[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 84.237773][ T27] audit: type=1800 audit(1580857210.425:25): pid=9411 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 84.259597][ T27] audit: type=1800 audit(1580857210.425:26): pid=9411 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 84.290602][ T27] audit: type=1800 audit(1580857210.425:27): pid=9411 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.109' (ECDSA) to the list of known hosts. 2020/02/04 23:00:22 fuzzer started 2020/02/04 23:00:24 dialing manager at 10.128.0.26:40485 2020/02/04 23:00:24 syscalls: 2939 2020/02/04 23:00:24 code coverage: enabled 2020/02/04 23:00:24 comparison tracing: enabled 2020/02/04 23:00:24 extra coverage: enabled 2020/02/04 23:00:24 setuid sandbox: enabled 2020/02/04 23:00:24 namespace sandbox: enabled 2020/02/04 23:00:24 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/04 23:00:24 fault injection: enabled 2020/02/04 23:00:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/04 23:00:24 net packet injection: enabled 2020/02/04 23:00:24 net device setup: enabled 2020/02/04 23:00:24 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/02/04 23:00:24 devlink PCI setup: PCI device 0000:00:10.0 is not available 23:02:59 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x4c02, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x412080, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x2, 0xb, 0x1, r1}) getsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f00000000c0)=""/9, &(0x7f0000000100)=0x9) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0xa00, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f00000001c0)) lremovexattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@random={'user.', '/dev/ion\x00'}) r4 = syz_open_dev$vcsu(&(0x7f0000000280)='/dev/vcsu#\x00', 0xb15, 0x400080) ioctl$IOC_PR_PREEMPT_ABORT(r4, 0x401870cc, &(0x7f00000002c0)={0x1, 0xffffffff, 0x5, 0x4}) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000340)={0x8, 0x2, 0x4, 0x20000, 0x8d, {r5, r6/1000+30000}, {0x2, 0x0, 0x4, 0x0, 0x6, 0xff, "7546f9ec"}, 0x5fa6, 0x2, @fd=r1, 0xac000000, 0x0, r0}) ioctl$GIO_FONTX(r8, 0x4b6b, &(0x7f00000007c0)={0x108, 0x1c, &(0x7f00000003c0)}) r9 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r9, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x38, 0x2, 0x1, 0x101, 0x0, 0x0, {0x0, 0x0, 0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xc4}, 0x8840) r10 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000900)='/dev/snapshot\x00', 0x44c280, 0x0) ioctl$SIOCRSGL2CALL(r10, 0x89e5, &(0x7f0000000940)=@bcast) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000980)={0xffffffffffffffff}) r12 = syz_genetlink_get_family_id$gtp(&(0x7f0000000a00)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r11, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, r12, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_O_TEI={0x8, 0x9, 0x3}]}, 0x24}}, 0x4040800) r13 = openat$vsock(0xffffffffffffff9c, &(0x7f00000038c0)='/dev/vsock\x00', 0xa001, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r13, 0x84, 0x66, &(0x7f0000003900)={0x0, 0xfff}, &(0x7f0000003940)=0x8) ioctl$SIOCX25SCUDMATCHLEN(r10, 0x89e7, &(0x7f0000003980)={0x2e}) r14 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000039c0)='/dev/vcsa\x00', 0x4000, 0x0) r15 = syz_genetlink_get_family_id$tipc(&(0x7f0000003a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r14, &(0x7f0000003b00)={&(0x7f0000003a00)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000003ac0)={&(0x7f0000003a80)={0x1c, r15, 