d08a3fe80"], 0x0) 02:58:02 executing program 5: syz_emit_ethernet(0x76, &(0x7f0000001200)={@local, @local, @val, {@ipv6}}, 0x0) 02:58:03 executing program 2: symlinkat(0x0, 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') mprotect(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x4) 02:58:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:03 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @empty, @val, {@ipv4}}, 0x0) [ 297.208553][T12689] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.1'. 02:58:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x7e, 0x3, 0x5, 0x901, r0, 0x8, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) mkdir(&(0x7f0000000500)='./file0\x00', 0x170) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) utime(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000001900)={0x18, 0x0, 0x0, 0x7c96}) r2 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x11, r2, 0xee00, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280)={r2, 0x27, 0x72}, &(0x7f0000001940)=ANY=[@ANYBLOB="656e633d6f6100726d3634a9f1d4b29126f110000000031a86deab4b331c55ceaa3e1603ce0000080000000000000000a2480000000000000000000000000000000000000000000000000000a7bd50945999cd83018355ff674bdd8d283b43a03cead9c99facbb18d7a97a7632bb4e220c3afaa4df2250b5ccb7b806aec672552c43f4376c6d2d9e3c2220c4b209c2243fcf7b7d6190c10be3dd35262f0c52e70d3d893e8902f7970459b518e4903dc8fff98f46a790783fd38867317be69012834aa7c4295fd713c69cfe40aece65e941068ea128432c68486daf058b0777737cf120f24012246ee060"], &(0x7f00000002c0)="d8ed8e6203dd8833cacd1944a539b88519a73e069af35b59b8c0f347612f52681efae833617e59", &(0x7f0000000440)=""/114) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='./file0\x00') setxattr$trusted_overlay_upper(&(0x7f0000000400)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x1015, 0x0, 0x80, "4ba9b759a6865efe55d01f43c95317ee", "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"}, 0x1015, 0x1) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x0, &(0x7f0000000500), 0x80980a, &(0x7f0000001680)=ANY=[]) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000003c0), 0x4) umount2(&(0x7f00000000c0)='./file0\x00', 0xa) r3 = socket$inet6(0xa, 0x2, 0x0) dup3(r3, r1, 0x0) 02:58:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x4000a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000010000/0x18000)=nil, &(0x7f00000002c0)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0x32}], 0x1, 0x14, 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x5c, 0x1, 0x7, 0x166432af2c2920c6, 0x0, 0x0, {0x115011553bfd5c79, 0x0, 0x7}, [@NFACCT_FILTER={0x24, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x80000001}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x81}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x5}]}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x9}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x900}, 0x20000041) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/69}) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, 0x0) 02:58:03 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f00000000c0)=""/102) 02:58:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:03 executing program 4: io_setup(0x6, &(0x7f0000000240)=0x0) io_cancel(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 02:58:03 executing program 1: io_setup(0x47e3, &(0x7f00000001c0)) io_setup(0x3ff, &(0x7f0000000040)) 02:58:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:03 executing program 2: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa8, 0xa8, 0x4, [@struct={0x0, 0xa, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @enum={0x0, 0x3, 0x0, 0x6, 0x4, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0xc4}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x2c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 02:58:03 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x6}, 0x1c) 02:58:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_OPERSTATE={0x5, 0x10, 0x5}]}, 0x3c}}, 0x0) 02:58:03 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/shm\x00', 0x0, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000001700)='freezer.state\x00', 0x2, 0x0) 02:58:03 executing program 2: io_setup(0x4, &(0x7f0000000140)=0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r0, 0x2, &(0x7f00000005c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, 0x0]) 02:58:03 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x401}, 0x1c) 02:58:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg$inet(r0, &(0x7f00000020c0)=[{{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000140)="911f96203f91fd9fe245a5520872756ce2cf3f566f207331f903dc60bef5584d6b93ea21f5ece6741a92bdafdda90c0c2aae36ed4c783a34dede98acab2d85f2a9dad12110797cf8a913ab24ffbc32", 0x4f}, {&(0x7f00000001c0)="6a904678bfcb8179cf40464936c14fc78e0ee56fdb818658cc04e243b04abefcad214c43ddfdfc9287074fae89b743288807f1cf5a18d4f131748adb9d395a5ee2dfc3f2cbf68ec228a813452f73d9fdca902c807201f616f7c4dfb69dd4ecd7c4a65eaa15f3ad4951665ac21549e6e6", 0x70}, {&(0x7f0000000240)="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", 0xe02}], 0x3}}, {{0x0, 0x0, &(0x7f0000001a00)=[{0x0}, {0x0}, {&(0x7f0000001740)="ff", 0x1}], 0x3}}], 0x2, 0x0) 02:58:04 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/slabinfo\x00', 0x0, 0x0) 02:58:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:04 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000300)={@link_local, @random="c34c2f25e22f", @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cd3501", 0x8, 0x0, 0x0, @empty, @private2, {[@fragment={0x0, 0x0, 0xfd}]}}}}}, 0x0) 02:58:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f00000009c0)={0x0, 0x3f, 0x0}, 0x0) shmget$private(0x0, 0x2000, 0x800, &(0x7f0000ffb000/0x2000)=nil) 02:58:04 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000300)='logon\x00', &(0x7f0000001b40)={'fscrypt:', @auto=[0x66]}, &(0x7f0000000200)={0x0, "9829bf678b46bfb0a85fd01cfab795d82c06e9053408f9c22278d4aa671c89329f94f054d851c141e5b3f27211a22bd455940fb32a24de4010888100"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 02:58:04 executing program 3: add_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) 02:58:04 executing program 2: add_key$fscrypt_v1(&(0x7f0000001b00)='logon\x00', &(0x7f0000001b40)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000001b80)={0x0, "983855598b46bfb0a85fd01cfab795d82c02e9053408f18f8448bff9c22278d4aa671c89329f94f054d851c141e5b3f27211a22bd455940fb32a24de40108881"}, 0x48, 0xfffffffffffffffb) 02:58:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 02:58:04 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x109, 0x109, 0x2, [@const, @typedef, @struct={0x0, 0x4, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}]}, @struct={0x0, 0x4, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}]}, @enum, @ptr, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "7f"}]}}, 0x0, 0x126}, 0x20) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 02:58:04 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0xb, [@const, @typedef, @var, @struct={0x0, 0x4, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}]}, @enum, @struct={0x0, 0x9, 0x0, 0x4, 0x0, 0x0, [{0xa, 0x4, 0x4}, {0x2}, {0x0, 0x4, 0x61a}, {}, {0x0, 0x1}, {}, {}, {0x8, 0x1, 0x2}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "7f"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x16f}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 02:58:04 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0xb, [@ptr, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x4, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}]}, @typedef, @enum, @ptr, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "7f"}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x173, 0x0, 0xffffffff}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x33) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 02:58:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:04 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@broadcast, @random="357247c2cb73", @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@ra={0x94, 0x4, 0x1}]}}, {{0x4e22, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 02:58:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10, 0x0}, 0x0) 02:58:04 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) syz_emit_ethernet(0x15, &(0x7f0000000040)={@broadcast, @link_local, @val={@void}, {@llc_tr={0x11, {@llc={0x0, 0x0, 't'}}}}}, 0x0) 02:58:04 executing program 4: syz_emit_ethernet(0x4e, &(0x7f00000023c0)={@link_local, @random="f313c1b52398", @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "88295d", 0x14, 0x6, 0x0, @ipv4={[], [], @local}, @mcast2, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 02:58:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x1, 0x2, 0x3}, 0x14}}, 0x0) 02:58:04 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000140)={@link_local, @random="c34c2f25e22f", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}}}}}, 0x0) 02:58:04 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000002480)='/dev/nvram\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000080)) 02:58:04 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x4, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) bind$packet(r0, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 02:58:04 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) munlock(&(0x7f000005f000/0x3000)=nil, 0x3000) fcntl$setstatus(r1, 0x4, 0x5c00) io_setup(0x2, &(0x7f00000003c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8000000, 0x3, 0x1, 0x0, r1, &(0x7f0000000200)="2e038696dd2bb01e64597bf826269b4acc38b3e403dce89415534727e659b822d311894e07668907b924974db8ac4e61b2ded12f96cb3c1af8d5bd466545174136e0f16323795a32e41d6865bd14fe637617b9ef0e8b815dd3587d13998584feda27165823e3fe7f8f4dd730a0b9cfc428b34ed7c60b6d7b9f76dc2af526952bbc3f2c7012d5d077fe6a776bf91eab745c15ba3d", 0xffffff46}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x0, 0x2, 0x1, 0x22, 0x0, 0x400000000}, 0x20) r5 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(0xffffffffffffffff, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080025bd7000fddbdf252100000008000300", @ANYRES32=r6, @ANYBLOB="0800000000ffffff"], 0x24}, 0x1, 0x0, 0x0, 0x4001}, 0xc4) 02:58:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x18, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:04 executing program 3: request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0xfffffffffffffffb) 02:58:04 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000140)={@link_local, @random="c34c2f25e22f", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}}}}}, 0x0) 02:58:04 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/crypto\x00', 0x0, 0x0) 02:58:04 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}}, 0x28}}, 0x0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 02:58:04 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000140)={@link_local, @random="c34c2f25e22f", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}}}}}, 0x0) 02:58:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x9, 0x3, 0x3b0, 0x1d8, 0xffffffff, 0xffffffff, 0x1d8, 0xffffffff, 0x2e0, 0xffffffff, 0xffffffff, 0x2e0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x168, 0x1d8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "830b890109796f0752b56f6f2fa13ad1ed765aac53cda783ed47582c5b9743788f4cfc15d9784753cb157f08b5ebf9d765e8da8f71c1925a20e62f62f09d9426ff6ddd43b355dba12549e7f307a81baa5dbb4b409bc5b6082ff041c9424078f2a33f4e68b93d8a0943724dc2f926dc3aaea6c569c6bb4cb46897d9a70fad2cff", 0xe}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a25042c679257c903612d9981d833ad67b1a4bfa3de4d9e5ea432adaf5bdd4abfc556f7d8b660973f2aff1889313a64d49bd6d2fbae34f3523ba6a7fbe9f8379"}}}, {{@uncond, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "14d3"}}]}, @common=@inet=@SET3={0x38, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x410) 02:58:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:05 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc, 0x99, {0x7}}}}, [@mon_options, @mon_options]}, 0x28}}, 0x0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x74, 0x74, 0x5, [@struct={0x0, 0x4, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}]}, @restrict, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x91}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x2c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 02:58:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$packet(r0, 0x0, 0x0) 02:58:05 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000140)={@link_local, @random="c34c2f25e22f", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}}}}}, 0x0) 02:58:05 executing program 5: syz_emit_ethernet(0x5e, &(0x7f00000000c0)={@link_local, @random="efbf44d491aa", @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "f579f5", 0x28, 0x29, 0x0, @ipv4={[], [], @dev}, @ipv4={[], [], @private}, {[@fragment], "1789b6acea60e12db4e01b57ab76244cda8769755c2d102c7ae4b4623eb131c0"}}}}}, 0x0) [ 299.253941][T12831] x_tables: duplicate underflow at hook 3 02:58:05 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @random="357247c2cb73", @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @dev}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 02:58:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:05 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) 02:58:05 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/shm\x00', 0x0, 0x0) 02:58:05 executing program 5: clone(0x4100100, 0x0, &(0x7f0000000640), 0x0, &(0x7f00000006c0)="11") 02:58:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan1\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x10, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0xffff3bae}}]}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x5c}}, 0x0) 02:58:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x0, {0x0, 0x0, 0x1}}) 02:58:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000004c0)=""/187) 02:58:05 executing program 4: syz_emit_ethernet(0x9e, &(0x7f0000000240)={@link_local, @random="c34c2f25e22f", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x68, 0x3a, 0x0, @dev, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "bea0af", 0x0, 0x0, 0x0, @ipv4={[], [], @remote}, @private1, [@hopopts={0x0, 0x0, [], [@jumbo]}], "14e1c120f39eec6bddf85d4d7c986e43f5b4272191e983ef88d6414b292b5cf3fb28477efeba6bd3"}}}}}}}, 0x0) 02:58:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x308, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x238, 0xffffffff, 0xffffffff, 0x238, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@unspec=@cluster={{0x30, 'cluster\x00'}}]}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@uncond, 0x0, 0xd0, 0x138, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "14d3"}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 299.700206][T12873] x_tables: duplicate underflow at hook 3 02:58:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:05 executing program 3: timer_create(0x0, &(0x7f0000001340)={0x0, 0x3b, 0x0, @thr={0x0, 0x0}}, &(0x7f0000001380)) 02:58:05 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)) 02:58:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000840)={0x4c}, 0x14}}, 0x0) 02:58:05 executing program 4: r0 = getpid() sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@setlink={0x34, 0x13, 0x0, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_vlan\x00'}]}, 0x34}}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x2, [@restrict, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @const, @struct={0xc, 0x2, 0x0, 0x4, 0x0, 0x0, [{0x2, 0x3}, {0x3, 0x0, 0x70}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x0, 0x0, 0x3}]}}, 0x0, 0x92}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x29) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 02:58:05 executing program 1: mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) 02:58:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x1) 02:58:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:05 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x2c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 02:58:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x48811, &(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @dev}, 0x80) 02:58:05 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x410002, 0x0) write$tun(r0, &(0x7f0000000140)={@void, @val, @mpls={[{}], @ipv6=@tcp={0x0, 0x6, '\x00', 0x111, 0x6, 0x0, @rand_addr=' \x01\x00', @dev, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x7, 0xf989, "971e042b"}, @md5sig={0x13, 0x12, "86375ea02387201a52427208ed1de7f3"}]}}, {"ccaa0a0666a9f14335d8c60a5d112e2973faa3f76b2edbe2248036f563721822077e8f867ce2df3a1c95b91384a1ed54d1b05f01e3b2ba5d82b39203b11e6784f9c6296ff86eefa5dc064107ef1766bbfcd018dcd28bce66b8a7d12b80c0428d613aeeef6d5b12d3e99de1c5a4a61281f2fabbc41285eec31f49e68db8165a314ccd2d2ce13790b6e66d8693744287cc9d76a6adf76a24ffac59cadfb9b71a9c4766a73c4d95bbff4219bd78972a9a16e3e1eb2e3146e91b7ed9fc9bf8c349ed011af044b7fb9d761ccaa049e6b5274ae17083bb33af3d6efca59f98172e69a0b7"}}}}}}, 0xfffffda6) 02:58:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4040090) 02:58:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x4, 0x8, 0x401}, 0x14}}, 0x0) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x3}, &(0x7f0000000180)={0x9}, 0x0, 0x0) 02:58:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f00000000c0)=@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@private2]}, 0x18) 02:58:06 executing program 5: inotify_add_watch(0xffffffffffffffff, 0x0, 0x9) 02:58:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, &(0x7f0000000200)) 02:58:06 executing program 3: r0 = mq_open(&(0x7f0000000200)='%&:\x00', 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000280)=""/170, 0xaa, 0x0, &(0x7f0000000340)={0x0, 0x3938700}) 02:58:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:06 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000300)={@multicast, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "aa83b7", 0x28, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1, {[@hopopts={0x0, 0x3, [], [@calipso={0x7, 0x8}, @calipso={0x7, 0x8}, @generic={0x80}, @enc_lim]}]}}}}}, 0x0) 02:58:06 executing program 1: syz_emit_ethernet(0x46, &(0x7f00000010c0)={@link_local, @random="f313c1b52398", @val={@void, {0x8100, 0x0, 0x1}}, {@ipv6={0x86dd, @generic={0x0, 0x6, "17063f", 0xc, 0x0, 0x0, @dev, @private1, {[@hopopts={0x2f}], "b08f55f9"}}}}}, 0x0) 02:58:06 executing program 2: clone(0x10b00, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 02:58:06 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/key-users\x00', 0x0, 0x0) 02:58:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x9, 0x3, 0x3b0, 0x1d8, 0xffffffff, 0xffffffff, 0x1d8, 0xffffffff, 0x2e0, 0xffffffff, 0xffffffff, 0x2e0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x168, 0x1d8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "830b890109796f0752b56f6f2fa13ad1ed765aac53cda783ed47582c5b9743788f4cfc15d9784753cb157f08b5ebf9d765e8da8f71c1925a20e62f62f09d9426ff6ddd43b355dba12549e7f307a81baa5dbb4b409bc5b6082ff041c9424078f2a33f4e68b93d8a0943724dc2f926dc3aaea6c569c6bb4cb46897d9a70fad2cff"}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a25042c679257c903612d9981d833ad67b1a4bfa3de4d9e5ea432adaf5bdd4abfc556f7d8b660973f2aff1889313a64d49bd6d2fbae34f3523ba6a7fbe9f8379"}}}, {{@uncond, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "14d3"}}]}, @common=@inet=@SET3={0x38, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x410) 02:58:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0xc0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:06 executing program 5: socket(0x1, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x8}, &(0x7f00000000c0)={0x7}, 0x0, 0x0) 02:58:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c, 0x0}, 0x0) 02:58:06 executing program 2: socket(0x26, 0x5, 0x519) [ 300.867606][T12951] x_tables: duplicate underflow at hook 3 02:58:06 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local, @multicast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cd3501", 0x8, 0x0, 0x0, @private1, @private2, {[@routing={0x2c, 0x2000037a}]}}}}}, 0x0) 02:58:06 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000300)={@link_local, @random="c34c2f25e22f", @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cd3501", 0x0, 0x0, 0x0, @empty, @private2}}}}, 0x0) 02:58:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:06 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/shm\x00', 0x0, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000001700)='freezer.state\x00', 0x2, 0x0) accept(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x80) setsockopt$packet_int(r1, 0x107, 0x7, 0x0, 0xa) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/shm\x00', 0x0, 0x0) openat$cgroup_freezer_state(r2, &(0x7f0000001700)='freezer.state\x00', 0x2, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\xfa#.^%b', 0xffffffffffffffff) 02:58:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x9, 0x3, 0x3b0, 0x1d8, 0xffffffff, 0xffffffff, 0x1d8, 0xffffffff, 0x2e0, 0xffffffff, 0xffffffff, 0x2e0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x168, 0x1d8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "830b890109796f0752b56f6f2fa13ad1ed765aac53cda783ed47582c5b9743788f4cfc15d9784753cb157f08b5ebf9d765e8da8f71c1925a20e62f62f09d9426ff6ddd43b355dba12549e7f307a81baa5dbb4b409bc5b6082ff041c9424078f2a33f4e68b93d8a0943724dc2f926dc3aaea6c569c6bb4cb46897d9a70fad2cff"}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a25042c679257c903612d9981d833ad67b1a4bfa3de4d9e5ea432adaf5bdd4abfc556f7d8b660973f2aff1889313a64d49bd6d2fbae34f3523ba6a7fbe9f8379"}}}, {{@uncond, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "14d3"}}]}, @common=@inet=@SET3={0x38, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x410) 02:58:06 executing program 4: clock_gettime(0x9abcbc4adcc0a774, 0x0) 02:58:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000010c0)=@filter={'filter\x00', 0xe, 0x4, 0x2f8, 0x188, 0x1c8, 0x1c8, 0x0, 0xf0, 0x240, 0x260, 0x260, 0x260, 0x240, 0x4, 0x0, {[{{@ip={@loopback, @private, 0x0, 0x0, 'gretap0\x00', 'vlan1\x00', {}, {}, 0x33}, 0x0, 0x108, 0x130, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@unspec=@physdev={{0x68, 'physdev\x00'}, {'syzkaller0\x00', {}, 'syzkaller0\x00', {}, 0x0, 0x15}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x358) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp6\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x210000000013, &(0x7f00000007c0)=0x100000001, 0x4) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) read$FUSE(r1, &(0x7f0000001440)={0x2020}, 0x2020) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x40004007fff, 0x32fe3cf2}, 0x14) sendfile(r2, r1, 0x0, 0x10000edbe) [ 301.072183][T12962] x_tables: duplicate underflow at hook 3 02:58:06 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) io_setup(0x8, &(0x7f0000000000)=0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r1, 0x2, &(0x7f0000000240)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x0, r2, &(0x7f0000000100)="02e7a580f217063dc134813fa0a7429b", 0x10}]) 02:58:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x48811, &(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x31}}, 0x80) 02:58:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x9, 0x3, 0x3b0, 0x1d8, 0xffffffff, 0xffffffff, 0x1d8, 0xffffffff, 0x2e0, 0xffffffff, 0xffffffff, 0x2e0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x168, 0x1d8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "830b890109796f0752b56f6f2fa13ad1ed765aac53cda783ed47582c5b9743788f4cfc15d9784753cb157f08b5ebf9d765e8da8f71c1925a20e62f62f09d9426ff6ddd43b355dba12549e7f307a81baa5dbb4b409bc5b6082ff041c9424078f2a33f4e68b93d8a0943724dc2f926dc3aaea6c569c6bb4cb46897d9a70fad2cff"}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a25042c679257c903612d9981d833ad67b1a4bfa3de4d9e5ea432adaf5bdd4abfc556f7d8b660973f2aff1889313a64d49bd6d2fbae34f3523ba6a7fbe9f8379"}}}, {{@uncond, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "14d3"}}]}, @common=@inet=@SET3={0x38, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x410) 02:58:07 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000002c0)={0x0, @l2tp={0x2, 0x0, @multicast2}, @can, @xdp, 0x45e, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)='macsec0\x00'}) [ 301.226355][T12972] x_tables: duplicate underflow at hook 2 [ 301.281683][T12972] x_tables: duplicate underflow at hook 2 [ 301.296219][T12982] x_tables: duplicate underflow at hook 3 02:58:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:07 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) mlock(&(0x7f0000ff7000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 02:58:07 executing program 2: request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='-\x00', 0x0) 02:58:07 executing program 1: r0 = mq_open(&(0x7f0000000000)='%&:\x00', 0x1, 0x0, 0x0) mq_timedreceive(r0, 0x0, 0x0, 0x0, 0x0) 02:58:07 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000016c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0x3}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 02:58:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x9, 0x3, 0x3b0, 0x1d8, 0xffffffff, 0xffffffff, 0x1d8, 0xffffffff, 0x2e0, 0xffffffff, 0xffffffff, 0x2e0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x168, 0x1d8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "830b890109796f0752b56f6f2fa13ad1ed765aac53cda783ed47582c5b9743788f4cfc15d9784753cb157f08b5ebf9d765e8da8f71c1925a20e62f62f09d9426ff6ddd43b355dba12549e7f307a81baa5dbb4b409bc5b6082ff041c9424078f2a33f4e68b93d8a0943724dc2f926dc3aaea6c569c6bb4cb46897d9a70fad2cff"}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "a25042c679257c903612d9981d833ad67b1a4bfa3de4d9e5ea432adaf5bdd4abfc556f7d8b660973f2aff1889313a64d49bd6d2fbae34f3523ba6a7fbe9f8379"}}}, {{@uncond, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "14d3"}}]}, @common=@inet=@SET3={0x38, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x410) 02:58:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 301.532538][T12995] x_tables: duplicate underflow at hook 3 02:58:07 executing program 4: mlock(&(0x7f0000efc000/0x3000)=nil, 0x3000) mremap(&(0x7f0000fb0000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000c39000/0x3000)=nil) 02:58:07 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x142, 0x0) write$tun(r0, 0x0, 0x0) 02:58:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x2, 0x0, &(0x7f0000000040)) 02:58:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10}, 0x10) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000002fe8)=[{0x35}]}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:58:07 executing program 3: migrate_pages(0x0, 0x6, &(0x7f0000000000)=0x6, &(0x7f0000000040)=0x8001) 02:58:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x20044071, 0x0, 0x0) 02:58:07 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@link_local, @random="c34c2f25e22f", @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cd3501", 0x8, 0x0, 0x0, @empty, @private2, {[@fragment={0x33}]}}}}}, 0x0) 02:58:07 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000001100), 0x4) 02:58:07 executing program 3: syz_emit_ethernet(0x17e, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x148, 0x3a, 0x0, @dev, @mcast2, {[@dstopts={0x0, 0x4, [], [@calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x0, [0x0, 0x0, 0x0]}}]}, @hopopts={0x0, 0x1e, [], [@generic={0x0, 0x75, "9b24397b231c4ffa225f462228934880a74b98ab0ce9f28eff66ab7cb7db770b40ac3fc7c38a74365cde2abc8b3e94fd4b18a527941e5dad1616a92c12ad132e49ce820cf8b35f952ab60b4b889d662503f589c97dade1952d871340541332c391f16bd6f7067bdf7e2aac95d7ac012b805ea79e59"}, @pad1, @ra, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}, @generic={0x0, 0x5f, "dabaaebebb07ed70f7b6f5a035ca2aad4584188df07e13969454dd663fe0929e434d6c5e193cdd8710b835945e56f4778480bfff5fbcb6df43abc583ed1243148dae2d022323bcd4cddd1969e156a081c42796f247cf4ec8595517a9fa8a37"}]}], @mld={0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}}}, 0x0) 02:58:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:07 executing program 5: clone(0x10b00, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x1) 02:58:07 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @random="efbf44d491aa", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "7f5b78", 0x14, 0x11, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}], {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}}, 0x0) 02:58:07 executing program 1: syz_emit_ethernet(0x68, &(0x7f0000000240)={@link_local, @random="c34c2f25e22f", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x32, 0x3a, 0x0, @dev, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "bea0af", 0x0, 0x0, 0x0, @ipv4={[], [], @remote}, @private1, [], "14e1"}}}}}}}, 0x0) 02:58:07 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00'}) 02:58:07 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}, [@mon_options]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, 0x0, 0x0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x2c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 02:58:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x9, 0x3, 0x2d8, 0x140, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x208, 0xffffffff, 0xffffffff, 0x208, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xe0, 0x140, 0x0, {}, [@common=@unspec=@devgroup={{0x38, 'devgroup\x00'}, {0x1}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@mcast2}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) 02:58:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x308, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x238, 0xffffffff, 0xffffffff, 0x238, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@unspec=@cluster={{0x30, 'cluster\x00'}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{}, {0x0, 0x0, 0x2}}}}, {{@uncond, 0x0, 0xd0, 0x138, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "14d3"}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 02:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)="c9f6f95e0c61a47fbd099a35b1498379", 0x10}], 0x1}, 0x0) 02:58:07 executing program 2: syz_emit_ethernet(0x5a, &(0x7f0000000280)={@broadcast, @random="f313c1b52398", @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "17063f", 0x20, 0x0, 0x0, @dev, @private1, {[@hopopts={0x0, 0x2, [], [@hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}]}}}}}, 0x0) [ 302.215263][T13052] x_tables: duplicate underflow at hook 3 [ 302.230359][T13054] x_tables: duplicate underflow at hook 3 02:58:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x47e3, &(0x7f00000001c0)=0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) io_submit(r1, 0x2, &(0x7f0000000300)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}]) 02:58:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:08 executing program 1: io_setup(0x5, &(0x7f0000000000)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) io_getevents(r0, 0x3, 0x3, &(0x7f0000000080)=[{}, {}, {}], &(0x7f00000001c0)={0x0, r1+60000000}) 02:58:08 executing program 5: prlimit64(0x0, 0x1bc3df697e93a711, 0x0, 0x0) 02:58:08 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1f) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 02:58:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000040)={'macvlan0\x00', @ifru_hwaddr=@dev}) 02:58:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:08 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eefffffffffffff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000bc0)=@newqdisc={0x148, 0x24, 0xe09, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "d277f96b0226e704b186e57e690c84da78c60bf175b2f327d2bd85ee43637608dcdef7ea93edfad1d87df851643906f3d824a342f8c3e9a63618d304228a31f391c7e2fed2f607b5b6e075a3eb3fe38d28d3e145172b92f67a722f0796784134938879aeb0deeb0c2e9936df0f4f219b69c0e8569590a3dbdd91b6ea849297b55ba61e015485743f9263df385744d2ef1ce1c5cdf65f610177b0bd91f74f33dc99542ed995e5552b37d178049ca15884fbc555904f951898a54647c091758f29c38bcad01e8fcaccebf9c2699350b87c3d5cdda727c4422a5690d79f382ae37e3a413654fb8c63f448bef317124aa36dfc4e32f1206f93163d869b04ddc05541"}, @TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0xfc}}]}}]}, 0x148}}, 0x0) 02:58:08 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x2c}}, 0x0) 02:58:08 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:58:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x16, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@broadcast}}]}, 0x50}}, 0x0) 02:58:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xc5) [ 302.601230][T13078] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 02:58:08 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 302.688661][T13083] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 02:58:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x13, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x38}}, 0x0) 02:58:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x16, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@broadcast}}]}, 0x50}}, 0x0) 02:58:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:08 executing program 4: r0 = openat$ptmx(0xffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001340)) 02:58:08 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:58:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x148}}, 0x0) 02:58:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x16, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@broadcast}}]}, 0x50}}, 0x0) 02:58:08 executing program 1: socketpair(0x1, 0x805, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) 02:58:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:08 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:58:08 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020f"], 0x148}}, 0x0) 02:58:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a010002"], 0x10}}, 0x0) 02:58:09 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 02:58:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x16, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in=@broadcast}}]}, 0x50}}, 0x0) 02:58:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x80800) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'veth0_to_bridge\x00', @ifru_hwaddr=@dev}) 02:58:09 executing program 4: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0xffffffff, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}) 02:58:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@mcast1, @in=@loopback}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}]}, 0xa0}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2, 0xf, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@local}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}]}, 0xa0}}, 0x0) [ 303.356833][T13130] veth0_to_bridge: mtu less than device minimum 02:58:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x5d}}, 0x0) 02:58:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:09 executing program 1: clone(0x247ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) exit(0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) 02:58:09 executing program 2: socketpair(0x1, 0x805, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) 02:58:09 executing program 4: ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'veth0_to_bridge\x00', @ifru_hwaddr=@dev}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)) 02:58:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x2, 0x7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x1, 0x0, 0x0, 0x70bd2b, 0x3505}, @sadb_spirange={0x2, 0x10, 0x4d2}]}, 0x30}}, 0x4000010) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0xb, 0x0, 0x7, 0x2}, 0x10}}, 0x0) 02:58:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)={0x2, 0x6, 0x0, 0x0, 0x3}, 0x18}}, 0x0) 02:58:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:09 executing program 2: clone(0x291a02e68911c973, 0x0, 0x0, 0x0, 0x0) 02:58:09 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@ipv4={[], [], @multicast1}, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@remote}, 0x0, @in=@private}}, 0xe4) syz_emit_ethernet(0x3e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60a0f00000083a"], 0x0) 02:58:09 executing program 5: socketpair(0x2, 0xa, 0x0, 0x0) 02:58:09 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0x6, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:58:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:09 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:58:10 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000500)={0x0, 0xffffffffffffff84, &(0x7f00000004c0)={0x0}}, 0x4004054) 02:58:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001440)={0x2, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2}]}, 0x20}}, 0x0) 02:58:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:10 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="480100002400090dffffffdf0000000000000000", @ANYRES32, @ANYBLOB="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"], 0x148}}, 0x0) 02:58:10 executing program 2: sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x2, 0x7, 0x0, 0x0, 0x3, 0x0, 0x70bd2d, 0x25dfdbfd, [@sadb_x_nat_t_port={0x1, 0x16}]}, 0x18}}, 0x4000010) 02:58:10 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x2, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:58:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000002200)=@ipv4_newroute={0x24, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x4}]}, 0x24}}, 0x0) 02:58:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x20c, 0x0, 0x94, 0x354, 0x94, 0x354, 0x354, 0x354, 0x354, 0x354, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x94}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0x70, 0x94}, @inet=@DSCP={0x24, 'DSCP\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'veth1\x00', 'rose0\x00', {}, {}, 0x11}, 0x0, 0xc0, 0xe4, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}]}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "6e912f17d1d947fcaac90ee5f09a2c91533fd661512e9b295e60072012eb"}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x2}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x444) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x10, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) 02:58:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)=@newsa={0x140, 0x10, 0x22d, 0x0, 0x0, {{@in=@loopback, @in=@local}, {@in6=@loopback, 0x0, 0x33}, @in6=@private0, {}, {}, {}, 0x0, 0x0, 0x2}, [@lastused={0xc, 0xf, 0x5}, @algo_auth={0x48, 0x1, {{'sha1\x00'}}}]}, 0x140}}, 0x0) 02:58:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) 02:58:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'lo\x00', @ifru_hwaddr=@dev}) 02:58:10 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f0000000240)) [ 304.930816][T13260] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.5'. 02:58:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000040)={'veth0_to_bridge\x00', @ifru_hwaddr=@dev}) 02:58:11 executing program 2: sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$batadv(0x0) sendmsg$key(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x2, 0x7, 0x0, 0x8, 0x2}, 0x10}}, 0x0) 02:58:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020ffb0829"], 0x148}}, 0x0) 02:58:11 executing program 3: fanotify_mark(0xffffffffffffffff, 0x2a, 0x2, 0xffffffffffffffff, 0x0) 02:58:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02061a110200000000000010"], 0x10}}, 0x0) 02:58:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000040)={'veth0_macvtap\x00', @ifru_hwaddr=@dev}) 02:58:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:11 executing program 3: socketpair(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) 02:58:11 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) 02:58:11 executing program 4: clone(0x291a02e6c3b4cd73, 0x0, 0x0, 0x0, 0x0) 02:58:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) openat$nvram(0xffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'veth0_to_bridge\x00', @ifru_hwaddr=@dev}) 02:58:11 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001e005f03142b0200000000000000b3586cf606c2e553797c080008ff67dc0000", 0x24) [ 305.871450][T13313] veth0_to_bridge: mtu less than device minimum [ 305.883401][T13311] IPVS: ftp: loaded support on port[0] = 21 02:58:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.cpus\x00', 0x2, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)='0', 0x1}, {&(0x7f0000000140), 0x2c}], 0x8) 02:58:11 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eefffffffffffff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000bc0)=@newqdisc={0x148, 0x24, 0xe09, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_PARMS={0x14, 0x1, {0xffff88d2}}]}}]}, 0x148}}, 0x0) 02:58:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x18, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020700ec02"], 0x10}}, 0x0) 02:58:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r1, r0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @multicast1}, 0x10) syz_emit_ethernet(0xbe, &(0x7f0000000280)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @broadcast=0xe0000001}, {0x0, 0x4e22, 0x4d, 0x0, @wg=@initiation={0x1, 0x0, "6f59ba5f4a67033ddeb6c19bd92b7168378e0fdf6f477fac11a1e745edc17c32", "a967527858e47f4e0c92629775a3cca55301abe491296a1509010020ced8af8be413ceb4553174d4780e817ba7310ac2", "f731a1d9f9be474794588eab658fbe595c2a1610ece33d214735aabf", {"77cc5a1ad9a9e1a43213f907bfebcead", "91116aee49b88ae55224fdfb93da9426"}}}}}}}, 0x0) 02:58:12 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x2, 0x6, 0x0, 0x0, 0x2, 0x0, 0x70bd2d}, 0x10}}, 0x0) [ 306.137354][T13350] IPVS: ftp: loaded support on port[0] = 21 [ 306.174736][T13355] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 02:58:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}]}, 0x28}}, 0x0) 02:58:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0xb, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:58:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000040)={'vlan1\x00', @ifru_hwaddr=@dev}) [ 306.333445][T13355] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 02:58:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000), 0x4) 02:58:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x14, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:58:12 executing program 5: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffa}) 02:58:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:12 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x6, 0x0, &(0x7f0000000240)) 02:58:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000006640)={0x0, 0x0, &(0x7f0000006600)={&(0x7f00000066c0)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:58:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000540)={0xb4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x0, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x0, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0xda}}, 0x0) 02:58:12 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x1, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:58:12 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) 02:58:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000040)={'macvlan0\x00', @ifru_hwaddr=@dev}) 02:58:12 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 02:58:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x3a}}, 0x0) 02:58:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x1) 02:58:12 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x0, 0x18, 0x0, 0x0, 0x0, "62b6f74351defe6b3fa94e44186fc324330a008afddbcf98486c04fb029d606c21a78358d3"}, @sadb_sa, @sadb_sa, @sadb_x_sa2]}, 0x6d1aa03a4643ed64}}, 0x0) 02:58:12 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}) 02:58:13 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0xb, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:58:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x5, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:58:13 executing program 1: add_key$user(&(0x7f00000000c0)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000002280)="f1", 0x1, 0xffffffffffffffff) 02:58:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x13, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}, @sadb_x_nat_t_port={0x1, 0x15}, @sadb_lifetime={0x4}]}, 0x60}}, 0x0) 02:58:13 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10=\x8f\xa2\xc7\x8b\x96|?\x16\xbf\xa1$\xe2\xf4\xa6t#M\xe0l\x0e<\x89\x8df\xa0m\x00\a\xbb\x84\xc2V\xff\xb0j\x06\x00\xba\x1a\xe7@\xab\xe2v\x8a\x97\x88\xd3\xa5\xeePb\x10\xf5\'\xc1\x01\xfew\xdfgCM>\xba\xc6\xe5\xa6\xac\xfa\xed\xdf;') r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = creat(&(0x7f0000001200)='./file0\x00', 0x0) dup2(r1, r2) 02:58:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x2, 0x7, 0x0, 0x8, 0x9, 0x0, 0x0, 0x0, [@sadb_spirange={0x2}, @sadb_lifetime={0x4, 0x3, 0x81, 0x6, 0x63, 0xffffffffffffff80}, @sadb_x_nat_t_port={0x1, 0x16}]}, 0x48}}, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0xb, 0x0, 0x7, 0x2}, 0x10}}, 0x0) 02:58:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89a2, &(0x7f0000000080)={'bridge0\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=0x0}}) 02:58:13 executing program 3: mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='.