0x200, 0x70bd29, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x5000}, 0x4040010) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f0000003b40)=0xfff9, 0x2) r16 = creat(&(0x7f0000003b80)='./file0\x00', 0x0) pipe(&(0x7f0000003bc0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r16, 0xab00, r17) syzkaller login: [ 253.185102][ T9579] IPVS: ftp: loaded support on port[0] = 21 23:02:59 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x100, 0x3, {r0, r1/1000+30000}, {0x8d43a2660e568545, 0x8, 0x5, 0x0, 0x3, 0x2, "c761fc2f"}, 0x3, 0x3, @userptr=0x53d, 0x20, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f00000000c0)={0x0, @bt={0x0, 0x3, 0x0, 0x2, 0xff, 0x0, 0x19d, 0x0, 0x1000, 0x5, 0x0, 0x3, 0x2, 0x400, 0x4, 0x1, {0x81, 0x3}, 0xc, 0x56}}) r3 = socket$phonet(0x23, 0x2, 0x1) write$binfmt_script(r3, &(0x7f0000000440)={'#! ', './file0', [{0x20, 'vmnet1self'}, {}, {0x20, 'vmnet1wlan1wlan1'}, {0x20, '.:.eth1[eth1'}, {0x20, 'proc!'}, {0x20, '^nodevGPL'}, {0x20, '\x00'}], 0xa, "155d0b2629ed201bbb82cf21660f37e0046d8e0f7927564178aa063e9862cdb13902777aaa2fa22c050a75cb6b434eec4aa7abc46a8396e609be4cde2e7ff1df065c696ee046436e04d0ab0d44251ea50b21"}, 0x99) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0xc0000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000600)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) statx(0xffffffffffffffff, &(0x7f0000000740)='./file0\x00', 0x6000, 0xfff, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000880)={{{@in=@empty, @in6=@mcast1, 0x4e20, 0x0, 0x4e20, 0x7, 0xa, 0x190, 0x20, 0x33, r5, r6}, {0x6, 0x1, 0x7, 0x20, 0x7, 0x800, 0x0, 0x6e}, {0x10001, 0x2, 0xbdf, 0x7}, 0x7e0, 0x0, 0x1, 0x0, 0x2, 0x1}, {{@in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2b}}, 0x4d2, 0x3c}, 0x2, @in6=@local, 0x3504, 0x2, 0x0, 0x6, 0x400, 0x49, 0xdd}}, 0xe8) r7 = syz_open_dev$media(&(0x7f0000000980)='/dev/media#\x00', 0x4, 0x705203) sendmsg$IPSET_CMD_RENAME(r7, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x34, 0x5, 0x6, 0x5, 0x0, 0x0, {0x2, 0x0, 0x4}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0xc044011}, 0x0) r8 = request_key(&(0x7f0000000ac0)='.dead\x00', &(0x7f0000000b00)={'syz', 0x3}, &(0x7f0000000b40)='keyring*^\x00', 0xfffffffffffffffa) r9 = add_key$keyring(&(0x7f0000000b80)='keyring\x00', &(0x7f0000000bc0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r8, 0x14, r9) r10 = socket$rds(0x15, 0x5, 0x0) sendmsg(r10, &(0x7f0000001000)={&(0x7f0000000c00)=@llc={0x1a, 0x104, 0x0, 0x9, 0x3, 0xc8, @link_local}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000c80)="b21a49e0593f03d0f18b0c2681a4ce068e353424f5bda2fc18f32d0ef0a3ff9f65c6d4816eaace1529bb5c0ebee3f2709d4eb2832e1dde95296401bcd713dfce94999ef3392b3fe3182ffaed848fd4595bb7ce9505fa78cdfc2291cceea0719645d9831d77f5dcfe3cf9efccec4b7c23b7baade635243e04226a6e896652e3764c37c668e8638295a0420b5ea014badad621cf61e09b7fa68f23eb0173f92c170ac374772465f26a03a6943976b090f4d1a7320e", 0xb4}, {&(0x7f0000000d40)="de40ebdeceae01aa252d2f90a54b47528a85068ed2fce9f4f30083643a5dbfa24988e4dfd806567c93022dad9a4050b91788f433355717d8611d476ab328b800f9c434017a9f2487dbdff080f585909fee2a990413fed6b4d9ffdd867b35e05c52d9975a4fdbc5d0a0a6f931b0288ec83194f811d8bd64316c29dd8ba6fdc45f3028929adf788d573886ee4494703da60df1e1ca9902bca493083d12d9897b0e50c8e96f261184e0722ab2fb51368a98c1cb69e62fc1183acd27785ce344e0592dd6b4d2c900110a9c564909c56861", 