\x00', &(0x7f0000000080)='fuseblk\x00', 0x1000000, &(0x7f00000000c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id'}}) 02:58:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x891f, &(0x7f0000000040)={'\x00', @ifru_hwaddr=@dev}) 02:58:13 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000002340)=ANY=[], 0x2c}}, 0x0) [ 307.915961][T13474] fuseblk: Bad value for 'fd' [ 307.974518][T13474] fuseblk: Bad value for 'fd' 02:58:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xc0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={0x0}}, 0x0) 02:58:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0214000007000000000000000000000005000500000000000a"], 0x38}}, 0x0) 02:58:13 executing program 4: mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 02:58:13 executing program 2: syz_emit_ethernet(0x52, &(0x7f0000000000)={@multicast, @link_local, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d30b7f", 0x18, 0x3a, 0x0, @mcast2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, {[], @mld={0x0, 0x0, 0x0, 0x0, 0x0, @private2}}}}}}, 0x0) 02:58:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8918, &(0x7f0000000000)={'wg2\x00', @ifru_hwaddr=@dev}) 02:58:14 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x40000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x205}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 02:58:14 executing program 2: clone(0x291a02e68911c973, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, 0x0, 0x40010) 02:58:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000080)={'veth1_to_bridge\x00', @ifru_hwaddr}) 02:58:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000040)={'macvlan1\x00', @ifru_hwaddr=@dev}) 02:58:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:14 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r0, 0x0, &(0x7f0000000380)) 02:58:14 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 02:58:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x1f0, 0xa4, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x15c, 0xffffffff, 0xffffffff, 0x15c, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xa4}, @common=@inet=@SET3={0x34, 'SET\x00', 0x3, {{}, {0x2}}}}, {{@ip={@dev, @local, 0x0, 0x0, 'ip6erspan0\x00', 'macvlan0\x00'}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x24c) 02:58:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x2, 0x7, 0xa, 0x8, 0x2, 0x0, 0x70bd2d}, 0x10}}, 0x0) 02:58:14 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020ffb08290000002dbd7000fcdbdf250800120001000100bd6b6e003f00000006002b0081040000161300000000000000000000000000000000000000000000ac1e010100100000000000000000000002000100000004d40240dc020000000017000900600500003951207daca432c5b7b9d181cbc215c6c32ee98033715d29907ac4337a934c7f5e5ae51ebd40d81d3de5ff1aa25c755e3ca43ef8d3f50a8b5428f5db11ec701be51be18bef6c5134e9abdf0fa2bb5ebdc3ef8741177f06373b8b0d1cbbcfa58b2b416d4c82252d43f614a10c17d6b3deebe579ac737cad981188b9a3e526007c30ef5f9fa10073b77608f7348346206377191c09b90fbf474cda455206af0d8de21b54022cef6faaeb2f5bc700000000010014000400000002000a00ff000000040000000000000002000a"], 0x148}}, 0x0) 02:58:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 309.113293][ T9773] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.153025][T13520] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 309.194315][T13520] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 02:58:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000000)={'veth1_macvtap\x00', @ifru_hwaddr=@dev}) 02:58:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 309.256024][T13520] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 309.291849][T13547] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 309.316578][T13547] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 02:58:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000040)={'bridge0\x00', @ifru_hwaddr=@dev}) 02:58:15 executing program 1: write(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket(0x1, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000100)={0x0, 'syzkaller1\x00'}) 02:58:15 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x2, 0x15, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_ident={0x2, 0x9, 0x3ff}]}, 0x20}}, 0x0) 02:58:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x900, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0xfff, 0x10b382) sendfile(r0, r0, 0x0, 0x24002d00) 02:58:15 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r0, 0x0, 0x0, 0x0) 02:58:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x2, 0x6, 0xa, 0x0, 0x2, 0x0, 0x70bd2d}, 0x10}}, 0x0) 02:58:15 executing program 4: add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="01", 0x1, 0xffffffffffffffff) 02:58:15 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_ifreq(r0, 0x8917, &(0x7f0000000080)={'veth1_to_bridge\x00', @ifru_hwaddr}) 02:58:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@empty}]}, 0x38}}, 0x0) 02:58:15 executing program 1: clone(0x4000, &(0x7f0000000100), 0xfffffffffffffffe, 0x0, 0x0) 02:58:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x891d, &(0x7f0000000040)={'lo\x00', @ifru_hwaddr=@dev}) 02:58:15 executing program 3: socketpair(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 02:58:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000002c80)={&(0x7f0000002b80), 0xffffff48, &(0x7f0000002c40)={0x0}}, 0x0) 02:58:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xb00, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x13, 0x0, 0x0, 0xe}, 0x10}}, 0x0) 02:58:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="020600110200000000000010"], 0x10}}, 0x0) 02:58:15 executing program 4: r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r0, r1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0xffff8007}) 02:58:15 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockname(r0, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f00000000c0)=0x80) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) 02:58:15 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f00000000c0)) 02:58:15 executing program 5: socketpair(0x1, 0x805, 0x0, &(0x7f0000000240)) 02:58:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xd00, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000040)={'veth0_to_bridge\x00', @ifru_hwaddr=@dev}) 02:58:16 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="0213000012000000000000000000000008001201"], 0x90}}, 0x0) 02:58:16 executing program 5: clone(0x291a02e6c5306973, 0x0, 0x0, 0x0, 0x0) 02:58:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x148}}, 0x0) 02:58:16 executing program 4: socketpair(0x1, 0x3, 0x0, &(0x7f0000000240)) 02:58:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:16 executing program 2: r0 = openat$fuse(0xffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$fuse(0xffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000400)=r1) 02:58:16 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x20000001) 02:58:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000040)={'lo\x00', @ifru_hwaddr=@dev}) [ 310.407168][T13630] IPVS: ftp: loaded support on port[0] = 21 02:58:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x1100, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(r0, 0x0, 0x0, 0x7e, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) 02:58:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000000040)={'lo\x00', @ifru_hwaddr=@dev}) 02:58:16 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00'}) 02:58:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x894b, &(0x7f0000000040)={'veth1\x00', @ifru_hwaddr=@dev}) 02:58:16 executing program 5: clone(0x291a02e6c5306973, 0x0, 0x0, 0x0, 0x0) 02:58:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 310.703800][T13670] IPVS: ftp: loaded support on port[0] = 21 02:58:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xbf}}, 0x10) sendmsg(r1, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) 02:58:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000640)={0x14, r1, 0x1}, 0x14}}, 0x0) 02:58:16 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 02:58:16 executing program 3: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000080)='fuseblk\x00', 0x0, 0x0) 02:58:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x1800, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 310.948814][T13694] IPVS: ftp: loaded support on port[0] = 21 02:58:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3fb, 0x1}, 0x10}}, 0x0) 02:58:16 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000500)={&(0x7f0000000280), 0xc, &(0x7f00000004c0)={0x0}}, 0x0) 02:58:16 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:58:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newpolicy={0xbc, 0x13, 0xa99819cc18aaa523, 0x0, 0x0, {{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@XFRMA_SET_MARK={0x8}]}, 0xbc}}, 0x0) 02:58:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x2500, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 311.210597][T13739] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:58:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000100)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_PMSR_ATTR_PEERS={0x3b0, 0x5, 0x0, 0x1, [{0x60, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x3c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x34, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0x314, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0xf0, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xdc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x1fc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xec, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x104, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}]}]}, {0x4}]}, @NL80211_PMSR_ATTR_PEERS={0x190, 0x5, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x168, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x90, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x84, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x34, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x20, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x4}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}]}]}]}, @NL80211_PMSR_ATTR_PEERS={0x95c, 0x5, 0x0, 0x1, [{0x214, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x210, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xd0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x130, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x64, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x40, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]}]}, {0x61c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x80, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x64, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x40, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x360, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xcc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x164, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xd4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x50, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x1c8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x128, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}]}]}, {0xc4, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}]}, @NL80211_PMSR_PEER_ATTR_REQ={0xac, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x64, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}]}]}]}]}]}, 0xec4}}, 0x0) 02:58:17 executing program 5: clone(0x291a02e6c5306973, 0x0, 0x0, 0x0, 0x0) 02:58:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1, 0x0) 02:58:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, 0xfffffffffffffffe, 0x0) 02:58:17 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x236142, 0x0) 02:58:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 311.386518][T13751] IPVS: ftp: loaded support on port[0] = 21 02:58:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, 0x0, 0x2f) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="c40000000b06f10000eb0000010bfdff1d000400070001000600f2ff9b00078018000180800800000001010000000000000002000000100006000465000000000c000900000000200000142a140017007665746800008000616e00000000800005000700880000001400040000000000000000000000001b020100000900120000007a32000000000c001b400500f77b001980000c00148008200191edbbed879db145000006028aab86000000001a00000032040000003d0900020073797a30"], 0x1}}, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x8800}, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2c6) splice(r1, 0x0, r3, 0x0, 0x883717, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 02:58:17 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) 02:58:17 executing program 4: prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="b7", 0x1) 02:58:17 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0xa0502, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x9) 02:58:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:17 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 02:58:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 311.682423][T13790] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 02:58:17 executing program 5: clone(0x291a02e6c5306973, 0x0, 0x0, 0x0, 0x0) 02:58:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:17 executing program 4: add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 02:58:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000004c0)={'syztnl2\x00', 0x0}) [ 311.897506][T13803] IPVS: ftp: loaded support on port[0] = 21 02:58:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:18 executing program 1: r0 = eventfd2(0x43, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff9, 0x8) 02:58:18 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x0}, 0xffffffffffffffff) 02:58:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa}]}, 0x28}}, 0x0) 02:58:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xb) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x28}}, 0x0) 02:58:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x5, 0x0) r1 = dup(r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 02:58:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 312.537598][T13852] bridge: RTM_NEWNEIGH with invalid state 0x0 02:58:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000900)=@filter={'filter\x00', 0xe, 0x4, 0x3a0, 0xd0, 0x1c0, 0xd0, 0x1c0, 0xd0, 0x2c0, 0x2d0, 0x2d0, 0x2d0, 0x2c0, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0xfffa}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @local}, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@local, 'wg1\x00'}}}, {{@ipv6={@remote, @dev, [], [], 'bridge_slave_1\x00', 'ipvlan0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "20179705e5402a1b2e9ae53bfcc85dc329505d2fda1a43a570438f34d27f"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) r1 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x880c1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @dev}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000040), 0x4) 02:58:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) read$FUSE(r1, &(0x7f0000000140)={0x2020}, 0x2020) 02:58:18 executing program 5: ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x6e0}) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000040)={'bridge0\x00', @ifru_hwaddr=@dev}) 02:58:18 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130009006900000000000000ab008000210000004600010707000014190001001000000800005068000000000000ef38bf461e59d7", 0x39}], 0x1) [ 312.699723][T13863] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:58:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:19 executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:58:19 executing program 2: r0 = shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) shmdt(r0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) 02:58:19 executing program 4: clock_adjtime(0x0, &(0x7f0000000000)={0x39cc4c5f}) 02:58:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:19 executing program 4: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f00000000c0)=[{}, {0x0, 0x2e14, 0x1000}], 0x2, 0x0) 02:58:19 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') 02:58:19 executing program 5: add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, &(0x7f0000000080)="76a5", 0x2, 0xfffffffffffffffe) 02:58:19 executing program 3: r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000000000), 0xfffffffffffffe96) 02:58:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:19 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) 02:58:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000240)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, r0) 02:58:19 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000280)=""/149) 02:58:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0x7, &(0x7f0000000000)=0x1ff, 0x4) r3 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) sendto$unix(r3, 0x0, 0x0, 0x0, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) setsockopt$inet_int(r2, 0x0, 0x12, &(0x7f0000000040)=0xf9c8, 0x4) recvmmsg(r2, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 02:58:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(0xffffffffffffffff) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x318, 0x140, 0x1e8, 0x140, 0xa8, 0xa8, 0x280, 0x280, 0x280, 0x280, 0x280, 0x5, 0x0, {[{{@uncond, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x11, @remote, @multicast2, @port, @gre_key}}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x407}}}, {{@uncond, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x9, @remote, @multicast2, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 02:58:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 313.774330][T13916] x_tables: duplicate underflow at hook 1 02:58:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000900)=@filter={'filter\x00', 0xe, 0x4, 0x3a0, 0xd0, 0x1c0, 0xd0, 0x1c0, 0xd0, 0x2c0, 0x2d0, 0x2d0, 0x2d0, 0x2c0, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0xfffa}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @local}, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@local, 'wg1\x00'}}}, {{@ipv6={@remote, @dev, [], [], 'bridge_slave_1\x00', 'ipvlan0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "20179705e5402a1b2e9ae53bfcc85dc329505d2fda1a43a570438f34d27f"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) r3 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x880c1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @dev}, 0x1c) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f0000000040), 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:58:19 executing program 4: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xffffffffffffffff, 0x0) [ 313.979226][T13925] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:58:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) 02:58:19 executing program 1: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000200), 0x87) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, 0x0) 02:58:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000880)=@filter={'filter\x00', 0xe, 0x4, 0x4c8, 0x108, 0x328, 0x0, 0x0, 0x0, 0x318, 0x3f8, 0x3f8, 0x3f8, 0x318, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], '\x00', 'netdevsim0\x00'}, 0x0, 0x200, 0x240, 0x0, {}, [@common=@inet=@policy={{0x158, 'policy\x00'}, {[{@ipv4=@multicast2, [], @ipv6=@mcast2}, {@ipv4=@empty, [], @ipv6=@dev}, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, [], @ipv4=@multicast2}, {@ipv6=@rand_addr=' \x01\x00'}], 0x2}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7eedfcb331f3ae839a733f3041901a8d235bd39675399e5719d27a532748"}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000840), 0x4) 02:58:20 executing program 4: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r0, 0x0, 0x0) 02:58:20 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000080)={0x0, "298aa0ccc873c464d360eea59fd075cc416383d36dd5145e72d6680b28c7fdd2ca3d73fe6aca46dccf20140dcd180253c366c509ed0575a2047713e40caa4469"}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x9) [ 314.532457][T13952] x_tables: duplicate underflow at hook 1 02:58:20 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x901c41, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) pipe(&(0x7f00000059c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_SET_MCAST_RATE(r3, &(0x7f0000005b00)={&(0x7f0000005a00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000005ac0)={&(0x7f0000005a80)={0x24, r4, 0x8, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x3c}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x1e0}]}, 0x24}}, 0x4005) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r5, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x7}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x81}, @NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0xfc}, @NL80211_ATTR_STA_WME={0x1c, 0x81, [@NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0xf7}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0xcf}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x6}]}, @NL80211_ATTR_VLAN_ID={0x6, 0x11a, 0x4}, @NL80211_ATTR_STA_VLAN={0x8, 0x14, r6}, @NL80211_ATTR_STA_VLAN={0x8, 0x14, r7}, @NL80211_ATTR_STA_WME={0x14, 0x81, [@NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x9}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x4e}]}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x22, 0xbe, "1049e57dafea0a508ed387b79af451c1a2dc89ceaf1c9717062ac26b751f"}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xa00}]}, 0xa8}, 0x1, 0x0, 0x0, 0xc000000}, 0x4044005) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r4, 0x100, 0x70bd2c, 0x25dfdbff, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x20000000, 0x63}}}}, [@NL80211_ATTR_NAN_FUNC={0x8, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_SUBSCRIBE_ACTIVE={0x4}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000840}, 0x810) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000040), 0xfe80) dup3(r2, r8, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r1}) 02:58:20 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x9, 0x3, 0x248, 0x0, 0x0, 0xb0, 0xb0, 0xb0, 0x1b0, 0x1a8, 0x1a8, 0x1b0, 0x1a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "3b4272585404f97920335dabc5b3abeb5f79f5865c671cba15e125d11e4e"}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv6=@private1, @ipv4=@multicast2, @ipv4=@dev, @ipv6=@private2}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x6}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x100001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 02:58:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, 0x0, 0x0, 0x400000c, &(0x7f0000000140)={0x2, 0x4e20, @multicast2}, 0x10) 02:58:20 executing program 3: semop(0x0, &(0x7f0000000380)=[{}, {}], 0x2) 02:58:20 executing program 5: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r0, &(0x7f0000000100)=""/150, 0x96) 02:58:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8971, &(0x7f0000000080)={'vlan0\x00', @ifru_settings={0x0, 0x0, @fr_pvc_info=0x0}}) 02:58:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000000)={'veth0_virt_wifi\x00', @ifru_ivalue}) 02:58:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=@RTM_NEWNSID={0x14, 0x58, 0x1}, 0x14}}, 0x0) 02:58:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) sendmmsg$inet6(r0, &(0x7f0000000a80)=[{{&(0x7f0000000400)={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000980)=[{&(0x7f00000006c0)="a8cd48af127a7351b5d93b6d7facf11e37d1e4c6f77ed53c70b06a2889c4109f607e7367247ef4191894b1dec71b08d58973118bcced12b748ed49f49e06ae65336b7da9b311758a068e6f27f066b4885d2788394c66cc7696c8611fc2d6e81bdedb795e36e00b4d87132e718d6395282ccd4b4ab49ce05bf52e1e26150a4447a3eef9cb1839c6a891c1f407c68cebea4edc9d3dcea4de679c5c258427fa584e6a6f46d2c68eaa312a1c182fdce30d4395a32462a7b11bed87d17c56511598fa1070c6bf928659f8097d854f955bd107cfd63affe885727cc7cdb1cef5ff529d437d4a1185b6c089f1e9", 0xea}, {&(0x7f00000007c0)="d066332835771773807bbf24693af73644bed2aa1216dee6d8a585e34a008b6e5868f7d61de7dfc8b1476d5f3a227e2ad04055540c9371c07847fc89f09cc344ebb919014f3d9ddbeacbeaa63d98c5fdc3145a962e0351a2317f4433023da447bb8ea608de348c832bed6e749f6ddc2e061abddd", 0x74}, {&(0x7f0000000840)="6100384b1f397b0ac40121adb88b4a3c2fc523fb44aca51440bd07e2dc56122c5f6ef03a28acaacc30cae17cd9e9fa21f3f6fd76e10c590da57fb37d1767c6eebb51c722bb50ff71c81a981868cf7b771c12088406149d7d2da16d3a8c34c64a1241b932039be49b1fcb2b40769076d9f669ac0975c3d1f4ef6a4e74505ff5977be195dcf9b78fae19c9c9e250b349ee98425dd33290511f1d6f2a0b2b52e8d9947beba37ffed882", 0xa8}, {&(0x7f0000000e00)="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", 0x357}], 0x4, &(0x7f0000000a00)=[@dstopts_2292={{0x68, 0x29, 0x4, {0x0, 0xa, [], [@calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x0, [0x0, 0x0, 0x0]}}, @pad1, @jumbo, @jumbo, @hao={0xc9, 0x10, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, @ra, @jumbo, @generic={0x0, 0x1, "8f"}]}}}], 0x68}}], 0x1, 0x0) 02:58:21 executing program 1: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x9, 0x3, 0x298, 0xd0, 0x0, 0xb0, 0x0, 0xb0, 0x200, 0x1a8, 0x1a8, 0x200, 0x1a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, [], 0x0, 0x0, 0x0, 0x0, 0xaa, 0x0, 0x0, 0x8}}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'dummy0\x00', 'wg2\x00'}, 0x0, 0xd0, 0x130, 0x0, {}, [@common=@set={{0x40, 'set\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f8) 02:58:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:21 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x941, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800) 02:58:21 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0xff, 0x0, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x43000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext={0x0, 0xff}, 0x0, 0x0, 0xfffffff7, 0x9, 0xa9}, 0x0, 0x4, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000002280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000002240)={&(0x7f0000000440)=ANY=[@ANYBLOB="40270000846c3c4261b3e3888bdae9c494a6c4170d7d4446bb95020700c5dc", @ANYRES16=0x0, @ANYBLOB="000327bdff6950999c096b77796ea2dc38e71c408676527468305f766c26245918b8b677b232ac1be48fd263cb03e4e78ee360080001000100000008000d000600000000000000000000020000000000c2da4248233f526a4c05f4aaa9c1fb8fff06e93c2739af389e3900a7994d4c3e61fa6832f78484460130ac72a2948cd36032b6937ba65d753dc94df305d1f1dfe3a471ee32bbe5a892c3c46ee8893d8b2ed60c64224c0edc"], 0x40}, 0x1, 0x0, 0x0, 0x8}, 0xc0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x4, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) socket(0x80000000000000a, 0x2, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r5, r4, 0x0, 0xd4ad) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 02:58:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x9000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f00000015c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = getpgrp(0x0) sched_rr_get_interval(r2, &(0x7f0000002780)) sched_rr_get_interval(r2, &(0x7f0000000040)) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000000)='wg0\x00') 02:58:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:21 executing program 5: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$read(0xb, r0, &(0x7f0000000080)=""/155, 0x9b) 02:58:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:21 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf0, 0xf0, 0x3, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {0x4}, {}]}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}, @const, @const, @union={0x3, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {0x4}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}]}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x5b}, @restrict]}, {0x0, [0x0]}}, 0x0, 0x10b}, 0x20) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000200)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/67, 0x43}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3a) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 315.651128][T14008] x_tables: duplicate underflow at hook 3 [ 315.682649][T14013] x_tables: duplicate underflow at hook 3 02:58:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000ac0)=@raw={'raw\x00', 0x9, 0x3, 0x350, 0x0, 0xffffffff, 0xffffffff, 0x148, 0xffffffff, 0x280, 0xffffffff, 0xffffffff, 0x280, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @remote, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0x100, 0x148, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'wlan1\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0x6, 0x7}}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'syz_tun\x00'}}}, {{@uncond, 0x0, 0xd0, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b0) 02:58:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xb000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:21 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eefffffffffffff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newqdisc={0x38, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8}]}}]}, 0x38}}, 0x0) [ 315.833384][T14026] x_tables: duplicate underflow at hook 3 02:58:21 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, r0, &(0x7f0000000080)=""/152, 0x98) 02:58:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 315.874830][T14031] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 02:58:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:21 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_pwait(r0, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) [ 315.982213][T14031] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 02:58:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x201608, 0x0, 0x0, 0x0) 02:58:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xd000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:22 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eefffffffffffff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=@newqdisc={0x60, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x1, 'tbf\x00'}, {0x34, 0x2, [@TCA_TBF_BURST={0x8, 0x6, 0x23a4}, @TCA_TBF_PARMS={0x28, 0x1, {{}, {}, 0xf81c}}]}}]}, 0x60}}, 0x0) 02:58:22 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000980)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x6000000e}) [ 316.454200][T14061] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 316.494833][T14063] mmap: syz-executor.4 (14063) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 316.533310][T14061] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 316.640503][T14061] syz-executor.5 (14061) used greatest stack depth: 24352 bytes left 02:58:24 executing program 1: syz_emit_ethernet(0xaa, &(0x7f0000000280)={@empty, @local, @void, {@ipv4={0x800, @gre={{0x16, 0x4, 0x0, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @loopback, {[@generic={0x0, 0x2}, @timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x0, [{@remote}, {@multicast1}, {@local}]}, @lsrr={0x83, 0xf, 0x0, [@multicast2, @multicast2, @local]}, @rr={0x7, 0x17, 0x0, [@local, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @private, @multicast2]}]}}}}}}, 0x0) 02:58:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:24 executing program 2: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_settime(0x0, 0x1, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r0) ptrace$getregs(0x4, r1, 0x20fffffd, 0x0) 02:58:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:58:24 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r0) mknod(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file1\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 02:58:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000ac0)=@raw={'raw\x00', 0x9, 0x3, 0x350, 0x0, 0xffffffff, 0xffffffff, 0x148, 0xffffffff, 0x280, 0xffffffff, 0xffffffff, 0x280, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @remote, [], [], 'veth1_vlan\x00', 'veth0_to_bridge\x00'}, 0x0, 0x100, 0x148, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'wlan1\x00', {0x0, 0x0, 0x9, 0x1, 0x3f, 0x6, 0x7}}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'syz_tun\x00'}}}, {{@uncond, 0x0, 0xd0, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b0) 02:58:24 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/ipc\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 02:58:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:24 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) [ 319.042747][T14098] x_tables: duplicate underflow at hook 3 02:58:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x11000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:25 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r0, &(0x7f0000e15000)={0x2, 0x4e20, @local}, 0x10) listen(r0, 0x0) 02:58:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000200)=r3) [ 319.392183][ T34] audit: type=1804 audit(1607482705.207:5): pid=14114 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir805355349/syzkaller.nrOCKy/185/file0" dev="sda1" ino=16225 res=1 errno=0 [ 319.460157][ T34] audit: type=1804 audit(1607482705.237:6): pid=14114 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir805355349/syzkaller.nrOCKy/185/file0" dev="sda1" ino=16225 res=1 errno=0 02:58:25 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 02:58:25 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x3, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}, @const, @const, @int, @restrict]}, {0x0, [0x0]}}, 0x0, 0x93}, 0x20) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000200)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/67, 0x43}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3a) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 02:58:25 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:25 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r0, &(0x7f0000e15000)={0x2, 0x4e20, @local}, 0x10) listen(r0, 0x0) 02:58:25 executing program 1: r0 = inotify_init() ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, 0x0) 02:58:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000002b40), 0x4) 02:58:25 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x18000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:25 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000001fc0)={0x0, 0x0, &(0x7f0000001f80)={0x0}}, 0x0) 02:58:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:58:25 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000280)={@link_local={0x3}, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @echo_request}}}}}, 0x0) 02:58:25 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x25000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:28 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @address_reply}}}}, 0x0) 02:58:28 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f00000002c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000100)={0x0, "c0e2c2151d9dbd03140808abdfab328daebb0976abdfff8fde54342402324bfa1bfb534c21e2eae53a6a45c275635f6681e9cd5dab241bf28859ca5dddc8b987"}, 0x48, 0xfffffffffffffffc) 02:58:28 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/user\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) 02:58:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:28 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002200)='/proc/tty/ldiscs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x7) 02:58:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x4, 0x0) lseek(r0, 0x20, 0x0) 02:58:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000004440)=[{{0x0, 0xe, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x34e, 0x7a0a, 0x0) 02:58:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000300)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000000)={[{@fat=@time_offset={'time_offset', 0x3d, 0xffffffffffffff71}}]}) mkdirat(r2, &(0x7f0000000380)='./file1\x00', 0x0) 02:58:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:28 executing program 4: openat$udambuf(0xffffffffffffff9c, &(0x7f0000005940)='/dev/udmabuf\x00', 0x2) 02:58:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000004440)=[{{0x0, 0xe, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x34e, 0x7a0a, 0x0) 02:58:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:28 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0xd4, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000002c0)=""/192) [ 323.041980][T14188] FAT-fs (loop2): bogus number of FAT sectors [ 323.064891][T14188] FAT-fs (loop2): Can't find a valid FAT filesystem 02:58:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:29 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 02:58:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000004440)=[{{0x0, 0xe, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x34e, 0x7a0a, 0x0) 02:58:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4(r3, 0x0, 0x0, 0x0) 02:58:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000004440)=[{{0x0, 0xe, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x34e, 0x7a0a, 0x0) 02:58:29 executing program 5: init_module(0x0, 0xfff32, 0x0) 02:58:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:29 executing program 2: r0 = epoll_create1(0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x10000000}) 02:58:29 executing program 1: rt_sigaction(0xf, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000002c0)) 02:58:29 executing program 5: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x7, 0xe0642) 02:58:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:29 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 02:58:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x4020940d, &(0x7f0000000080)=0x3) 02:58:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044591, &(0x7f0000000000)) 02:58:29 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.events\x00', 0x275a, 0x0) dup3(r1, r0, 0x0) 02:58:29 executing program 2: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000000140)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) 02:58:30 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x00') write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000001c0)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, '-'}}, 0x22) 02:58:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xc0000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "0000ffffffea00000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r1, 0x0, 0x0) 02:58:30 executing program 5: add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) 02:58:30 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000300)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000003c0)={[{@fat=@check_strict='check=strict'}]}) mkdirat(r2, &(0x7f0000000380)='./file1\x00', 0x0) 02:58:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:30 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x5, 0x0) ioctl$EVIOCGRAB(r0, 0x4020940d, &(0x7f0000000080)=0x5) 02:58:30 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r1, &(0x7f0000000340), 0x41395527) ptrace(0x10, r0) ptrace$getregset(0x420d, r0, 0x40efff, 0x0) [ 324.560788][T14277] overlayfs: failed to verify origin (bus/file0, ino=16287, err=-61) [ 324.573723][T14277] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 02:58:30 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:30 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000000)={[{@fat=@check_strict='check=strict'}, {@fat=@errors_continue='errors=continue'}]}) mkdirat(r0, &(0x7f0000000380)='./file1\x00', 0x0) 02:58:30 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:30 executing program 5: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) 02:58:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 324.862116][T14301] overlayfs: failed to verify origin (bus/file0, ino=16272, err=-61) [ 324.957960][T14303] FAT-fs (loop1): bogus number of FAT sectors [ 324.978178][T14303] FAT-fs (loop1): Can't find a valid FAT filesystem 02:58:30 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000740)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000780)=[0x8]) [ 325.114610][T14313] overlayfs: failed to verify origin (bus/file0, ino=16286, err=-61) 02:58:31 executing program 1: syz_emit_ethernet(0x5a, &(0x7f0000000000)={@broadcast, @multicast, @val={@void}, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "dda741dd526c9805f64c3d5abd16727819eb834e16b31efaddbbf50e1702e5c0465aafb51fa8120d1892c5f6cfa8735d64c0e1bb184bcc8c5d973b3e3fddc585"}}}}, 0x0) 02:58:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:31 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:31 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) accept4$inet(r0, 0x0, 0x0, 0x0) 02:58:31 executing program 4: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) 02:58:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x77, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:31 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x121041) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="b5", 0x1}], 0x1) [ 325.618344][T14335] fuse: Bad value for 'fd' 02:58:31 executing program 1: r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000300)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000000)={[{@fat=@time_offset={'time_offset', 0x3d, 0xffffffffffffff71}}]}) mkdirat(r0, &(0x7f0000000380)='./file1\x00', 0x0) [ 325.664057][T14335] fuse: Bad value for 'fd' [ 325.674586][T14336] overlayfs: failed to verify origin (bus/file0, ino=16307, err=-61) 02:58:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:31 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x6}, 0x14910, 0x1, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000400)={0x30, 0x5, 0x0, {0x0, 0x3, 0x3, 0x3}}, 0x30) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000440)={0x20, 0xfffffffffffffff5}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x404, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, r1, 0x2) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x36) clone(0x2000200cbfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="00000000000001000000000000b5f9d9703f639bd24342f4d35e6ae908ac6620881172b514fc2c87387201b0da0939d5cf802de27e159c751450ae77277c221c37aec50c3f56af2cf80208d1d32c9b10209448a96e6f3e99d24244799b426be724af9a1cb5bbbde0416c2d4661d4e0348cb819ab481720a2c9e6c8f74c5ffcb2bcbb5d225b4ecee5de25caf31d995f22db22173ba9208471a8c05d7e2bd88dd0f0794fa4e615523267545b4307c3796afcbf29bb79025fb93441029d11b5a56c6ce2c6f59c0eaf13c6dda616e2ce52ef642e7c8ecd6601ad7bf569c72025f76f40000000000000000072a203a7dc1444b8c8c7fb00"/257], 0x1c}}, 0x40) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x11, 0x2, {0x10, 0x4, 0x2}}, 0x14) exit_group(0x0) r3 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r3, &(0x7f0000000340)='./file0/file1\x00', 0x200c0, 0x48) 02:58:31 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:31 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/159, 0x9f}], 0x1, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/150, 0x7ffff000}], 0x1, 0x0) [ 325.789690][T14344] FAT-fs (loop1): bogus number of FAT sectors [ 325.807763][T14344] FAT-fs (loop1): Can't find a valid FAT filesystem 02:58:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 325.948658][T14344] FAT-fs (loop1): bogus number of FAT sectors [ 325.955273][T14344] FAT-fs (loop1): Can't find a valid FAT filesystem 02:58:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:32 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x6}, 0x14910, 0x1, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000400)={0x30, 0x5, 0x0, {0x0, 0x3, 0x3, 0x3}}, 0x30) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000440)={0x20, 0xfffffffffffffff5}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x404, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, r1, 0x2) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x36) clone(0x2000200cbfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="00000000000001000000000000b5f9d9703f639bd24342f4d35e6ae908ac6620881172b514fc2c87387201b0da0939d5cf802de27e159c751450ae77277c221c37aec50c3f56af2cf80208d1d32c9b10209448a96e6f3e99d24244799b426be724af9a1cb5bbbde0416c2d4661d4e0348cb819ab481720a2c9e6c8f74c5ffcb2bcbb5d225b4ecee5de25caf31d995f22db22173ba9208471a8c05d7e2bd88dd0f0794fa4e615523267545b4307c3796afcbf29bb79025fb93441029d11b5a56c6ce2c6f59c0eaf13c6dda616e2ce52ef642e7c8ecd6601ad7bf569c72025f76f40000000000000000072a203a7dc1444b8c8c7fb00"/257], 0x1c}}, 0x40) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x11, 0x2, {0x10, 0x4, 0x2}}, 0x14) exit_group(0x0) r3 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r3, &(0x7f0000000340)='./file0/file1\x00', 0x200c0, 0x48) 02:58:32 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000040)={0x0, 0xffffffff}) r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00c642d, &(0x7f0000000040)) 02:58:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x50, &(0x7f0000000100)={0x0, {{0x10, 0x2}}}, 0x8c) 02:58:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3fe, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:32 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000000300)="000000000000000000000000e5ae81319b144b749b1668edf97c22c3010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001000000000005004000000000000000", 0x30, 0x540}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000013400)="504d4d00504d4dff", 0x8, 0x40000}], 0x0, &(0x7f0000013a00)) 02:58:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x10d082) r1 = memfd_create(&(0x7f0000000200)='\xbb\x02\xb1\xed\x97\xdb\xb1,\x116\xe0\x89\x01\xc3r%;\xdd\x01k\xe7=\xfa\xe8HB\x00\x9e\x15\x9e\xc9\x86\x8e\x1d\xdf\x9d+,\x00\xd7h\xa4\x06jt\xe5\xf9l\x00\x00\x00\x00!