0xcf}, {&(0x7f0000000e40)="9bd37d9889d938ef21cbe685683bbb79d06f11b665fc82fa994593cdf78b495bb361c27f32b54528697cc3e5990dc3afadfcbe042e86cff59dfb5a9443119f41934a037b26ced2f14a7f7f905ef40519fc405ae53f8a88d3c28f2d6f157e64cf19d91447ce01acb9431d29a922eb94cb2ca7ed7a54a0bcbbd785308ccaa4928b0e0c5204eae1da9a8ffe88afdf241e8520df6ae14dbd9be24e63f1c62102920e35b131e43a0914c12a4e0e38f74cf080a3abc37d60cb26a04039f26093000d", 0xbf}, {&(0x7f0000000f00)="0b485b13265654c38c8abc5755663cbb4beecb7057ad511e6b188d4cffdcd510f1cae08a6fa75fd6f00fd987b1b5f977d6d3c0b89f94fcf9ca8d13f682e932c291adf282a8eb08cd37e246f60826c058aa9177586ed28e140511c44c53ea73bef4a18bbf5739c82f4b8e45c4876bed7f5062f1c9fa1fac86f3b9c19749bd9e7ae80980513d89a284307ed3", 0x8b}], 0x4}, 0x4004010) r11 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001040)={r7}) connect(r11, &(0x7f0000001080)=@pppol2tpv3={0x18, 0x1, {0x0, r12, {0x2, 0x4e21, @multicast2}, 0x3, 0x1, 0x0, 0x2}}, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000001340)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000001300)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000001380)={0x5, 0x10, 0xfa00, {&(0x7f0000001100), r13, 0x2}}, 0x18) syz_open_pts(r2, 0x0) r14 = syz_open_dev$admmidi(&(0x7f00000013c0)='/dev/admmidi#\x00', 0x7fffffff, 0x20100) ioctl$VIDIOC_PREPARE_BUF(r4, 0xc058565d, &(0x7f0000001400)={0x2, 0xb96ef72bca50a6ab, 0x4, 0x400000, 0x7fff, {0x0, 0x7530}, {0x0, 0x0, 0x4, 0x1, 0x3, 0x1, "f1511c41"}, 0x81, 0x3, @fd, 0x5, 0x0, r14}) r15 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001480)='/dev/uinput\x00', 0x802, 0x0) signalfd(r15, &(0x7f00000014c0), 0x8) r16 = syz_open_dev$vcsa(&(0x7f0000001500)='/dev/vcsa#\x00', 0x1f40, 0x200) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000015c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000001580)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r16, &(0x7f0000001600)={0x1, 0x10, 0xfa00, {&(0x7f0000001540), r17}}, 0x18) r18 = syz_open_dev$sndtimer(&(0x7f0000001640)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r18, 0x80e85411, &(0x7f0000001680)=""/87) [ 253.301392][ T9579] chnl_net:caif_netlink_parms(): no params data found [ 253.382894][ T9579] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.391714][ T9579] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.400554][ T9579] device bridge_slave_0 entered promiscuous mode [ 253.410032][ T9579] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.418344][ T9579] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.426588][ T9579] device bridge_slave_1 entered promiscuous mode [ 253.455461][ T9579] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 253.467330][ T9579] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.496778][ T9579] team0: Port device team_slave_0 added [ 253.506176][ T9579] team0: Port device team_slave_1 added [ 253.526183][ T9584] IPVS: ftp: loaded support on port[0] = 21 [ 253.527969][ T9579] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 253.540774][ T9579] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 253.574013][ T9579] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 23:02:59 executing program 2: truncate(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x90) syz_mount_image$erofs(&(0x7f0000000080)='erofs\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x5, &(0x7f0000000500)=[{&(0x7f0000000100)="232452d2402970cb4cb6b569331cda8c6fad9a1aa48990f06baf7e5c059a1cf3e357b252adcdedad3b189dba066b0bbcee1d1a6c0a20e466e99b81e601c1fd602326a3330a0ba19160d7d946601cfa41d81cca6c3da7fd0be68eb7a4cf4ad87e39d5d3ef5e46d2c8ebd5e9a9240af2c715bd7302667b510e12e7fb68bb86e128ef3a4ba9dd848c82b947debd95a76148a4a1f7c58e074c195afe158a21ac7ec661e11aed51093e420ececad4e3f9e154f61d764f0705cbc70bab8e4569", 0xbd, 0x2c}, {&(0x7f00000001c0)="d132428dbb63fdf793634f799d7906f4ff78ebd5631ff4596671ab975f2a81366b85324988de067d5fc4bd379f45da4388fba9df276bd2b50f8dbc591ddcd1f4f29b2a04861ee1e023040202430f472c5a797392bbf443e4f2307159cdde2ef3cc68372183458e4396ec6f61001b408eb00ea0ae1926bfdff87b6d2dfe04d16b8f738157f7462c037bddf7f6656ad68b00839a53e70a06e275e15593d52329dfcda036a5e7e6b23a", 0xa8, 0x55}, {&(0x7f0000000280)="6767ca8fea55e378def15b437816877b6493907a8dd5246cea3daef1707675f06cac04a5d0fb71ce4982e497a20b3198af370d8ec3921e1f1a5109ece0001d80256ccb36f89d8bc6e46104dba8a0660cfcde099aa8467c7c05ea0ffa4a0ba5c7dd75e745b416fb41d0401dbd0f4c6b533a0faaebaaa346f7f3ee9699f1eb8dc99c192e389794e2fb91dbd78e0e7b0dc84bac0dd138bc631faecbc1c0ac60c962161b", 0xa2, 0x4}, {&(0x7f0000000340)="adb8dc28c72352d355ab6222227fabfd497b8bbe35d2778be1d7dd2badbb0cb5fc07ca22d0c69ce7f13e40940c9ee14139cc3a9d20c710da7ee698ae7eea269f2fc9368fdaa1d8b738038704e59251237b70375fb31a4b7d1e92ab8103a51d1e6830028e9c9e7bbb0422d1fbf512d296f85e65645d7c7017e57a913c8b3547938d71b8fd11", 0x85, 0x4}, {&(0x7f0000000400)="cb3c4aeb14ef223fa016172767dbdcd99c1157f4ee416833b2c809550f15f041eb65a18358646a57f9ae78f4f846c420896e6bb65094ec7ed68d5e0ebb337cec155e9fe2c805abc45c65c6524f99cb982869a8d80edbe7a32f2d9c9766ed123278e9d819072bde93da431974daf176020a184c90b44791035532fca4a3d6bb2da1759813fe4a32e21cc79b3ea8b8cb567c89f15794a8a50cf4a158a9d46ab5e4a80d80c9ed9c4ca56658c246c718aa13491b2c9d9b57a80b9213623adf0404798fa1", 0xc2, 0x5a3a}], 0x318441, &(0x7f0000000580)={[{@fault_injection={'fault_injection', 0x3d, 0x2}}], [{@dont_appraise='dont_appraise'}, {@obj_user={'obj_user', 0x3d, 'cpuset'}}]}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000600)={0x0, 0x7, 0x1f, 0x800, 0x4, 0x3ff}, &(0x7f0000000640)=0x14) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000680)={r1, @in6={{0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0xa}, 0x32}}}, 0x84) bind$netlink(r0, &(0x7f0000000740)={0x10, 0x0, 0x25dfdbfb, 0x100}, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000780)='net/ip6_flowlabel\x00') ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f00000007c0)=0x3) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vcs\x00', 0x10002, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880)='batadv\x00') sendmsg$BATADV_CMD_GET_DAT_CACHE(r3, &(0x7f0000000940)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r4, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4008040}, 0x4008005) r5 = syz_open_dev$vcsu(&(0x7f0000000980)='/dev/vcsu#\x00', 0x2, 0x105000) accept(r5, &(0x7f00000009c0)=@isdn, &(0x7f0000000a40)=0x80) rt_sigsuspend(&(0x7f0000000a80)={[0x8]}, 0x8) socket$inet6(0xa, 0x3, 0xd5) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/sequencer2\x00', 0x200000, 0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/vcs\x00', 0xa0000, 0x0) ioctl$FS_IOC_SETVERSION(r6, 0x40087602, &(0x7f0000000d80)=0x1000) r7 = syz_open_dev$vcsu(&(0x7f0000000dc0)='/dev/vcsu#\x00', 0x324a, 0x18000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000e00)={0x0, 0x81, 0x1f}, &(0x7f0000000e40)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f0000000e80)={r8, @in6={{0xa, 0x4e22, 0x50, @mcast2, 0x1}}, 0x10000, 0x6, 0x6, 0x7, 0xe1, 0x3a000000, 0x11}, &(0x7f0000000f40)=0x9c) capget(&(0x7f0000000f80)={0x20071026, 