\xf8\xac\xdc\x00\x00\x008\xe7\xc8\x9fo\xb8\x8f@\x8d\xec\xbc\n\x16\x00-\xa9\ttJ\xc5\xe1u\x89\xa6z.j+VF#\x7fIG\xae,\xcd\xcf\x86\xb8EE\xa2I\x1a\xd0\xac\a%\xba\x1a\xb3N3\x86\x95\x7fs<;R\xe4N)\x81\x1d\xb3\xd9->_\x18\xa8\x9d-\x8cG\x10\xf76SA\xbab\xf5\xb2\x90e\x15H\xd7\x9e\x92\x8c\xfe-\xf8\xf7\xe7+, \xaa\x9eJ\xea\xe2\x88\xfd\xa6K\x1b7L\xf8\xdaK\x8a;\x84/\x9a\xe2\x91B(\x90\x86c\xe9%\xd2\x81&-\x00\bK\xc5\xafH\xbas^v\xdd\xf7S\xfb\"\\\x05\x83\x9c\x9aHw\xd6\xf2\xa7', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) mmap(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x2, 0x11, r0, 0x0) write(r0, &(0x7f0000000000), 0x52698b21) 02:58:32 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x6}, 0x14910, 0x1, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000400)={0x30, 0x5, 0x0, {0x0, 0x3, 0x3, 0x3}}, 0x30) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000440)={0x20, 0xfffffffffffffff5}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x404, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, r1, 0x2) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x36) clone(0x2000200cbfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="00000000000001000000000000b5f9d9703f639bd24342f4d35e6ae908ac6620881172b514fc2c87387201b0da0939d5cf802de27e159c751450ae77277c221c37aec50c3f56af2cf80208d1d32c9b10209448a96e6f3e99d24244799b426be724af9a1cb5bbbde0416c2d4661d4e0348cb819ab481720a2c9e6c8f74c5ffcb2bcbb5d225b4ecee5de25caf31d995f22db22173ba9208471a8c05d7e2bd88dd0f0794fa4e615523267545b4307c3796afcbf29bb79025fb93441029d11b5a56c6ce2c6f59c0eaf13c6dda616e2ce52ef642e7c8ecd6601ad7bf569c72025f76f40000000000000000072a203a7dc1444b8c8c7fb00"/257], 0x1c}}, 0x40) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x11, 0x2, {0x10, 0x4, 0x2}}, 0x14) exit_group(0x0) r3 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r3, &(0x7f0000000340)='./file0/file1\x00', 0x200c0, 0x48) 02:58:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000000300)="000000000000000000000000e5ae81319b144b749b1668edf97c22c3010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001000000000005004000000000000000", 0x30, 0x540}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed41000000100000dbf4655fdcf4655fdcf4655f00000000000004", 0x1b, 0x4100}, {&(0x7f0000013400)="504d4d00504d4dff", 0x8, 0x40000}], 0x0, &(0x7f0000013a00)) 02:58:32 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) [ 326.815790][T14402] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 326.843322][T14402] EXT4-fs (loop1): get root inode failed [ 326.887768][T14402] EXT4-fs (loop1): mount failed [ 327.017959][T14417] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 327.027437][T14417] EXT4-fs (loop5): mount failed [ 327.067584][T14402] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 327.093224][T14402] EXT4-fs (loop1): get root inode failed [ 327.100379][T14402] EXT4-fs (loop1): mount failed [ 327.147484][T14417] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 327.170421][T14417] EXT4-fs (loop5): mount failed 02:58:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:33 executing program 4: gettid() perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x8208200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x200000) pread64(r2, &(0x7f0000000000)=""/42, 0xfffffdef, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() 02:58:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2000025a, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:33 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000000300)="000000000000000000000000e5ae81319b144b749b1668edf97c22c3010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001000000000005004000000000000000", 0x30, 0x540}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000013400)="504d4d00504d4dff", 0x8, 0x40000}], 0x0, &(0x7f0000013a00)) 02:58:33 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)) 02:58:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20000265, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 327.551620][T14445] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 327.628494][T14445] EXT4-fs (loop1): get root inode failed [ 327.665418][T14445] EXT4-fs (loop1): mount failed 02:58:33 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x200002a1, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:33 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400028001000240000004f801e3", 0x18}, {0x0, 0x0, 0x5fe}], 0x0, &(0x7f0000000480)=ANY=[]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 02:58:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000000300)="000000000000000000000000e5ae81319b144b749b1668edf97c22c3010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001000000000005004000000000000000", 0x30, 0x540}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000013400)="504d4d00504d4dff", 0x8, 0x40000}], 0x0, &(0x7f0000013a00)) 02:58:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xa, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 327.850973][T14470] FAT-fs (loop5): count of clusters too big (14876926) [ 327.890419][T14470] FAT-fs (loop5): Can't find a valid FAT filesystem [ 327.982411][T14470] FAT-fs (loop5): count of clusters too big (14876926) [ 328.002836][T14470] FAT-fs (loop5): Can't find a valid FAT filesystem [ 328.026247][T14479] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 328.087074][T14479] EXT4-fs (loop1): get root inode failed [ 328.128937][T14479] EXT4-fs (loop1): mount failed 02:58:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:36 executing program 4: gettid() perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x8208200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x200000) pread64(r2, &(0x7f0000000000)=""/42, 0xfffffdef, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() 02:58:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xe, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:36 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:36 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400028001000240000004f801e3", 0x18}, {0x0, 0x0, 0x5fe}], 0x0, &(0x7f0000000480)=ANY=[]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 02:58:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000000300)="000000000000000000000000e5ae81319b144b749b1668edf97c22c3010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001000000000005004000000000000000", 0x30, 0x540}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000013400)="504d4d00504d4dff", 0x8, 0x40000}], 0x0, &(0x7f0000013a00)) 02:58:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x64, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 330.292738][T14511] FAT-fs (loop5): count of clusters too big (14876926) [ 330.319290][T14511] FAT-fs (loop5): Can't find a valid FAT filesystem 02:58:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:36 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) [ 330.353859][T14512] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 330.373169][T14512] EXT4-fs (loop1): get root inode failed [ 330.379322][T14512] EXT4-fs (loop1): mount failed 02:58:36 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400028001000240000004f801e3", 0x18}, {0x0, 0x0, 0x5fe}], 0x0, &(0x7f0000000480)=ANY=[]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 02:58:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x0) 02:58:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x77, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 330.679804][T14537] FAT-fs (loop5): count of clusters too big (14876926) [ 330.699982][ T34] audit: type=1326 audit(1607482716.508:7): auid=0 uid=0 gid=0 ses=4 subj=_ pid=14529 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460f5a code=0xffff0000 [ 330.755064][T14537] FAT-fs (loop5): Can't find a valid FAT filesystem 02:58:38 executing program 4: gettid() perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x8208200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x200000) pread64(r2, &(0x7f0000000000)=""/42, 0xfffffdef, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() 02:58:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x90, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:38 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:38 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400028001000240000004f801e3", 0x18}, {0x0, 0x0, 0x5fe}], 0x0, &(0x7f0000000480)=ANY=[]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 02:58:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) 02:58:38 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2a0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000640)=ANY=[], 0x39, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f00000003c0)) unlink(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) [ 332.519738][T14559] FAT-fs (loop5): count of clusters too big (14876926) [ 332.526796][T14559] FAT-fs (loop5): Can't find a valid FAT filesystem 02:58:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x9c, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:38 executing program 3: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:38 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) 02:58:38 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:38 executing program 3: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:40 executing program 4: gettid() perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x8208200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x200000) pread64(r2, &(0x7f0000000000)=""/42, 0xfffffdef, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() 02:58:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x3fe, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:40 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x2) 02:58:40 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2a0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000640)=ANY=[], 0x39, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f00000003c0)) unlink(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) 02:58:40 executing program 3: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:40 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x5f5e0ff, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:40 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:40 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:40 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2a0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000640)=ANY=[], 0x39, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f00000003c0)) unlink(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) 02:58:40 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2a0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000640)=ANY=[], 0x39, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f00000003c0)) unlink(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) 02:58:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x2000025a, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:42 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:42 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x20000265, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:42 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2a0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000640)=ANY=[], 0x39, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f00000003c0)) unlink(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) 02:58:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40042, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x63a}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)) 02:58:42 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2a0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000640)=ANY=[], 0x39, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f00000003c0)) unlink(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) 02:58:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x200002a1, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:43 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:43 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2a0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000640)=ANY=[], 0x39, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f00000003c0)) unlink(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) 02:58:43 executing program 1: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x510, 0x0, 0x0, 0x2a0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000640)=ANY=[], 0x39, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f00000003c0)) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./bus\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x15, 0x0, 0x0, "3109b6db793f7488ac57db7599e8c1e0"}, 0x15, 0x2) unlink(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) 02:58:43 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:43 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000340)={'wlan1\x00'}) [ 337.566397][T14668] overlayfs: failed to resolve './file0': -2 02:58:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x18, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:43 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x1) sendmmsg$inet6(r0, &(0x7f0000000dc0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, &(0x7f0000000440)=[{&(0x7f00000001c0)='a', 0xfffffdef}], 0x1}}], 0x1, 0x850) 02:58:43 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) [ 337.826801][T14689] overlayfs: failed to resolve './file0': -2 [ 338.138113][ T34] audit: type=1804 audit(1607482723.948:8): pid=14698 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir379663448/syzkaller.js3Eyd/214/file0" dev="sda1" ino=15814 res=1 errno=0 02:58:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000080)='\a', 0x1}], 0x1) writev(r0, &(0x7f0000001440)=[{&(0x7f0000000000)="93b9d6889aca5aa7df060b9c6a898efc696a1433fd2a3feb2da95fc2e800c7a7d46b7d80229ba423b6d76fd7fab7ac55dfe5179633542d92891364bc295c83", 0x3f}, {&(0x7f00000002c0)="9972f71f6f89ad28cc06f745f9ccde13ec19ab2ba88fad6382df87ecbe87ccfc4337061aa1fe95b6ac46188b90a18c3483d27a2ff7766cf03f5af5d6eb305db6a7026c2af63b2f89525b3015881ce1c6e96d0b89265ff56960ac1540d172594f2f9e9455d3dffc1af8b902b83dd76d824bd5", 0x72}, {&(0x7f00000011c0)="cd358c17a478cee24c1c6d4781a985c21d67c51d59f49c1e288095589e6a2dab3504c76d06ffcadd11ad4c1326052a", 0x2f}], 0x3) 02:58:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:44 executing program 5: r0 = socket(0x1c, 0x3, 0x0) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) 02:58:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3fe, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f00000000c0)={0xc317}, 0x10) 02:58:44 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) [ 338.190566][ T34] audit: type=1804 audit(1607482724.008:9): pid=14700 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir379663448/syzkaller.js3Eyd/214/file0" dev="sda1" ino=15814 res=1 errno=0 02:58:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x200002d2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 338.334356][T14710] overlayfs: failed to resolve './file0': -2 02:58:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000380)=ANY=[@ANYBLOB="10024e2300"/134, @ANYRES32], 0x94) 02:58:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_buf(r0, 0x0, 0x7, 0x0, &(0x7f0000000180)) 02:58:44 executing program 5: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x41, 0x0, &(0x7f00000000c0)) 02:58:44 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x200002ed, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000000}, 0x14) 02:58:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000002280)=""/67, 0x43, 0x0, 0x0, 0x0) writev(r1, &(0x7f00000027c0)=[{&(0x7f00000012c0)="d84455b4774fbb7140d8ba2576dddeb8e965ee6d6b819c54aa2f2f47dba625b803ff1fcf97b9e847be4db93d2756bb44e73069e5188783f8ebe9b772e01459145f458177", 0x44}], 0x1) [ 338.653953][T14735] overlayfs: failed to resolve './file1': -2 02:58:44 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x149, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:58:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:44 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000002280)=""/67, 0x43, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f00000001c0)='0', 0x1}], 0x1) 02:58:44 executing program 4: r0 = socket(0x1c, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) getpeername$inet6(r0, 0x0, &(0x7f0000000080)) 02:58:44 executing program 5: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000080)=0x9157, 0x4) 02:58:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x2, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) [ 338.957830][T14758] overlayfs: failed to resolve './file1': -2 02:58:44 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:44 executing program 1: r0 = socket(0x1c, 0x20000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 02:58:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x3, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:45 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, &(0x7f0000000100)=ANY=[], 0x20) connect$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c}, 0x1c) 02:58:45 executing program 4: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000040)) 02:58:45 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, &(0x7f0000000100)=ANY=[], 0x20) connect$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c}, 0x1c) [ 339.217649][T14780] overlayfs: failed to resolve './file1': -2 02:58:45 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:45 executing program 4: socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) select(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x3ffffffffffffd}, 0x0) 02:58:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c) 02:58:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x5, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:45 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x81, 0x4) 02:58:45 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, 0x0, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:45 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB="3a4afa3b409ecdb0d634c7d61b71610db08bc5a9e991ebf0ecadf040c16bb59f9239d744e5cb950224478f29817a96916e148e5284e3461b18bc2579e26d66ade70e449483f157dbeeeb897f23f7281ba065e634ce41efe4e7c5a28f8d163bbefed17be7e89852277464e801b62c31"], &(0x7f0000001640)=0x94) 02:58:45 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000040), 0x8) 02:58:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:45 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:45 executing program 4: r0 = socket(0x1c, 0x3, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000040), 0x8) 02:58:45 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f0000000000), &(0x7f0000000040)=0x8) 02:58:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:45 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB="06"], 0x67) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 02:58:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, 0x0, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:45 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0xd, &(0x7f0000000140)={@multicast1, @local={0xac, 0x14, 0x0}}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) 02:58:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x8, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, 0x0, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockname(r0, 0x0, &(0x7f0000000080)) 02:58:46 executing program 5: r0 = socket(0x1c, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 02:58:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x9, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:46 executing program 1: r0 = socket(0x1c, 0x20000002, 0x0) connect(r0, &(0x7f0000000100)=@in6={0x1c, 0x1c}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) 02:58:46 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:46 executing program 4: socket$inet_sctp(0x2, 0x1, 0x84) select(0x40, &(0x7f0000000000)={0x7f}, &(0x7f0000000100)={0x8}, 0x0, 0x0) 02:58:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040), 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xa, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:46 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000000, 0x4}, 0x14) 02:58:46 executing program 1: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) lchown(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) 02:58:46 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreq(r0, 0x0, 0xd, &(0x7f0000000040)={@multicast2}, 0x8) 02:58:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xb, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:46 executing program 5: r0 = socket(0x1c, 0x3, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x55, 0x0, 0x0) 02:58:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040), 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:46 executing program 1: r0 = socket(0x1c, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) shutdown(r0, 0x1) 02:58:46 executing program 4: r0 = socket(0x1c, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) 02:58:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xc, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:46 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:46 executing program 5: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x100, &(0x7f0000001480)={0x1c, 0x1c, 0x3}, 0x1c) 02:58:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xd, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040), 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:46 executing program 1: r0 = socket(0x1c, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) sendmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="95c006a802be4370ec7984808892c4796f1ea5a686902ebd16cd6d380445404ef1baafa70faa559f760b8bc93830e06ddc2f368b02422267ee8465abf0d64ec68f38d9c18f9b74042a8801aca3dd2d029e117b81503c16b13eda8ea8df", 0x5d}], 0x1, &(0x7f0000000280)=[@rights, @cred], 0x24}, 0x0) 02:58:46 executing program 4: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 02:58:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xe, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 341.054184][T14929] overlayfs: failed to resolve './file1': -2 02:58:46 executing program 5: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x28, &(0x7f0000000000), 0x4) 02:58:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:47 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x10, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000080)='\a', 0x1}], 0x1) writev(r0, &(0x7f0000001440)=[{&(0x7f0000000000)="93", 0x1}], 0x1) 02:58:47 executing program 4: r0 = socket(0x1c, 0x20000002, 0x0) sendmsg$unix(r0, &(0x7f00000009c0)={&(0x7f0000000080)=@abs={0x8}, 0x8, 0x0}, 0x8783d6f112c10108) 02:58:47 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x81}, 0x14) [ 341.392279][T14958] overlayfs: failed to resolve './file1': -2 02:58:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x11, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:47 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:47 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f00000000c0), 0x8) 02:58:47 executing program 4: r0 = socket(0x1c, 0x20000002, 0x0) sendmsg$unix(r0, &(0x7f00000009c0)={&(0x7f0000000040)=@file={0xa}, 0xa, 0x0}, 0x30184) 02:58:47 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000980), &(0x7f0000000a40)=0x94) [ 341.571089][T14973] overlayfs: failed to resolve './file1': -2 02:58:47 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 02:58:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:47 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x12, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:47 executing program 1: select(0xfffffffffffffe89, &(0x7f00000000c0), 0x0, &(0x7f0000000140), 0x0) 02:58:47 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) 02:58:47 executing program 5: socketpair(0x10, 0x2, 0x80, 0x0) 02:58:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000300)=ANY=[@ANYBLOB="1002"], 0x94) 02:58:48 executing program 5: r0 = socket(0x1c, 0x3, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs={0x8}, 0x8) [ 342.223961][T14998] overlayfs: failed to resolve './file0': -2 02:58:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x18, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:48 executing program 4: r0 = socket(0x1c, 0x20000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) bind$unix(r0, &(0x7f0000000000)=@abs={0x8}, 0x8) 02:58:48 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:48 executing program 1: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 342.522912][T15025] overlayfs: failed to resolve './file0': -2 02:58:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x55, 0x0, 0x0) 02:58:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x25, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x4000000) 02:58:48 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcsa\x00', 0x0, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) 02:58:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:48 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:48 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) fchmod(r0, 0x0) 02:58:48 executing program 5: semget$private(0x0, 0x1, 0x200) 02:58:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x48, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:49 executing program 1: shmget$private(0x0, 0x2000, 0x40, &(0x7f0000ffb000/0x2000)=nil) 02:58:49 executing program 4: r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x4) [ 343.233152][T15046] overlayfs: failed to resolve './file0': -2 02:58:49 executing program 5: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) 02:58:49 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:49 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) 02:58:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4c, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:49 executing program 1: setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000000), 0xffffffc1) 02:58:49 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 02:58:49 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x68, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:49 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcsa\x00', 0x101000, 0x0) 02:58:49 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r1, r0, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x20, 0x0, &(0x7f0000000140)) 02:58:49 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000200), &(0x7f0000000180)=0x8) 02:58:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6c, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:49 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x2001, 0x0, 0x0) 02:58:50 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x74, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:50 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r1, r0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 02:58:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003580)=[{{&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000140)=""/95, 0x5f}, {&(0x7f00000001c0)=""/221, 0xe2}, {&(0x7f0000000040)=""/19, 0x13}, {&(0x7f00000002c0)=""/144, 0x90}, {&(0x7f0000000380)=""/127, 0x8a}, {&(0x7f0000000440)=""/103, 0x67}, {&(0x7f00000004c0)=""/105, 0x69}, {&(0x7f0000000ac0)=""/130, 0x82}, {&(0x7f0000000600)=""/121, 0x79}], 0x1000000000000068, &(0x7f0000000740)=""/98, 0x62}}, {{&(0x7f00000007c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f0000001a80), 0x6, &(0x7f0000001b00)=""/157, 0x9d}}, {{0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000002bc0)=""/162, 0xa2}], 0x2, &(0x7f0000002cc0)=""/214, 0xd6}}, {{&(0x7f0000002dc0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000002e40)=""/31, 0x1f}, {&(0x7f0000002e80)=""/139, 0x8b}, {&(0x7f0000002f40)=""/250, 0xfa}, {&(0x7f0000003040)=""/186, 0xba}, {&(0x7f0000003100)=""/92, 0x5c}, {&(0x7f0000003180)=""/69, 0x45}, {&(0x7f0000003200)=""/179, 0xb3}, {&(0x7f00000032c0)=""/166, 0xa6}], 0x8, &(0x7f0000000980)=""/146, 0x88}}, {{0x0, 0x0, &(0x7f0000003540)=[{&(0x7f00000034c0)=""/90, 0x5a}], 0x1}}], 0x5, 0x0, &(0x7f00000036c0)={0x77359400}) 02:58:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f00000001c0)=@proc, 0xc) 02:58:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7a, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:50 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(0x0, 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:50 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 02:58:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xc0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:50 executing program 1: r0 = semget$private(0x0, 0x5, 0x0) semctl$GETPID(r0, 0x4, 0xb, &(0x7f0000000000)=""/138) 02:58:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000) 02:58:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x300, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:50 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(0x0, 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) 02:58:51 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) 02:58:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010005, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) dup3(r4, r3, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) tkill(r2, 0x1000000000016) 02:58:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x500, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:51 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(0x0, 0x1) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:51 executing program 1: timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000180)={0x0, 0xea60}, 0x10) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000700)='/proc/self\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 02:58:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x600, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:51 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x8040) 02:58:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x700, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, 0x0, 0x0, 0x40000003, 0x0) [ 346.078408][T15183] overlayfs: failed to verify origin (bus/file0, ino=15897, err=-61) 02:58:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:52 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x240080a0, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) 02:58:52 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x900, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:52 executing program 1: semget$private(0x0, 0x3, 0x110) 02:58:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 02:58:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x20000090) 02:58:52 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x43, 0x0, &(0x7f0000000140)) 02:58:52 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000002c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept$inet(0xffffffffffffffff, 0x0, 0x0) listen(r1, 0x0) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x60) setsockopt$sock_void(r2, 0x1, 0x0, 0x0, 0x0) 02:58:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xa00, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:52 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:52 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002480)={0x5, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000001280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:58:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:53 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x7, 0x0, 0x0, 0x0, 0x40}, 0x40) 02:58:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xb00, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:53 executing program 1: r0 = bpf$MAP_CREATE(0x1800000000000000, &(0x7f0000000040)={0xf, 0x4, 0x4, 0x3, 0x0, 0x1}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, &(0x7f0000000180)=""/118}, 0x20) 02:58:53 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x4, 0x3ff, 0x3, 0x0, 0x1}, 0x40) 02:58:53 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:53 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000003b00)={&(0x7f0000001580)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003a00)=[{0x0}, {0x0}, {&(0x7f00000027c0)="d3", 0x1}], 0x3}, 0x0) 02:58:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 02:58:53 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) getsockname$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) 02:58:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xc00, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:53 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:53 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100), 0x10) 02:58:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x2c, &(0x7f0000000100)=[@in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, &(0x7f00000001c0)=0x10) 02:58:54 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 02:58:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xd00, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:54 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:54 executing program 5: socket(0x25, 0x1, 0x80) 02:58:54 executing program 5: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x4}, 0x20) 02:58:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xe00, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:54 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 02:58:54 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000003b00)={&(0x7f0000001580)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003a00)=[{&(0x7f0000000340)='D', 0x1}, {&(0x7f0000001600)="81", 0x1}, {&(0x7f00000016c0)="a4", 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 02:58:54 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1100, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f000000a740)={0x0, 0x0, &(0x7f000000a700)={&(0x7f0000002680)=ANY=[@ANYBLOB="1204bf"], 0x8050}}, 0x0) 02:58:54 executing program 5: pipe(&(0x7f0000001880)={0xffffffffffffffff}) ioctl$sock_qrtr_TIOCINQ(r0, 0x541b, &(0x7f0000000100)) 02:58:54 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000140)={0x10, 'veth1_to_batadv\x00'}) 02:58:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:55 executing program 1: socketpair(0x11, 0x0, 0x0, &(0x7f0000000040)) 02:58:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1200, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:55 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 02:58:55 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340), 0x10}, 0x78) 02:58:55 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:55 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, &(0x7f0000009e80)=[{{&(0x7f00000002c0)=@hci, 0x80, &(0x7f0000000800)=[{&(0x7f0000000340)="a8040ccebe8e545f609d053f947517de7e8543cc76e3", 0xffffff75}, {&(0x7f0000000380)="f22faea08194b7c4af21b2975c1f9a14fc6292047196796a6dcddb2fe13e078e4027fca612328f432f1c538ce3df290de8251ba62ec1", 0x36}, {&(0x7f00000003c0)="8e1a69c42685453f0adcc224ddc70aa472ea90351999213281eebe2dae09b666e0be711cddbc9934388f1a2b792128d205633684743f20abfabe3515577b97fe1094a16d5bbfd98febfa0cfd6bf8b96826d48f8d9754c2fca6dadeaab7e67d2d8048b4a0b8411cdc10752831164236c25affb7cfdc0c3011efa7cd8432975af93bf059cebb0b352d79686ada4b8f6b478d8f53016f8c95c112455bc0b96659bcd4db490746c7bc7e8b528cf385fb9c0150f8c648fcaa06e403ec67364b356f1577fa9ae0d5e452090a1cb97fe419354872d11cb93fc8b5653e4a1c5b2b98ed78c892841907f3a9", 0xe7}, {&(0x7f00000004c0)="c0f7736cb239f0fb3a12112e8d3c63514eb10a5953b9d9554bea321f8d936b2b96daf2ba74ec2e25f7ca4c3a87ab28a77ff29907a9c03ff0cc9883f261f5d6b68bd653f700bb3223ff08154472c8edaa912b1750d053b4241800dc64dca721468571cb757a420dc2f39f33d418b53e5e80f2e692dc5eadeed97d364c717cc432eacb9852338ef5b72e9448070e18200f5153621a98bd7b2bf4508a835c9cb01136404c9b48b811877eed61df60cb3db7ebb36edfc35495e1dd715775f7c49796e8aa8d933ad59adc1d58e579bc09792961b92bc852f2329401e48e8261eabf00f614cd98205c7a71ac02bd", 0xeb}, {&(0x7f00000005c0)="586f11ef478b6e8ff564142b5cb26fb8072543d7f7ea37e10e00fec0d0e47491da34b1f24f", 0x25}, {&(0x7f0000000600)="bf275e71655f5f4baab53e29c7b25e5f8797e3a04a93bc93d2ffa0adb97040b8b9a509ceed832db659c92914aa5db7ca72d64ceb3397efc487db27224fbd64cd9761053d0fa38599c493bdc3bb5a80eda74007f829e94d02c3c87447ce0a5c095d77861a247813229200835eb9", 0x6d}, {&(0x7f0000000680)="493e24f317577ef26b835f99d54fb8144d66d40b51e23b46a73a3acb748bec9e20b1af6990aa2e575be6278ebbe399584cb3f4daac3b6f4bc549b456ac2847e929246e74c51a729e9f75419f900bc0", 0x4f}, {&(0x7f0000000700)="7cd5990255cd7fa15b78fb618badf2e964ddf1be9350918d8428ac28915b4cd440670ef240518ec3495d7eb2d2fb1e486684b7f17481fd62e5fd3e50a60cbd580744878c62ffe3662736eeebd05b66", 0x4f}, {&(0x7f0000000780)="1b6c43623711eb8a5e37c7d5592278b9859d9dc7b08c7f85c6efb9b289d55e4897a3e96b00762455ad98d67f5cf6f054dfdc7a83af48d29b8e02f755c9d173166c9ce0e9eb1245c71c0e145942f22b3a17b67db82d59a2660243", 0x5a}], 0x9}}, {{&(0x7f00000008c0)=@l2tp={0x2, 0x0, @dev}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)="59b390d50beb374c6fe94fc3aa28f13966521c45dea1c239b18ccd6d52509de058f2043626a71a405228aec5f1ada9463b9be98987f5d803a2a4c0379736d08941daf2c49ab6724ce4c5dca81a76dcd1f4bd93941e06d8e63aee614e5a4462c8cdd0c4f4e0a2e2cbc2a1476ebd7d087977b83c410768ddfcbabdfaafb60b17e60c7390782641e8dab0edbe4496db29451f52ff41de02ef676afddd7c5603632e26b9227e934246052435cc5dc3f636c27bc610357eae179e00bbfb065bf090444d1c3fe579e4805ab6c138536e54b8613b226a9870b67c2743d975cbe88b9f293b0d7a7a6e9bf0269376ced44a4fb8ce065cd742fbb0", 0xf6}, {&(0x7f0000000a40)="2f5682627d05f3269d7b1d2c234d8c010a3fd53cd42fd019a971f5a3a24d3d897f8dd5", 0x23}], 0x2, &(0x7f0000000ac0)=[{0x48, 0x0, 0x0, "da751a6f1518122826fc603f831ea05b77a0c2e783ae2ca4f58d20d8d033fcf6b9fb3f2a02b930231629abd8e71c465735"}, {0x80, 0x0, 0x0, "4980323fb88850ca9890a6b52b895689b45d4d2d55d6a56fddb6b983c7bdd023e0842b318c4b707fd86c4d558159859d7e5132449065af4aef1411157d85bd1ab38beed0ec53455cbb71cde791e856d3e1b3d9e017876d32270cae51b97f1ffa79e3319df77d22b8ad"}, {0x108, 0x0, 0x0, "363c889f3e4e9b5352badf98290d3bf4d63ceb825f45b92e209c8ab39a44414fc7bd69df18136c9cfadb3754cd4b90f585858f80bad240ee62f42a48d436519d891a3ee1e0e7b959ec1d026ca7ac684a6d74c153f51c6dbe488100761931c1f575780e054991f2d39d6fbb792b6af3eb6dd86073b123c4ffb295a14909573e9718e50aa4dc314894d3f913e3b4ec359610338c30a7f95240dffb1769b8ae2721f4786a141d37ebe04396837b5bbfda05686ea8ff5334ce6362c90259b9ac677904342ef031b66fa21ddfc23378621807a490742b8cf2098aede7724351afd292c7b72642a6aa16b530af5eb81ac8c256bc"}, {0x70, 0x0, 0x0, "3c814b0e99b13b1c67637a9f3f60e9d2039327d911ec755e82e4777d97da32986aec3de33ea6e95fdc9cbd914ec343d518d88496cde29eab75d662d2bc57fe6502ca3e0c23864a7bc02d307ea7414688b9b0361de3d1ff1a34560e11"}, {0x78, 0x0, 0x0, "a41ca6fc8fca33854205a5bb3fc4268462e4a4e715e3b16e1cc3a312bc54aa90d7e44dbc0bbe7c56c1fc8ef7391755e1ad04bfa9458a38a701f956bfaa78bbfe5e2408ca1f9f161b51118f6df7e6d98537ac002be8eb70e0715c4d03d95d233b0024ebe8a9"}], 0x2b8}}, {{&(0x7f0000000d80)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000e00)="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", 0xfe}], 0x1, &(0x7f0000000f40)=[{0x1010, 0x0, 0x0, "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"}, {0x70, 0x0, 0x0, "a61e5d84f882e4a91e3534e5ef356eb7af1da0ba38110e040130daaab6dd08c59397df021b2af751fc8af95bb6cd36c7bbf93297f90bf3fa01f6e687c416a49310da526b99ca0f0e8ef310278be0858a622c6af72f4e4da6a1daac1e9fee"}, {0xc8, 0x0, 0x0, "0e713474c46186239ab2e1b0543e59cb1c9145e844a4131c6622f1216c48b604c6cf0d4a7ecc5fcd28ff1f58a9e18b6722ffd187c1b02d3ecd435db11fc9b8d14b9036d4b764fc516a9eabad1fa3780e159edc754cccae5d73436370b8809715a66cb887161abd244ad1aeb45f2765cc04b7344dd37cb2d3573bea9c77b7d940b55b44965bdcb8afc0acd1f2f9c5e1bb8bc1ce58da37813ea7df5c75a0edff0f85a935a2e8296d5aef6604264f4ee7426e914879d64c"}, {0xe0, 0x0, 0x0, "b6105bcc6e3d01fc2bba6d08033c37c83038afe96b40f2943e10aa8e4a7bf063a38146505567f58dc5bc2c890589736a39ae9490102d95a7395ebed441c91d6dd07548b57dd2589cb3377342d92d8f3fefe9aa180c0bec9e479b1e13cbe334d0b3218777c0c63704ee87409c9a2c5d0a489b876f544041852aca3faefac74c525948fa166315ce3ba9c87f7420ecde7fbca569c3cb2f43ff1d305dcc5fb084964b814e43f67d1bc37410afeed64578d6e75dfac20fa40671fca82bc7d88901a594199190c318b867b0d7e5ca0f61bf"}, {0x58, 0x0, 0x0, "ea0ce38546cb72d626cb8bbbf9c66a9da8ddaef15cf4ebb5797f3d376c3ce365b05c4292f315fb139882d12759bef2b8751e73e7b09fb95c68951b81add162c56b64f1fb26"}, {0xc0, 0x0, 0x0, "d49a7e62ced1ef5eed012764aed95f77716edb61beeb78a9d8f05eb231cb65a7b63e60eeaeeb7ffb769508e0947fee83930434fd3c35e45c76b7a4a34aa405f891419d15f952a74b74463162ca2c600213fd1533adc2b83e90d3fdb4d94c708fd3d16c195b19663ba30e4d3ad1f74081480f893583922052441e2c8c5d7e11f4535c8929e8f0f56ddaf0946ba9196f3c2fbcc6b3b5a653c354b3bcc7ea0ec35f1ade3492ead75b88674547cf5d0775"}, {0x1010, 0x0, 0x0, "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"}], 0x2350}}, {{&(0x7f00000032c0)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000003600)=[{&(0x7f0000003340)="0eb178bf1c613888dadde0f4ce523c307120c87bf84a9c1d67827b1bcc182fff9666c7b60f25c4938e6e36b9ac879ff1f7e9aa8b886ffed0e64e298a999d15b5f002122aa1427b6d863f813ceefe8b025b87d0f0bf5ea39e7bd5b7dade178cb3abea", 0x62}, {&(0x7f00000033c0)="cac2c15f728048c3309bd70955830159f436c5d9e5ad52376e30334dbd4ad977071a24ceaffc04e9881e58ff", 0x2c}, {&(0x7f0000003400)="e9cc618e6919e2a51d1b91e3b9f755b202948cb45ae0ded3426b1e09422641a79c189f16113457c10ab33af3b79f8eaf4ff1bd6801d35c", 0x37}, {&(0x7f0000003440)="ee3e07c41500b3105dc34c76c75ccfcca68735eed3d224d9b91d3007c810b46fd7ec1f18c7ab34a04e8e1419b1230c6dd957ff6909d31e8e80d08d324ef8738eaccbc8272997ca757c277fad6ef2e9a1563eb4c02367c907e6c2cff0b940ee894dfdace8576b461143686c72ef238131423624db3c866fc99f0afd3e652817f0b2f59f86c0", 0x85}, {&(0x7f0000003500)="d4ecee95f71eda1c042e740a9c8d8c7c78618531aaabca1a5f629991ecd4cbd4ff4bc57785cd72ac5cc8430ee8016b08ce83ae0ffe4c83b64ba45b2fdc45e0da156d8241cbe71ba0b653bb8e76fb9712c382747667423783608623d3d4546f715601ea36ad8ad3d9b871f2321e07e5c9d8553baebcc69ce57cbd9a8d7dd53728553a489312ab6adbc39829d1e33ca54e69392fd8706354fe1fd7aceed87eba811338f4f0204d0c9742dcb9da771a8ba85f571e424ccdcf09a969c1febf4587e2daf09e9b6cafa5910f426582459a401ef4b7613f852bd81a1f26add339d64a7498b4315ed6bc8a7eb6", 0xe9}], 0x5}}, {{&(0x7f0000003680)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000004c00)=[{&(0x7f0000003700)="4bcc9852c0a71845dca90172afc9ce89c571", 0x12}, {&(0x7f0000003740)="4f3d8695d82999e0e4014d77c3fa1af6c86048fcfa90678ebafb303255119e54b2ee9971706ad8b4d1d79998e9986c3ca76e5a7d875b489bac047dbae6a7a212db8b7f36593ab13f572c50465ac4360c70feb3011f3232b6736a7f71bb6fb0c2c7753477fb1c8fb23ae800f335cd19c97be467f5dc52", 0x76}, {&(0x7f00000037c0)="4497fc338933c3591409cc0806dcd352117e8e7fe5e1d8cf02a0db1347356d19d3c462b92ba08403fb8214332bbe708c7604568009fd61094fae0e36444bdcc3fbe5f73594d017067b82f9aa9de2402d289b54f77ea1551480a55eb00491c9bcfa6f8a2c616ad53f6b5fd52a598db538f5e472ba71102a491b985c104a19eb7bc38d85da79641be7d0b00f522629f25c38c17267c855013772a5509cbeec68d09e413c0110f8c6de20cc8f0d3df8d300aa1eb2639748c22fef75093a0f75d6f337ffb0889b8e0bc267b622675c483630a42357d6ebd6161c78190cb2d29c377102d81b61b927cf9e5d", 0xe9}, {&(0x7f000000a080)="1f7df72ef837f11d1837f4d0b0769f80ca9f3dc1383583aa807175f9582947d0f1bfcf65b42cb39ceaddee52d00fa1dfcc885149ba54b611df6c05aca457104c6a481fa4c75e973b719c92b7220268dd0b80f91e483ca13cfcc797ee8624e6368b7f936fd6a64fd3f82cf9e9eab7274714d711199e8cf05216564e43edff60e0c43d86b9dc487b226e3e23b0b686eb7d89b0acf885c2b37c63dad12808601f3e3b53a3eb3bb887e7733316eabbc99e2d6af02e46de8a31e163998d86ee03d47048f0c435731ec7a75bcbbab7379c7b7faad78eaf5d3c9466", 0xd8}, {&(0x7f00000039c0)="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", 0x1000}, {&(0x7f00000049c0)="3f381086c2ec90eb7bed18434abb16d02e5f0c763635e49ba62d421427a64accecc0b6f55a4b963a4fd17e76b44d7ed17201549f22fc177d73875027d40b1f968c38bdd09e7942c28eb2", 0x4a}, {&(0x7f0000004a40)="d208e38d04081929bddab0fe2b8341b9122a2bace7a285353d537c3bb4c009a989c8dbb5920de4370760f0e72c5de1120790579d8cccc656923769339e10c6cced51359dde692653be08c07ce0d268cc85338ee8c0c39bfef6ad01cf36be49161be49a33b7dc548a21983e464b36cabe3c62c67a4acda43f228f82088c8678e1f5eb03b283c2497be870b23f2a80a79ad0fbd3e0eb56e62e9f3f442385c0cb6b1fd5327c2b5c1b088c65fcfb20c1053bad8606fda03a045a111352e075ed038910094a99ecdcd345c893fc5512fa6d0bc9571805a149b2cb442c", 0xda}, {&(0x7f0000004b40)="d1318b680a794cac715c8667fb99715418a32c685fb03b6ea17cb3b7b0d5d06886d6cf8d03f7c2635c611dea8ecede82fae815e161920f288aa03529dfcc6c7e71a5e4d189d2f683e61d3d18089e81d62393e0ae32a55b4015afd2055ade2559d9546721c08a0f44c013c498537632e008044951601ee7f59cbfe4fdd829d80387d385989a8b80e071d3fab9caf8d658a8dbcedab56397f1dc61beb956533f0b156c4947bf99716d", 0xa8}], 0x8, &(0x7f0000004c80)=[{0x108, 0x0, 0x0, "64cf22a04256bb9b86aeeb7201770b7a658fe17553e06d74e98ccbad5c414886c8e7f73fed75980f0f89ec42e4fbd0bc1c195a773b65453bbffd092b5b3438332fe8f521d066652b75e3cbd0c9a1dbe4bff2636db89d5248fdd34804f798adcfa5d80a56bcf3bf2b535796522781a33ec0178dd7422fd2e91f4eadd509bbf7c645a32bb190f11b9fc0d619c585faae92994b2e9d7693ad784169d353586f004cd8e15e7fa5a6b0e037abe983ce667680ad6087b74dc3cc145f8d075be128601fe2d65234ed22ef0ec67cbfaed6545b4440e6afc447732266a6114d3605ac9662516596b56af5a5d513691ea93d7f9ded2774da"}, {0x98, 0x0, 0x0, "b7c3859d00d2b2cb13ad8671d5439179889656bfea03b188031a579a7d5ced413835559080747ca80abcc2fe0b250af3a8781244044abeba38433d4e31196f4a7081499d11055d2abf288fb7a86dbb6b86b5e0cdffe4c902bcbd4b59152310f34f62a650dec895e9e3f96e518a3944ff1759b20b525e10535c2dc486656be8339d6ea6c7d020d7"}, {0x10}, {0xc8, 0x0, 0x0, "a12dcbdf1e0256a8ea220409ffa9646cc5ad88a37940400ebb13472d93ef5bbe5436ec4c503b637e79b0202e31491bd53964234834c438e44416ad9043ef5c8c1a55c60028116f82baca5940a3bf19ecb7dcd02a42ff973b11ab0b54a819c3fdcf9659f254483564aea1e651f855c4682867bfc8cfee60f099c0b06c6b6fae6c697d1069db57848e316874ed51534754c39ae011236a35d7149ae71e80b7617849febde45b8bc3e330279e21f8da8531220a40"}], 0x278}}, {{&(0x7f0000004f00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random="c9c73631541b"}, 0x80, &(0x7f0000005180)=[{&(0x7f0000004f80)="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", 0xfa}, {&(0x7f0000005080)="15f2c05532c85dbd545a48aaaefd26311955ee20282a3efe5ae225e4c14c84ca29ba6f66e2f1bf654df79dc57f721b6646227510f57fc494441c", 0x3a}, {&(0x7f00000050c0)="33886868b7c5d546c91cb82362699a1658f13eabbd8c168bad745e248880da94eb5a303ec400f0117420ae9e3c7d84b484d5bbf3c9275e8849404696fc78e7a52efa102e1f736911560e52a90662a2ff99081a7042440ee4d81fe45ba1ea4caf3a5029f01e325c50f1c950916742b65a7a3248aae78ffad4e90ab5d1bc66d7056764c119136645b737d988c6e961bf0d", 0x90}], 0x3, &(0x7f00000051c0)=ANY=[@ANYBLOB="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"], 0x1230}}, {{&(0x7f0000006400)=@nl=@proc, 0x80, &(0x7f0000007500)=[{&(0x7f0000006480)="307ef4bbb9eb74cf9127aa4042d3dc858fe33d91be5d29", 