0xffffffffffffffff}, &(0x7f0000000fc0)={0x10000, 0x401, 0x4, 0x8, 0x8, 0x1}) r9 = geteuid() ioprio_get$uid(0x0, r9) r10 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r10, 0x6, 0x13, &(0x7f0000001040)=0x1, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000001080)={0xa, 0x4e23, 0x3, @remote, 0x1ff}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f00000010c0)=""/153, &(0x7f0000001180)=0x99) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f00000011c0)={0x1, 0x4, 0xff}) syz_open_dev$mice(&(0x7f0000001200)='/dev/input/mice\x00', 0x0, 0x28800) [ 253.601450][ T9579] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 253.608432][ T9579] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 253.635949][ T9579] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 253.734992][ T9579] device hsr_slave_0 entered promiscuous mode [ 253.811975][ T9579] device hsr_slave_1 entered promiscuous mode 23:03:00 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x420, 0x130, 0x0, 0x0, 0x338, 0x338, 0x338, 0x4, &(0x7f0000000000), {[{{@uncond, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x101, 0x2, 0x3, 0x1, 0x0, "f1f7e18d39a0b04dd1b789325364ab3196fcdcd426b4594cf0503b3cd03d35f23ff9637ee03e1f827429dc9edab9a3f82abe878fe2fda1054c53ec41bf3e6695"}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x2, 0x3, {0x4}}}}, {{@uncond, 0xc0, 0x108}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00', {0x6}}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x470) rt_sigpending(&(0x7f00000004c0), 0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000540)) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000600)={0xfffffff, 0x2, 0x9, 0xffffffffffffffff, 0x0, &(0x7f00000005c0)={0x990a6d, 0x339ebde, [], @p_u8=&(0x7f0000000580)=0xff}}) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000680)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVE(r2, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x40, r3, 0x20, 0x1c200000, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @rand_addr="b5e2bdc082656572bb2bd1fe4acf2cb2"}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x28}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @broadcast}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}]}, 0x40}, 0x1, 0x0, 0x0, 0x4008080}, 0x844) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000780)=0x4d1, 0x4) r4 = request_key(&(0x7f00000007c0)='rxrpc\x00', &(0x7f0000000800)={'syz', 0x3}, &(0x7f0000000840)='\x00', 0x0) keyctl$setperm(0x5, r4, 0x1040000) fcntl$getownex(r0, 0x10, &(0x7f0000000880)={0x0, 0x0}) r6 = getpid() tgkill(r5, r6, 0x35) r7 = accept$alg(r1, 0x0, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f00000008c0), &(0x7f0000000900)=0x4) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/dlm-control\x00', 0x101000, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r8, 0x6, 0x2, &(0x7f0000000a40)={0x101, "87422f"}, 0x6) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000a80)={0xaa, 0x1}) setsockopt$inet_sctp_SCTP_EVENTS(r7, 0x84, 0xb, &(0x7f0000000ac0)={0xf5, 0x1, 0xf8, 0x7, 0x1, 0x7f, 0x6e, 0x1, 0x6, 0x8, 0x81, 0x3, 0x2e}, 0xe) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000b00)={0x0, 0x6}, &(0x7f0000000b40)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000b80)={r9, @in6={{0xa, 0x4e20, 0x2, @remote, 0x4}}, [0x5, 0x1, 0x60000, 0x80000001, 0x96, 0x1000, 0x6, 0x7fffffff, 0x3, 0x2, 0x7, 0x179f, 0x0, 0x662, 