0x17}, {&(0x7f00000064c0)="a685e9a5238be5ab3e9796f63adcae72f5aeb78b84fa130633a2f9425376ca4631b9bdc9052cd9fa8c0910764e66968f4b524d13e72bbccadc1c2cef7c7bb84f4a29999e9e405e5bb3479bf543f4cb88deda17d72011ee0c01092cafa593afc619ac44c82ab04c4dfbb304aca719c41c5640f5dda8f77f3dd1ee99784254a3a97c85fe4bed51bf1a80e6475474b707b366710ab1dab334eedfc8e0d4db041fa42df5182523f8b410c838f31a80611b64ce3bc07359bce35ef30753510845f333b8736252399da49a02376e19f07018ecaf7d7538f52dbb46ea7e3c61d9a6069788fc0e80568b0e613a5518d5cd162af1969c685a1c38685abddeb5e77f105df9123287bc6b79bb827bfe0e2c2d40075ee57ffd6ba3c3d2ada619eb924a239ecbd3590a713d977e6fbd480daea29a76552c10ec8e844a9a1d2105ae4dcdb4715517ce0ed099af1c009070f71bb7670ab5e7f01f2a4f5c77d75305a5dcd272cfd71f19e1df30e1c871caa89db9a905d86d50e2aa4eb9aa6c50472980406c957a888d164046f90ecf768874cd4230fd0b0a9cb1839d4e67081781f5199f816807a6d9804d633c87f0b26047715bcdf6d9648660e973b8ad63f64dfc6bcb7b1eb2578193381277fab4cfe42f484bc3ac72747925dd8d31697797590f587b2a1fcc8f5c755ef11c227b4ed271c785501c8ddb86d8f16ab8cf92941e9b2dc75fdb186d7413639b6fc96d417bd525f4ebdbad2d6483917c9cc20cca84b40fe927ac0971740a89da6609c274b65dc27f5476560908354a13a8cc45b62b815bc2f0163e796d808fcea6b4c88ed8daf1221c5edc1c965aa2eb55289359914ece20760376b13bd09542b53507b66feafbe0b981e4c485d7a466da44e7fb13c4ebf12f734c0a260eabaf7a93a5f95958a0cea60224c6dadb2a2871b5d8ab92b56349bee94d5634365021deacc2bb5f1cea5c934df1e580f0576e752b94f1bb8cf716ee7cbdf311cb29132405fb5fa951a913e5403b09977671e009f63886be7ea88aa06755eef97871cadff084f87ea064cd3231d33300672739a551115b17b246a28970c1bbd09ffd15626cdf5bcd11b6ae287b40e7a83586bc5853286048ce272d39df0e65a0c7d6ca19405c0e01f3ceff594098b8efea427e072250adf2f2be9b255a0ddf0616b6a19fb72d800c445729d91b08d415d6daac060e0f866d8dc271337a57ee4e1e170e6411ab0f58a07afb617d625b31383c390687e3adcf5a7c4503584cb81d9048e1fe59b4a54420728d8ba6c8781a139d30f915b0c6fe08a66d8318583c94e9abc3d88eb6691c8ad01bb1c89e344653609f7d558416c004f9bcce632411ff62d0884f3d9c5e9a5946a11bc7ea0ed5bb1ae2be90554389299215a85fc8c920d8bd6aefd96cc1fa8bc0d988ac71f1a07c16bf32e70805ed973fe6363ad7acb34dca64c0950372a3880e139962d5481bba12b6c3c6622d5738dd32ccdbd2c17ae147feb70c230d90911aead9ab53878b7e55073491d8b61e5a6ef81f26cff52e4ddb5ea18370221eba780fb8b33594b7f8816e70324c4b1c390cb705f1897ce87972497674508a5b9281ad4ce0a7bc72e09ab3d070db30c46789a2a86aefd665ba13a243c8fc990b91d9d0bc5a6154ed68a3f1ad4310df27a0e363a4c91f36f8aae143e4c2a488a1f02bc2cc5f34ef9637d401ec6be747b8eaab471e277ada05db9615d4840bf301bbe4b33db328a9e8a3c8abcd3739b022854a751567d1101c816b95756489af9b29f83817cd25a3a44a002f1fc885ff765ed57ec2d502a628f09ef46cf4a26722d7f3d333271f589d0bbc3f8f5587bffe9b9ffd905656e61344ce36bbbe260c7f014bc27308e56a38ebc251f4ef93e18b381bba512f994c00fc4934f8b88a56578328a02af259cf5c558781b0b3de87d5645d017f7a6e0633b50de3db508d195dd3e8353345d832b26f36ca9c9ed4995883c0ba8c5a46488448aab4f42d7fdd239267e3e34022dec1a7391ac49375ef8cc92dff2bca39676ba30a43a8dbc31c247fc9bd7fac9e350cd256e851f448111563615e3d244e830dae453913977a40e832e60cc48183ab1241159c9db732da4e7e01e70c896b453a3184c60481dd7ed09513d51cdde0eb23b9b165aa252a88b741977b517009ba8d500ed9bdd531a28947798747610a48f9888f1c4af10b636c1c94c13757381eba6d940b7d2bb42119443cbac47a642ba22d278dc71101af351116f3213cd10542f555b22a61b08d6d4b11a366c32139c916bc7b1b01bd78ed97695eda029f0d1d27b94816b3268210e378f76455c289c1466bd0aa3e7de5513a06b51006065213f96dedd7bfab642a726e9a66e0e2d2c6d950df45cce39d37918b860ab236502c9d06db9e35b594a904d8e6b2605ef160ec127b75f526e0563136cfae082987ae7e1ccc5ca27ea4a39711ad3fe5e0c163a76115a9eec73ea871d58e76b358e96625e4586599513d6c284ebd426ede58aede22320a1461041eb4f9b89f3c14d89505fd96274eaecc78e20463db855fa0f16251fa44a51dea8d348e98aec23b0f24909d64a155e50c1f50cfd2755f0120c283196143b7dbd7a763ba5122958b81ad0dc29df150c09dd92d492ec047df764f4325757ab06127eb43cad379696a492a680b2970be69e04fe06a9d85fa5b3c18d967499d9d73241dafe1084eba3bd5ce8f7d278ed14afce69dfd79bdf6703f3ed64b62dd6aa1369c462dc0ca002ce2ce0f0d4997cf223a205f32b579648292a6b31eb68f7dbd8bf807065860206791a66dd0eecb020e84b33e666914873bdcf6e448b96a303bd72864529e07862d650a0e5c554328ccebd10f55b8cf999219919f40a9ebdb88de0799287a887cd649fcb921cb0dce308584e87178643e7121abecee4f8a7060c32fd94141882a086c4e379b6592bfe5051c73415319326d4e51392c3b1cd330348a2038db5ce0a53b52474a1de22035ac6cba39d72f0281ae3b5e736dc31cd977de71a99a9eca026dc65d1ce24bac52eb6e65ca113583b263d2ba84551b7b21d5fce4a2a2f5bd1916aaade5e57451be8c695a6aa583b2e6de03f51d443890807f0dfc901eb58ffbb335948875c48ef80f82aee99483eb3af6f98b8a294b55470fd18abe0db81971a0ba5ffb346ab5ffcd6e70fe6aae23aa28d8123d7a2c48e760bfbaf377701bda4ed563d220791695664996feb87ee958f33e5beda12226c6047c5c965f6b05eabeb6977adedea16f32e2e07fdadae66d36350f3496c134ae87b7bab720818ec5209fc7b94bf10815045b4187802768eb6c14b04d45535afe8d77f201b807721bd373359192d56d119c5cd9de7a493a39531a747a5532432553616572d81344db17b438f59abc71e8525ae3d58520fe6af4cf185861876896df20fdfe78d37093d7f4701e25ab00884025cbb71701f6dedc99c30e299c502866f023ab8d3b0e3493ecc5930e95f82d5aad572b516695054bf65a09032625b6e4524c8162fdee35645e04b4fbe7b43597f03c27430813558a7a21a999d2ded91d7d50794c25eaf878b8553acc4b7645cdfdbc33b16de05a182520c5b08a1a4c31ac7756c8b8aacc27034ca485714461e664ae1210c3ed989172d44e095b9c2c673ae839e0fb417814a306fdff98cfb962c51d24cba7bc6abb05e880247b2de03d68addf8e0754cef57a7106906e2045cf9dccaad152998bac73b4df7d6d5d4b1936855366f71f84360d3b40882363c9a93bd3ded71785658704a2877f0b1c35182c9b255daf296bb92b6b7dea216c6eb352615118aa41bee51021ab3af9db3512615da713f8a6323023e4e1f14ad2fd952029fbdb90bdbd70f25f33562a6f700ccc57f2ca1c6902cca9133c54b0781124491c5eb7e6af51071ee259cf76098a327c92de1c012129003760061deb906b4277e8f5fdff0bc8fc6ed599725cccf652ca8edbe94069938facad968a3e8229cedf950bdab4f2a0c5b28e75f0dbb953337022bccb29358d52f16d09b9be5b6a9bd83853e703a6695027e08129488030791cb99594e6820b401fd709f93a119329d466665d785f480c50681228b73424c22c332c16d73d584243ed92bd1edc902ef9b5602e4d6555ba4541d201bcd2ea8164f2f36066dca6054fbdee798820209059b31c4cc69b95806979b1d1451ffae6a5541a588ac615321aa2b380a80b7892ec3fd8f14e31fa4ca59d39133470255ffb93010f1f6cd572a8e7faefc713c1caefa1dc12c8875dd2e40175c4bd46583122489532287a8646773c0704d0fe49b0fd33aadf13e0fdc3c44589a36e13f65b662375310c349fb4c201e32f6b8a27a4aaf5e0427e46b58aeab6b1bcaff4667b1b61f809c8e957ffca67895da51151446f9865c4de7fbf08749a07db979878e7eb528578d1fc1e21a561accc9f8d4d2d35506a0375419a3161e588931487423fa12a2f1f0845864b58f5ed846c181b88713e44ef036fceca1692f7ee5a4a44ca1732955b6fc579f9c042406bd17634b09e89be9b1cd198abeecfe16aa6685e883d394223a0949010f16f091ff18aee98b350266cf2167288e6fa2020def424ae1740a6cf11d2670788e6255d76fe1a6132da6b199485f3d9153067050bfc2bed6515ff8b3c3340893e62ec96312cfaab9373603f73e65f9767237701e00511aa0ea547a286451121a7a536d4756ca9178461fe06efcaa49114f5580e9edb97f3fb9cbffdab81125e9d270b6135c019b0977918dfb81af175e12337ff662f43cdd64eb467e5077ff6687ab8f26c03dbf0d0e14f848499f88df63fd4099996e018bc1139ab6c08d147def76fc6163e5522d5ac05e312a90a39d9cee6c93dc04b8baa2d096d2491c2bf371f4cb649c4e51c036a199801d916a1d9416c89eb01ef5169341ea51d2811b883f7c91b7b399232efa396ba83e8a1e1780498c053154c1acbdf66fda94a58b67679b73efc6f221d63776ef334678cad485ae8e22f607f7f54253ad2f53b8a429603a9f0262c8d85a08261c626d1b4aa02ef3331b52c13a000aecbea0689197a3a1aa4200c5897fdeae69695d38092b7bfe1b86b449bcba4ab86701e72c43c4c790ee41f225fa58795d8af88840853f75f13ebc8a88ef23cf82cab40593f6069b2e92807feb0e04101802ec747e3cb433cf11e2606635e411345125cb8234eba8eda6f3f94c13a8a0e9c53b8f12192bbfe90b41fbb7cb97183ceb5cdcd69a8d5a0622b8bda8e04bb2310f1e8ece49a37593ffae44ec2abd06e88e3ea9420fbbc02860e0c17392f25a2d33793e6b859739d0b8adea2bd78335d1ec29fff0933fad7668805d96f9ebe5910ce6a6d77146e486d671189413a3950f9d3ddb9ae604def89c5ba5864101e0813c157a38ee77812786d4f5985b4cabee2a5025ab7e1a51a0b0e25bba3c4c6f0261abd00781100745b3b82143007ae3e91b6a8673b881a9de43e2e6a5ffcfe7f179f05a3659d527de114f01c4d4d0b9c9464ebbcc591915a4ba91df5a23986af586c1f27b8d7c88d2aea080d105beee64823b40d580573e873c69393af7ae2a3124b01265cb563b0e6e90d1a2bb43627cd99ff39048030e209f1eae0d52d51ea9cad6ee8bede8af8d76292bb1d5cdb09d877d7ef6cdb02b2113166e729b27cb1be0d67848daef2fcd690a8a2f751ec36db7fa39bb7ff386b0cd2a01cf8e04ee06202d5490a420dc8bd2fc5c524fa48eb627df3fc2f374c8e9423b1d66f5d3da46991d4b7d04f3a8e5c13b1bc48b67a5226b8de7fb5466b", 0x1000}, {&(0x7f00000074c0)}], 0x3, &(0x7f0000007540)=[{0x50, 0x0, 0x0, "08be90a55723c408592e87792c9a38f2364e6b26ac85eb0ff4e8d17586c76e8feade5124b9e995412ea8335526d23b1caad3ed8dfd5a8bbd706f"}, {0x88, 0x0, 0x0, "a9413312e2314af661a40e46d57dddf6359f0fc454a1df0a2e5e5426691431bec562a92f7194060b6dbfb24a0ed7561e078dfcdf44ced19979d211257e96dd07ae4828917321df60429b5f5d5c379fbfbbbbb017f4d03837c9456bc6c1c41ac68bd3473ccc6b162469dd825f898a9370c52e"}, {0xe0, 0x0, 0x0, "3ef2dfe36ff4490954cadf1e59dc4a6ad79666908b897972738140ccc6875426f5b28c52c09c682aeaeb6d584e89b99e96d929e376fbba36a6022015c231f59d321ef671c031b7a5d1d8c717a074c2913b1cc777f5e13e23792c709f64f98a3f996f41d85b3b4020d2a009e664e5108d2328a6baabc2762bc0d17591d033ffb5439f158a9f8fb239030dce33604f3944ebba41a76d1db45e2769534cd78c254532bdbaada993d04a692b5dd33d081ad42363b5271086852359bacb4edf73c212e3991f562bedebc73bb259c07eebb6"}, {0x1010, 0x0, 0x0, "ec709d8945a67febad18c02e998bba63cbe744280fd90dc640224036f723b679304f1e13aa2d238acd75455f5506ba0a0c634a275500c904188d1d7cd8bad1860427b0a6e8f7d1b43ad6b29918a2bcf0609c26fef28ad3eed8b3a3a5882950440a223cd7a433cd2d5556961194f0499cd72f86500077c4063ea7752bbe2feff77dc9cc21b27a1d68bfc07269560c19921493d66a1408f6ce410fe9a9cf346eedfc68891a5c0d1cc38f43699317973fab00187875e3e66e5beab1dcf9be3c6cf2ed42c19d748b8413419d1942bbd30755a69576d47af85c7735391a8e303471026035487c818c279d5b02cc960a4ee2c1a1cd2ca8584c3afe8082532da0e3a94c34cf7eec8e3bc15d5f46f398f3e605548c917ee35fc38476204c2885833a6bc5912a3b6b91240acc8ca3cc6fa78c2ac1e6f0026822818341925a7125a324d85383df7470a5ecded0b261b5aef0fa9932c89f860e031f96906ff687ca8de8dbf4b9a508ecc0b6a59979acfbe071f43f75aee7a49c602fc73ef284c994dab41cd7b9ad9aea6c96a793453187589bb378f94b48a9eb7b8fc5883f562703f4df858b0696d3a2309c5d1cc3f49c3c6a6c9c99d7e8d6e169e5c6bb5a696c4d0a1251765102388d3715db0b8e09a74eb9f0f411c4c609d93de84e154e5e6590379c112bced206153873829c11a47bf2e96b7591d5003e2ee0669db5c184a98642cdc40e817342bd788b4bef412098ddcd3096e24f419eb24ddd7506481a889a05119a647cf5e5cabaebe8c9a8dd07d52e160ab52fbd870fa99a3fdff0ef58f3802e114e1aa1bb5047954496252b79c751910f9f8f363834ee90a2e39038726a6a4e2486a26629ccb5820b44a830242056474ca6dbfece18c5ce7de5bcbae2f304286d70c5ccfb4fc983b995b338e31f9a94bf293a04d4efeb369bbf2162ae60136d397c21fcef92e24c43005ff2ef40a6b1cfe5282c94c52d048a36d067992566bbb1a7bb14c07b1536131c11f07a003e53ae28a6d8523905fc1c1ab30335667da9e872db90e8bb535b500dd6c1c7bb9c512f26bea53c1b1e2e41c4abfb4e4a27585872fa5e1b9a3bfd2a2df82a17c11e8279c426fae826a4e7e736a11e19571a3922842411df123dd2f0b6a4625d436e0d6740faf2c95fc217631d03c36c370a9f196aea7739089cd0379ae1bc86634263efb31b4649149c8293c51878591aabfade446f0e23c770b0ee022a84d066516fa2b0182149888f39f92c90d1b5a75bc10dded116695f3cd09a0989892a8a7f2fe95460c7341dd04dc54bef255d874373e84308af747adbc9074e21d7119e5aad9f021ba80bf2b279ddb3f6e6bc7d2981a5898b3019547cd29e04e2cb470b19a5305f8e60b020abdd7506a0db8455b55a2b68d640c3bfd0ac90614c3b5cd019f6a334bb857b644b19e39064fec5bc9b21dc36bc91486db77b4b05b84837b9b7c3f1305ad13f848002b88496657821d36ff9cbc75f87203c80f2763f496dd3470f4be64b2dea1cfb8ce83f1409f294e080383613000702d345b474c27eb656a37f31ee6b29a51a6f3986f81e8b43c931077170265e04c29fe872d5e5b156274a42dc2d860dc071a4e5b7371db21ed677ebd41ea6fdec04747803a20a98a6e4be65763c9b592613f97baf8af9e27dabb8917d04f51c187cb215e4ea7769edae195313787a41e4630a7ead988693427bec7e3342684575c175bdbd86e31b0712c5752880885948df22f9b85bbfc4be4c338716f62b89af7aa46572293e84fa1fea7483666daa30aef66b6cb1c4fa9b6f3e5372c430aa175eb18f194382543e6c6d6b0705635056767142b11c6c526e9d74686aac451a4c55bb931fca741166b6758298a0a31a988c1c599ba67974afea7d2f81277733e93e784c9abe01dcc58fe60fa6f7dc4f1b25311409607011c9ddaefcf12b4c87c3e11899677f23364d614caacc986b0f85a9a9871e13f3fe0870616cc7003f6620fe43959c5b9a7af68de3df2cce116f5dae1cd896066676d0b183d7d061b3d562c2e4311691467f45bf0ea745994b3f30b5fe46dafd62d18399a9f79882879d085413f980d81c57f993ea8f2f4c63b2cd04fa6ee94e5798c262d3d254f997f2b985afbc0342e4ea4f3e7b1ddb76bd60a780c869b0624e9c0c3e92d3b78c15e1240b78feb98d88d599f51ddd558e6d3c9cc9d78e42102a3fd167ed13f492357ca4d249104793e7b35e8743a5c8f90cf63bf7323099c0a5f9661b11a0eb6ee167da6839adbbe7e1d645c9e020633cacf29834585cdcfebdc79861b1c346628824bdd2a17c19c2a8a7ca80a19f2d4bfd8c0c43e4d01dfde49b5720d1457593f7f22fc1299cfd5e5d60d24f7fac53122e2a821b8b2cd5b1658c0fd60e1c153fce187230f4d04d58851ccc7330b5c53c8a59efd1fc6a2a351c8a4976c680186cf84f01cf9d701bbfaeb9f8cedc85251f90480fad3aca319d8b3b2e717ebfaed6494fb7427dfd11f3e6fe7c81c84a0eef53bd05b3005e46fc24619507cff821d092d6dc5995ac5428cb3c4b2591a64b31cdf9442f8a26964021cb508674511fbed3e2fd12879415252b315296dd15937cec7e5cc7cc016b0658a6ff920f5a9bf483bc70df5ca45ad744a0185090950658191115d1d4a65e7fe17c46831c53e594e7c35149c3729f5f52fb3305ccb8c8a9b3df9a2e155298861516453ee90c4b726649e1c8d7039b920e4b52cda369e619ad907f4c1ac54277d30c4b4f7f01d3ca461768fb6725ebd68d2a1cf5e6b413f18fea3ea345fe30bd6a4efa7b7022e112c44e3a076b63e94d6b6aeb95219219837b7df9ab57bc840fbeb6295a3ba3866485b0465342d726cb1881c91150ab8dbf46a7fed31a1304776ab7af005999acc1c5b680e9e517ef8d7b6a21a4af15926c0fc28bdba06faab7f94fd5f41c2a29d2cfd64e58290afeb3981b5e3b15a49d8370a1e7f88070e36dbeee932668320f2b6fa5030b83cf434ff0a7e47bafead059542a3c39490d06a87451deab2448211c3a3e1d8ecf8d34e7557b72636172e152d1848d28d70682c99e23632118c04bfd2658b2e33e5ce6803a739e89e4b2065868a14113f970c4418c7567636d8ed8c78087f8b9f9d5ac234d18d62c6fe33e80bdde4cc0574423a89e258bceb82c179c164cbddf1f5fc0d96434ce9c1a9e6ede9ed0921fd88961cee9c38abcdb96261076ab3e2247541ae1709006a9068eb6b48e08ccd17f17888b582758d72e66ea5cd8b8d7f3a4676c8994372be0b61fd5371ab4887c530f4c0c17c5e0e824c8818abc1192284cbc2e5870f21eb27a4249b91bde8389235aa889efc68cddfac47ae7d327e364f69264c96b3b705b71772163e974590369cacb68b186afb474d1bb632f3184d1e69d36d2e5bf7670526f7aef157f6ea7b466ce55b2a501e6b48130b435cf9614bded2caefbf1ba4136ac3d387c821f7ee5aa623f263905ade37fa68914d9819eb8534808e1a5c6f7f874e7f2d89659cc5f58558e9f939cf27f557825430e281032f7a376a3d12b578780d6ca7bb17bd231b8e5d5efaa73b8a86610d42880986923741c70193b902e26c1afd3a0f6f859e889cbeeeebcdf86aada58fdccf70334f76aee16b6741c3e8c41577946165b1df1d425d6d78eb29b0297319a8555bcf3e03d5db876035a027a3d4bfd07b5bceae5d0cbec0f994c595500a6ce6a6132c5604926c10bb8d7dd888883c18ed2fbfe77fa09cf801b3cc9f51d38e619695e3e1b595847d2d22a5fca063dca26ba0d254190543022bbb3939a7b424ac563d798b2b319667011e1178b5104a0551cc71785a05aea9d8e17237346d8acde7f8da24d29f953e70bb5b597b4d9fab45113cbacbefcbc5abf50ea401a902131f624285a9340aa0911f6fd6460a849aad036ff16b5c1429a07f24418d27efc232d94ba2e18381f498e33576aaebf79766a9391d9e7b5a8e5809ffebdff882f5b99aff22e94ac1906c4e84f69e95a15dc18b85b781a138c3b4142d46ba3dd6dc503f57b7cb1ad890aa62acc397176d06a1774947d410b477b01bf3598a04ec2a946d8033effb23c7d154353e70cb535d63733b1dde8d47ee8638f064372e45b7966c59f66e3849d06acfcf2e8ca54539ba1e6b14e67656f0cb3ba4f274c91f9dcb9e359e170e9c422406d2dd5e3355d2948ecfaf35b3d092cfdeedbdb0638d7c83980bea9e96ac6260dea889a95a9c1213783f76d1991aada96c029865317082c3923f969e291e17cd02fa35abb09a6a09f9dd98f28e8f34f0af8ab7e9515dd1840e4f4ed4263bc33544829f1560afa7e42ab7a6491575f594e3c16d61037d453f8094be522ef974dac789773a4f261c6b4660e4a83234cada3b768a4e10f9e240428ea531b91b65e6799ca55416e591e40d6273361879d347e5fd3334a469e500381970999b124820c2fe6f64874efb8a19fc08d0aeda0f85c9bee2d4009812cda6b2b1cccfe8af304a11b479bec2a72d483b6748bba5c2cb847ff891a65daa85795c7eeab1fdc7266b5358d724998af99a3c82aac5cf85e6f99c32e7cb19fbf5b0e4d44191c48c104da77635ec7c6a9c338f8b8b2b8ebe262d7dfa6d37cc32b7f769e50c560647d05f58b2fc31d3ec3395e648abe12b39c3064ca1e9d05ce0978384f8ca98e5904312183fc83356afae0576994472d014b4b77bc70c903e9790be5f9a35de53e6b0e04d4cbb00bec2566c4b50ae1de49579e97b8b203c52357eaddc0a18b2d2c5ea4a11cc84c2ab96f5a043fa0145e2bbe51acb29cd33d9186b3fa05406c80d12c67d5c981f2c3bc09e4945b7ebe4297a4210bede57f78d0896794ce553924f465e0ac04d78856e69ae535e3452f583acc36d90dbf2508b12e6750ff682215c5025685817000eacff21dec1208f9f29bdd329c4ed6dc35f3df879ce2c8dce8d90da1c281cfe3b288d6f30deb36199804ab500a1eea48ba402c6f639edc3d50bf97df54bfaafa2617641231c406b6356d1738541dd7c0bdfaf8a7923fd4738235f40a5e3aad53fa2e17f6732babc9b2ba57f30cfc89345bfea47a9e0153ff0e540e36d31251198b2420fc0352123508bfd52c378a27e3b8382548602d989cc25a1a8741f173bbaa66c3f4c36ce98a7e7d37564f1fb1de2a43f9534ff18204d1927f077a9e08a7cdbbd4322e5e9697ccd920687eacdab9c617b512307a7d6e558f441db97e91d7e03e84ef76df527886d1981c4850e6e6277aeac2cf88ffd6e6b7a266002e4e2e7e27f2058f8360f0bf49436129b8cbb69f3bd273b5f6abba1e75a80d1893964acced947f482aecb67de036a98ff0c2d964df62411e29b735a38b094d6c52b9d6722c15af25d72a96997c77dfdededa0fd5cf6ff9d9206f2692a8d3cd6ee28f20596d939b70bdec316be1a48ecd8cb65ff3ba892544b744c71273be326b705b50fb05c2dc7357b30cebf1b6e51579e5cddcb6a4969b5318729a86c5cbb7674d45217c7184aceaebab4f5f8a7f51608e798ab4defb44501578e483ae58da4ba3e649242451bde439af051dddf7c3eb680c9047c7b92bd2bc7cd637e8243c4a5ce6a5ec7d79c83a5b5cb8ac2edbd56b8257fa372862b0186a80a4e4753938119d119f96d5ee02709d5d02a4084f199d028cbf05dbed0acff0e1c1ecb1182babab8f73a81f67ce34b4ed51c397b3fafd120e1a5555294d9d6411abe3c1e2ad677918bffec497256458106f70c2e35b2b77c288a19465af8ef93f5c9bd2fc604fdfc4dfc7ed5c0be21962c16fda701b44bfc51339"}, {0xb0, 0x0, 0x0, "6f68e7caae97117ad0ddccbec4c95055b916912874257b4f9403cb82d00ba5c0740be541c9d55ba10a4ddfb2bf19e88e280b3f192303c3815d6ee04469e8b9feb489a7a1ab5126ef1ac7333c77bb556380fee5ed9fc25311e348031453b0091504f330b144cb0b3d08c53cac641fae632d151ecb34dea660d61eb7d33370cc49272cbdbe2cecce9aa3e9fddb3ac458e9efc85499ea24df84746ff082ac"}, {0x78, 0x0, 0x0, "bcbbe15430c5066471a628ba4fe14ba30a7d96e051328bd5f24c9f45cc089f15eae243ff0a33944da092aac19420243b3fc712d7c212a95af6e97ba624e90f7eb9899ffdfcb52c057e00b13aa252b79c38d76a7cf203b18e8bb3a8b83d5a6aef17b641221357d1"}, {0x88, 0x0, 0x0, "68d50c301b092c2c43a7d79afca5e62d7f4361aee97fd049db543ba2f5cbc79cf5b37f2dfc78af8178d2b593c1b0b2c94f85d237756f5ea74431c6ef096bb72c3af26ee22cb1b47b03a7c9121a061ece39bafa692aeee2e1aad448df1f23b0a24b01781b86fca84e918f4fe1c8910c267d425285"}], 0x1378}}, {{&(0x7f00000088c0)=@un=@abs, 0x80, &(0x7f0000009dc0)=[{&(0x7f0000008940)="79eba70819347a8dcd796f6e562dd5170f4d62dc081d3ef4a305907a21ed0a5e24a1838a3ca85bb7ac71b6bdb4e3d02a7501f5e47220bace587c381bd1a5ed366798c304be823de4d062f05f14351afbc568b1f3d9f040a53ab829a760bb79261f1909d607a4eefb6e1d77f015c0a9e108d106dabe7c9afa7824d07ad0ea37d30ce1313119d91fe42ab9675c93cbb4cdd70c8628f5e442c95240c2fdc844af11c8b146840f2d890cd0239a71bb3dc3ba6d0233cc5b85bd42d3ece2d5e5d84671f3c8d769d94983eafebbbe37e5c845a377cc4461ae0ae95109c5a02a9ffac72373aaa38129718f540a1b60a9", 0xec}, {&(0x7f0000008a40)="68b59313622600ec6be72a0b8485e56a538bede06156ab45c4e4678a7890fab5268c3b3eb9ec61388ee07e8384734a5e875bda589fe4ce59ea58c2b4f4a7360bd6920248e3615b5f2feb1c3e00e4e1a18e5761d08f885c1d95091cd5220b99fa87208b7748782e73bf90545012a4e47dad33cfb4525b95ab22f96b7d300cd262a2e16ffb5579122284dbc05002c6080c4926d5d9a6efa85edefa825764c7707ce195a002566d58a132bbedcb10b689b53074fcf696a7af6de2c74ff5ee034745614b6a04fe214705f489c3274c0047f16b73aa5d9ebb723cff64e643b44cb920907dc089a1194db1", 0xe8}, {&(0x7f0000008b40)="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", 0x1000}, {&(0x7f0000009b40)="e17f41c4c6f5b07f0636ca5d43739977786f2ba537d86708af7c3478d916b92de73f6267efaa00fa8d3620409bad555becd494437e94e8362a77cfe9928ee93b1f70a50cedf507641025df", 0x4b}, {&(0x7f0000009bc0)="67ca50c299d80b15ebb30574fe314328194048926c8e2e90c0a7c7e5d24141d53204d2390979d03ace7619a4422f5f7b6fc2b4d96a373e8a1e26ead4fb958efd1619706754e969122a60c87d5e32d96acd39d3f41bcc492a6587ca0a4f0ad10cc87f92", 0x63}, {&(0x7f0000009c40)="2401be", 0x3}, {&(0x7f0000009c80)="df6030fac3fa722e07d260515e1f44", 0xf}, {&(0x7f0000009cc0)="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", 0xff}], 0x8, &(0x7f0000009e40)}}], 0x8, 0x20040880) 02:58:55 executing program 5: clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x0, 0x3}, &(0x7f0000000100)={0x101}, &(0x7f0000000180)={0x0, r0+10000000}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x3]}, 0x8}) [ 349.530175][T15327] overlayfs: missing 'lowerdir' 02:58:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1800, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:55 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x2500, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @loopback}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, 0x0, 0x0) [ 349.830559][T15342] overlayfs: missing 'lowerdir' [ 349.854981][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 349.906657][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 02:58:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:56 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x48) 02:58:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4800, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:56 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet(r0, &(0x7f0000000680)={&(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000100)="fe", 0x1}], 0x2}, 0x0) 02:58:56 executing program 4: socketpair(0x0, 0xc, 0x0, &(0x7f0000000080)) 02:58:56 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 02:58:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4c00, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 350.506287][T15365] overlayfs: missing 'lowerdir' 02:58:56 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000080)={{0x3, @default}, [@default, @null, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x48) 02:58:56 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 02:58:56 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:56 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0xa, &(0x7f00000000c0), 0x0) [ 350.884625][T15386] overlayfs: failed to verify origin (bus/file0, ino=16373, err=-61) 02:58:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6800, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:57 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x23, 0x0, 0x0) 02:58:57 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt(r0, 0x0, 0x20, 0x0, 0x0) 02:58:57 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:57 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x1, 0x0) pwritev(r0, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000000)='F', 0x1}], 0x2, 0x0, 0x0) 02:58:57 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x4, &(0x7f0000000000), 0x0) 02:58:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6c00, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) open$dir(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') 02:58:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:58:57 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7400, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:58 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 02:58:58 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/cgroup\x00') ioctl$TUNSETSTEERINGEBPF(r0, 0xb702, 0x0) 02:58:58 executing program 5: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) 02:58:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7a00, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:58 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:58 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffce8}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') getpid() r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r2, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="110000000000000084000000ebff27030800003d658209712529fba3fb8b8e3e0000"], 0x18}, 0xfc) 02:58:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001640)={&(0x7f0000001500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000001540)=""/231, 0x2a, 0xe7, 0x1}, 0x20) 02:58:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xc000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:58 executing program 4: socketpair(0x2b, 0x1, 0x4, &(0x7f0000000000)) 02:58:58 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@nfs_export_on='nfs_export=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 352.706182][T15477] overlayfs: missing 'workdir' 02:58:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:58 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa215, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="18"], 0x18, 0x4000}, 0xfc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 02:58:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xa}]}]}}, &(0x7f00000000c0)=""/193, 0x2e, 0xc1, 0x1}, 0x20) 02:58:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x2000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:58 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffce8}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') getpid() r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r2, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="110000000000000084000000ebff27030800003d658209712529fba3fb8b8e3e0000"], 0x18}, 0xfc) 02:58:58 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@nfs_export_on='nfs_export=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x3000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 353.223092][T15492] overlayfs: missing 'workdir' 02:58:59 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x14}, 0x40) 02:58:59 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffce8}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') getpid() r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r2, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="110000000000000084000000ebff27030800003d658209712529fba3fb8b8e3e0000"], 0x18}, 0xfc) 02:58:59 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@nfs_export_on='nfs_export=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@struct={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/193, 0x2c, 0xc1, 0x1}, 0x20) 02:58:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 353.539670][T15512] overlayfs: missing 'workdir' 02:58:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:58:59 executing program 4: socketpair(0x2, 0x3, 0x21, &(0x7f0000000000)) 02:58:59 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0x0, 0x7ffb, 0xf12b73130cb7b4cb}, 0xc) socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/102400, 0x19000, 0x7301}, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x25, &(0x7f0000000000)}, 0x0) 02:58:59 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffce8}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') getpid() r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r2, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="110000000000000084000000ebff27030800003d658209712529fba3fb8b8e3e0000"], 0x18}, 0xfc) 02:58:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x5000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:58:59 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:58:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 354.127491][T15533] overlayfs: missing 'lowerdir' 02:59:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x2, 0x4, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000840), 0x84, r1}, 0x38) 02:59:00 executing program 5: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x2, 0x4, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, &(0x7f0000000240)=""/193}, 0x20) 02:59:00 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:59:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1}}]}}, &(0x7f0000000300)=""/209, 0x32, 0xd1, 0x7}, 0x20) 02:59:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 354.386029][T15549] overlayfs: missing 'lowerdir' 02:59:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:59:00 executing program 5: socketpair(0x2, 0x3, 0x0, &(0x7f0000000040)) 02:59:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x0, 0x2}]}}, &(0x7f00000000c0)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:59:00 executing program 4: bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xca7c, 0x1c3733, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x81, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x74d000, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:59:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x8000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:59:00 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) [ 354.838776][ T5] Bluetooth: hci0: command 0x0406 tx timeout [ 354.845460][ T5] Bluetooth: hci1: command 0x0406 tx timeout [ 354.853649][ T5] Bluetooth: hci2: command 0x0406 tx timeout [ 354.860490][ T5] Bluetooth: hci3: command 0x0406 tx timeout [ 354.986531][T15565] overlayfs: missing 'lowerdir' 02:59:00 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:59:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, &(0x7f00000000c0)=""/193, 0x1a, 0xc1, 0x1}, 0x20) 02:59:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x9000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:59:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x0, 0x0, 0x2}]}}, &(0x7f00000000c0)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:59:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001800)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c29184ff7f0000cef809606056fe5c34664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45ef4adf634be763289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d4022438c7127a0b802bff4e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea231a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae616b5054d1e7cb8af00006f4a8245ffa4997da9c77af4c0eb97fca585ef6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e2808271c896249ed85b980680b6c4a000000002b435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4a00fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c108285e71b5565b1768ee06969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b05945c74d4e06bc7b5b7e167004b4b6ab7929a57affe7d7fa29822aea82a660e717a04becff0f719197724f4fce10d3b62d7e8c7123d8ecbbc55bf404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377323ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd452277c3887d6116c6cc9d8046c216c1f895778cb25122a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1d010400005cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d70931945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba891cea599b079b4b4ba686fcdf240430a537a395dd73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83186c1526af6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af908bad959719c0000000000378a921c7f7f8433c2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205aa00b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f9360984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5002512bcbf9b24accfecb0f477db103463af2847e6ade5b9e065ec0d0ba58fedae5f08818fea475b169469f9efd131925d98c34b3cb26fe26796dd43b87e1cdee39f5cf21d2e80a64ac97e71cafc29bfb78db090dd12225efeda2e93bf7f6ba7865e9c375a780929dfa5a210bf5858e2a4ff8e8d1e8c9cceed07c6312b734c72510d335acc94f76e7078ce4066f1e0ac9429f8013683301277a11e25b248b61180cb6207a0e26757f3f1bfc6c27f3720d1fb74afb17f3b5239bc2243853d5234afb05ed6024e94dee34666c5b5522b54cb433efa54b4e9022533e6a4598b453c9e549847c89bdee957dfa9ded2bc1ec642735ed89989992d08d33b22b9f16fdcd1b681e4c72f32fa3334313e334cc140daec7dcb22f463457a1a5ac230bbded8625000000800791aa9e6fd7d3febc5f5b3d43b4349630a178450a04550f1dfe2470bc36619bc3854821cbd529b4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r2}, 0x10) setsockopt$sock_attach_bpf(r1, 0x10e, 0xc, 0x0, 0x0) 02:59:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0xc, 0xc, 0x2, [@volatile]}}, &(0x7f00000000c0)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 355.327304][T15588] overlayfs: option "workdir=./file0" is useless in a non-upper mount, ignore [ 355.376109][T15588] overlayfs: NFS export requires "redirect_dir=nofollow" on non-upper mount, falling back to nfs_export=off. [ 355.416234][T15588] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 02:59:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:59:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xa000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:59:01 executing program 4: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x60000200) 02:59:01 executing program 5: socket(0x1e, 0x0, 0x0) unshare(0x60000200) 02:59:01 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:59:01 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1c, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:59:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xb000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:59:01 executing program 1: bpf$MAP_CREATE(0x2, &(0x7f0000000040), 0x40) [ 355.924415][T15611] overlayfs: option "workdir=./file0" is useless in a non-upper mount, ignore [ 355.939169][T15614] IPVS: ftp: loaded support on port[0] = 21 [ 355.940208][T15615] IPVS: ftp: loaded support on port[0] = 21 [ 355.956668][T15611] overlayfs: NFS export requires "redirect_dir=nofollow" on non-upper mount, falling back to nfs_export=off. [ 356.008279][T15611] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 02:59:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xc000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:59:02 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:59:02 executing program 1: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, 0x0, &(0x7f00000000c0)={0x0, 0xea60}) 02:59:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x268, 0x1, 0x5, 0x3, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "23095d1366ec7be2d7d0579c664234de26f88859df5320c2072088da369a4839", "5182ffee84aac0774cbb32144c02eb7e5aaecec38ff3444e88dcb8dbe2931cdf"}}}]}, 0x268}}, 0x0) [ 356.400000][T15671] overlayfs: option "workdir=./file0" is useless in a non-upper mount, ignore [ 356.418420][T15671] overlayfs: NFS export requires "redirect_dir=nofollow" on non-upper mount, falling back to nfs_export=off. [ 356.452659][T15671] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 02:59:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:59:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) 02:59:02 executing program 1: r0 = syz_usb_connect$printer(0x2, 0x36, &(0x7f0000000d40)=ANY=[@ANYBLOB="12010000090000082505a8a40700000001010902240001010000000904000012070103000905010200ffe000000905820241"], 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000100)='/dev/hidraw#\x00', 0x0, 0x641) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x20, 0x0, 0x1}}) write$hidraw(r1, &(0x7f0000000540)='.', 0x1) syz_open_dev$char_usb(0xc, 0xb4, 0x0) syz_usb_disconnect(r0) syz_usb_connect$hid(0x2, 0x36, &(0x7f0000000200)=ANY=[], 0x0) 02:59:02 executing program 5: r0 = syz_usb_connect(0x0, 0x1ca, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) syz_usb_disconnect(r0) syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000f80)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, 0x0) syz_usb_control_io$cdc_ecm(0xffffffffffffffff, &(0x7f0000001300)={0x14, &(0x7f0000001200)={0x0, 0x30, 0x8a, {0x8a, 0x23, "48372c75145731d7c776478639f60e95316e958f34a283cc22b11bfa7bad72d93149da16f557c58dd6d495ead82428727ff6ff2908b3949b71ff7b72b7b9845a2c5a29683c47e0d4b12acc334820bcefaf354a879029440f0f836f03e81dc389e1aa5d92188330630954c7793a5eae5b520c0f4655caf429ffb7a8b98cd449b5680647ef50001f5a"}}, &(0x7f00000012c0)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f00000014c0)={0x1c, &(0x7f0000001340)={0x20, 0x5, 0xbc, "edd159820611978641da31973c9c42c7abc0d325a53ad09b0a54302a8a86ae23dc8fab154ce2e35a58d4d6a26ec14aacd99a373a5fbce575de50bc32f97d89907d3001aa545b5ac348b51423569826a78c19e0922d61e95776f976086dd562006e6ded1b4e1933640e4167a45e629309b1b461dbbf9321604d1adf9529d79593ef0431895592caf7dd2d2d228da94270abb7f7f1ba1ebe439c74c4b4cf859c433808e54c88bb6b595504f70a4201ea912773857ec4a0aafb5872fc90"}, &(0x7f0000001440)={0x0, 0xa, 0x1, 0x1}, &(0x7f0000001480)={0x0, 0x8, 0x1, 0x80}}) 02:59:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xd000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:59:02 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}]}) lsetxattr$trusted_overlay_origin(0x0, &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:59:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xe000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:59:02 executing program 4: r0 = syz_usb_connect(0x0, 0x1ca, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$cdc_ecm(0x0, 0x57, &(0x7f0000000f80)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x45, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x0, 0x0, 0x5}, [@call_mgmt={0x5}, @call_mgmt={0x5, 0x24, 0x1, 0x0, 0x2}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x0, 0x0, 0x6}}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x1, 0x0, 0x2}}}}}]}}]}}, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) syz_usb_control_io$cdc_ecm(r1, 0x0, &(0x7f00000014c0)={0x1c, &(0x7f0000001340)={0x20, 0x5, 0x15, "edd159820611978641da31973c9c42c7abc0d325a5"}, &(0x7f0000001440)={0x0, 0xa, 0x1, 0x1}, &(0x7f0000001480)={0x0, 0x8, 0x1, 0x80}}) 02:59:02 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}]}) lsetxattr$trusted_overlay_origin(0x0, &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) 02:59:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x10000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) 02:59:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x11000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 357.068430][ T2989] usb 2-1: new full-speed USB device number 8 using dummy_hcd [ 357.089753][ T9541] usb 6-1: new high-speed USB device number 8 using dummy_hcd 02:59:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x12000000, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000240)=""/193, 0x26, 0xc1, 0x1}, 0x20) [ 357.238537][T11333] usb 5-1: new high-speed USB device number 6 using dummy_hcd [ 357.439052][ T2989] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid maxpacket 1792, setting to 64 [ 357.449007][ T9541] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0xB has an invalid bInterval 0, changing to 7 [ 357.457348][ T2989] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid maxpacket 65, setting to 64 [ 357.488587][ T9541] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0 [ 357.517708][ T9541] usb 6-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 357.518599][ T2989] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 357.556954][ T9541] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x84 has an invalid bInterval 0, changing to 7 [ 357.597060][ T9541] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 357.609198][T11333] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0xB has an invalid bInterval 0, changing to 7 [ 357.636539][T11333] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0 [ 357.648905][ T2989] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.07 [ 357.652784][ T9541] usb 6-1: New USB device found, idVendor=0694, idProduct=0001, bcdDevice=12.7b [ 357.657961][ T2989] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 357.657974][ T2989] usb 2-1: SerialNumber: syz 02:59:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x283, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x2, 0x0) 02:59:03 executing program 2: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}]}) lsetxattr$trusted_overlay_origin(0x0, &(0x7f00000001c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) [ 357.690403][T11333] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 357.707741][T11333] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 has an invalid bInterval 0, changing to 7 [ 357.729423][T15693] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 357.736714][T15693] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 357.745219][ T9541] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 357.757099][T11333] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 357.789261][ T2989] hub 2-1:1.0: bad descriptor, ignoring hub [ 357.790522][ T9541] usb 6-1: config 0 descriptor?? [ 357.798954][ T2989] hub: probe of 2-1:1.0 failed with error -5 [ 357.816635][T11333] usb 5-1: New USB device found, idVendor=0694, idProduct=0001, bcdDevice=12.7b [ 357.838985][T11333] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 357.894561][T11333] usb 5-1: config 0 descriptor?? [ 357.992010][T15693] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 358.008683][T15693] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 358.088758][ T9541] legousbtower 6-1:0.0: LEGO USB Tower firmware version is 16.241 build 8191 [ 358.141594][ T9541] legousbtower 6-1:0.0: LEGO USB Tower #-160 now attached to major 180 minor 0 [ 358.173049][T11333] legousbtower 5-1:0.0: LEGO USB Tower firmware version is 16.241 build 8191 [ 358.188095][ T9541] usb 6-1: USB disconnect, device number 8 [ 358.200058][T11333] legousbtower 5-1:0.0: LEGO USB Tower #-159 now attached to major 180 minor 1 [ 358.223729][ T9541] legousbtower 6-1:0.0: LEGO USB Tower #-160 now disconnected [ 358.241698][T11333] usb 5-1: USB disconnect, device number 6 [ 358.259947][ T2989] usblp 2-1:1.0: usblp0: USB Bidirectional printer dev 8 if 0 alt 0 proto 3 vid 0x0525 pid 0xA4A8 [ 358.264823][T11333] legousbtower 5-1:0.0: LEGO USB Tower #-159 now disconnected [ 358.658460][ T9541] usb 6-1: new high-speed USB device number 9 using dummy_hcd [ 358.738421][T11333] usb 5-1: new high-speed USB device number 7 using dummy_hcd [ 359.018575][ T9541] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0xB has an invalid bInterval 0, changing to 7 [ 359.031499][ T9541] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0 [ 359.038569][T15693] usb 2-1: reset full-speed USB device number 8 using dummy_hcd [ 359.058389][ T9541] usb 6-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 359.078821][ T9541] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x84 has an invalid bInterval 0, changing to 7 [ 359.098442][ T9541] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 359.109599][T11333] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0xB has an invalid bInterval 0, changing to 7 [ 359.120788][T11333] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0 [ 359.130595][ T9541] usb 6-1: New USB device found, idVendor=0694, idProduct=0001, bcdDevice=12.7b [ 359.139805][ T9541] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 359.149290][T11333] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 359.163011][ T9541] usb 6-1: config 0 descriptor?? [ 359.168192][T11333] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 has an invalid bInterval 0, changing to 7 [ 359.200332][T11333] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 359.221997][T11333] usb 5-1: New USB device found, idVendor=0694, idProduct=0001, bcdDevice=12.7b [ 359.238064][T11333] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 359.262379][T11333] usb 5-1: config 0 descriptor?? [ 359.418519][ T9541] legousbtower 6-1:0.0: LEGO USB Tower firmware version is 16.241 build 8191 [ 359.459499][T15775] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 359.471253][T15775] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 359.518515][T11333] legousbtower 5-1:0.0: get version request failed: 0 [ 359.538495][ C0] usblp0: nonzero read bulk status received: -71 [ 359.551369][ T9541] legousbtower 6-1:0.0: LEGO USB Tower #-159 now attached to major 180 minor 1 [ 359.575736][ T9541] usb 6-1: USB disconnect, device number 9 [ 359.598842][ T9541] legousbtower 6-1:0.0: LEGO USB Tower #-159 now disconnected [ 359.705880][ T7] usb 2-1: USB disconnect, device number 8 [ 359.741779][ T7] usblp0: removed [ 359.764078][ T2989] usb 5-1: USB disconnect, device number 7 [ 359.780760][ T2989] general protection fault, probably for non-canonical address 0xdffffc0000000013: 0000 [#1] PREEMPT SMP KASAN [ 359.792495][ T2989] KASAN: null-ptr-deref in range [0x0000000000000098-0x000000000000009f] [ 359.800910][ T2989] CPU: 0 PID: 2989 Comm: kworker/0:2 Not tainted 5.10.0-rc7-syzkaller #0 [ 359.809398][ T2989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.819635][ T2989] Workqueue: usb_hub_wq hub_event [ 359.824668][ T2989] RIP: 0010:tower_disconnect+0x4e/0x300 [ 359.830205][ T2989] Code: 00 00 00 48 89 d8 48 c1 e8 03 42 80 3c 38 00 74 08 48 89 df e8 93 a9 07 fc 48 8b 1b 48 8d bb 98 00 00 00 48 89 f8 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 58 02 00 00 0f b6 83 98 00 00 00 89 44 24 [ 359.849832][ T2989] RSP: 0018:ffffc900012675c8 EFLAGS: 00010202 [ 359.855904][ T2989] RAX: 0000000000000013 RBX: 0000000000000000 RCX: 0000000000040000 [ 359.863877][ T2989] RDX: ffffc900164f9000 RSI: 0000000000002fb3 RDI: 0000000000000098 [ 359.871854][ T2989] RBP: ffff88801c081000 R08: dffffc0000000000 R09: fffffbfff1dd406d [ 359.879822][ T2989] R10: fffffbfff1dd406d R11: 0000000000000000 R12: 00000000ffffffed [ 359.887790][ T2989] R13: ffff88801c081000 R14: ffffffff8c712810 R15: dffffc0000000000 [ 359.895766][ T2989] FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 359.904692][ T2989] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 359.911266][ T2989] CR2: 000055725239d70f CR3: 0000000015381000 CR4: 00000000001506f0 [ 359.919227][ T2989] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 359.927203][ T2989] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 359.935164][ T2989] Call Trace: [ 359.938453][ T2989] usb_unbind_interface+0x1d5/0x840 [ 359.943648][ T2989] ? usb_driver_release_interface+0x1c0/0x1c0 [ 359.949792][ T2989] device_release_driver_internal+0x51e/0x7b0 [ 359.956036][ T2989] bus_remove_device+0x2ff/0x420 [ 359.960990][ T2989] device_del+0x5e1/0xb80 [ 359.965336][ T2989] usb_disable_device+0x427/0x810 [ 359.970366][ T2989] usb_disconnect+0x36f/0x8a0 [ 359.975142][ T2989] hub_port_connect+0x21e/0x2540 [ 359.980388][ T2989] ? hub_port_connect_change+0x5ed/0xb00 [ 359.986157][ T2989] ? hub_port_connect_change+0x5ed/0xb00 [ 359.991790][ T2989] hub_port_connect_change+0x600/0xb00 [ 359.997250][ T2989] ? hub_handle_remote_wakeup+0x18d/0x3f0 [ 360.002976][ T2989] port_event+0xae9/0x10a0 [ 360.007403][ T2989] ? _raw_spin_unlock_irq+0x1f/0x40 [ 360.012612][ T2989] hub_event+0x417/0xcb0 [ 360.016850][ T2989] ? rcu_read_lock_sched_held+0x41/0xb0 [ 360.022397][ T2989] process_one_work+0x789/0xfc0 [ 360.027262][ T2989] worker_thread+0xaa4/0x1460 [ 360.032121][ T2989] ? rcu_lock_release+0x20/0x20 [ 360.037398][ T2989] kthread+0x39a/0x3c0 [ 360.041489][ T2989] ? rcu_lock_release+0x20/0x20 [ 360.046607][ T2989] ? kthread_blkcg+0xd0/0xd0 [ 360.051199][ T2989] ret_from_fork+0x1f/0x30 [ 360.055707][ T2989] Modules linked in: [ 360.085170][ T2989] ---[ end trace 33b5fdb6a443e328 ]--- [ 360.106486][ T2989] RIP: 0010:tower_disconnect+0x4e/0x300 [ 360.115451][ T2989] Code: 00 00 00 48 89 d8 48 c1 e8 03 42 80 3c 38 00 74 08 48 89 df e8 93 a9 07 fc 48 8b 1b 48 8d bb 98 00 00 00 48 89 f8 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 58 02 00 00 0f b6 83 98 00 00 00 89 44 24 [ 360.140557][ T2989] RSP: 0018:ffffc900012675c8 EFLAGS: 00010202 [ 360.146662][ T2989] RAX: 0000000000000013 RBX: 0000000000000000 RCX: 0000000000040000 [ 360.156538][ T2989] RDX: ffffc900164f9000 RSI: 0000000000002fb3 RDI: 0000000000000098 [ 360.167682][ T2989] RBP: ffff88801c081000 R08: dffffc0000000000 R09: fffffbfff1dd406d [ 360.179602][T11334] Bluetooth: hci5: command 0x0406 tx timeout [ 360.183453][ T2989] R10: fffffbfff1dd406d R11: 0000000000000000 R12: 00000000ffffffed [ 360.195762][ T2989] R13: ffff88801c081000 R14: ffffffff8c712810 R15: dffffc0000000000 [ 360.206399][ T2989] FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 360.216114][ T2989] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 360.224083][ T2989] CR2: 0000557252352708 CR3: 000000001c695000 CR4: 00000000001506f0 [ 360.234257][ T2989] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 360.243407][ T2989] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 360.252156][ T2989] Kernel panic - not syncing: Fatal exception [ 360.258787][ T2989] Kernel Offset: disabled [ 360.263126][ T2989] Rebooting in 86400 seconds..