0x3f]}, &(0x7f0000000c80)=0x100) openat$null(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/null\x00', 0x480, 0x0) ioctl$KDENABIO(r0, 0x4b36) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/zero\x00', 0xa0400, 0x0) ioctl$BLKGETSIZE(r10, 0x1260, &(0x7f0000000d40)) syz_open_dev$admmidi(&(0x7f0000000d80)='/dev/admmidi#\x00', 0x3, 0x2200) r11 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$KDGETMODE(r11, 0x4b3b, &(0x7f0000000e00)) setsockopt$inet6_dccp_int(r1, 0x21, 0x6, &(0x7f0000000e40)=0x1, 0x4) [ 253.887081][ T9586] IPVS: ftp: loaded support on port[0] = 21 [ 254.037858][ T9584] chnl_net:caif_netlink_parms(): no params data found [ 254.141087][ T9589] IPVS: ftp: loaded support on port[0] = 21 23:03:00 executing program 4: ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000000)={0x3, 0x1, 0x4, 0x400000, 0x115, {}, {0x4, 0x2, 0x5e, 0x20, 0x7, 0x20, "7c7bfa18"}, 0x2, 0x4, @userptr=0x8, 0x393, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000080)={0x1, 0x5, {0x2, 0x1, 0x1, 0x1, 0x3c9b}, 0x1f}) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000100)=""/143) r1 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x5, 0x42480) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, &(0x7f0000000200)={0x8, "97ea52e634c00bf42aeae2bd6ec6ec291b0d10823f0582c80d83721dc71f4daf", 0x3, 0x1}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x220080, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x800, 0x3, 0x4, 0x10, 0x81, {r2, r3/1000+10000}, {0x3, 0x2, 0x1f, 0x7, 0xff, 0xff, "05d66bc6"}, 0x63ba, 0x2, @userptr=0x3, 0xfffffffd, 0x0, 0xffffffffffffffff}) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000340)={0x4}) semget(0x2, 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0x0) r5 = add_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, r5, 0x0, 0x0, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000400)={0x3, 0x1ff, 0x20, 0x806e, 0xa, "d50db6cbdb8c7a83"}) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000440)={0x1, 0x1, [@broadcast]}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480)='NLBL_CALIPSO\x00') r6 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vsock\x00', 0x2, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r6, 0x80044326, &(0x7f0000000500)=0x5) r7 = semget$private(0x0, 0x2, 0x80) semctl$GETNCNT(r7, 0x1, 0xe, &(0x7f0000000540)=""/169) r8 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vcsu\x00', 0x8000, 0x0) getsockopt$llc_int(r8, 0x10c, 0x8, &(0x7f0000000640), &(0x7f0000000680)=0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000006c0)={0x80000000, 0x1, 0x4, 0x4000, 0x0, {}, {0x5, 0xc, 0x8, 0x9, 0xff, 0x6, "7e2fa84d"}, 0x7, 0x3, @offset=0x7, 0x3f, 0x0, r8}) bind$bt_hci(r9, &(0x7f0000000740)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r10 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000780)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$BLKFLSBUF(r10, 0x1261, &(0x7f00000007c0)=0xfff) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000800)={0x5, 0x2, 0xd000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r11 = syz_open_dev$mice(&(0x7f0000000840)='/dev/input/mice\x00', 0x0, 0x503801) ioctl$ifreq_SIOCGIFINDEX_team(r11, 0x8933, &(0x7f0000000880)={'team0\x00'}) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f00000008c0)) [ 254.329816][ T9584] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.360572][ T9584] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.368468][ T9584] device bridge_slave_0 entered promiscuous mode [ 254.393798][ T9584] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.410599][ T9584] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.418618][ T9584] device bridge_slave_1 entered promiscuous mode [ 254.487887][ T9586] chnl_net:caif_netlink_parms(): no params data found [ 254.514041][ T9584] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 254.573740][ T9584] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 23:03:00 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x169400) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r0, 0xc00464be, &(0x7f0000000040)) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000000c0)={0x7f, 0xa, 0x4, 0x40000, 0x1, {0x0, 0x2710}, {0x4, 0x1, 0x3, 0x5, 0x9, 0x5, "8518712e"}, 0x7, 0x1, @planes=&(0x7f0000000080)={0x0, 0xfffffff7, @mem_offset=0xfffffe00, 0x7}, 0x100, 0x0, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000140)=0x7, 0x4) lsetxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@v1={0x2, "751c4361646ba5093073a06516fef8b5a4daf2"}, 0x14, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000002c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x5c, r3, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:dhcp_etc_t:s0\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x48040}, 0x1) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, 0xe, 0x6, 0x401, 0x0, 0x0, {0x2, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000080}, 0x90) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000700)=0xc) syz_mount_image$hfsplus(&(0x7f0000000500)='hfsplus\x00', &(0x7f0000000540)='./file0\x00', 0x101, 0x1, &(0x7f0000000680)=[{&(0x7f0000000580)="33cdb17e5dcf375b5b24829f8e4501c50d7d8943bc469a03957473d8e405f0fee1164ca21214c1bc6166be08d3dec11ca63da71b49e3a72b376bfa443341fec6279399fa421c4d545f3b3654ff3957309a88d770107b2481b8d51c70299bf92d403a335fc6073b4700d86374fd399eef506cdf8fbed17c8c0ef16260cbf42c330e26aef6daa580efa478a53b4abe923ce347097cca03a0cf8f3f65834fa32082cb4debc3b509ae69b311a3ba0a45f50209405b3367114e0d4399e8dd91863fc182b09b0710857645cbe90ac7226da1c3596accee920b1a366a8e927e2d763beeeff783bd329a3bda5953", 0xea, 0x9}], 0x40000, &(0x7f0000000740)={[{@uid={'uid', 0x3d, r4}}, {@session={'session', 0x3d, 0x7fff}}, {@part={'part', 0x3d, 0x100000000000}}, {@nodecompose='nodecompose'}, {@umask={'umask', 0x3d, 0x5}}, {@barrier='barrier'}, {@umask={'umask', 0x3d, 0x8}}]}) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ocfs2_control\x00', 0x4000, 0x0) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000840)={0xe, {0x8, 0x20, 0x40, 0x21, "2b5eb84d5ba7f84da5d4f55de776cfe41bd1a544be898fe4394e8c5d8882a92b2a"}}, 0x2d) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000880)='tls\x00', 0x4) r6 = syz_open_dev$vcsu(&(0x7f00000008c0)='/dev/vcsu#\x00', 0x6, 0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000900)={0x0, 0x7, 0x2, 0x3, 0x3, 0x9}, &(0x7f0000000940)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000000980)={r7, 0x4}, 0xc) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/uinput\x00', 0x802, 0x0) ioctl$FS_IOC_FSGETXATTR(r8, 0x801c581f, &(0x7f0000000a00)={0xffff, 0x4, 0x7, 0x9a, 0xfffffffa}) r9 = syz_open_dev$vcsu(&(0x7f0000000a40)='/dev/vcsu#\x00', 0x242, 0x0) ioctl$KVM_SET_ONE_REG(r9, 0x4010aeac, &(0x7f0000000a80)={0x10001, 0x6}) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0x80045500, &(0x7f0000000ac0)) socket$rds(0x15, 0x5, 0x0) r10 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/sysvipc/shm\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r10, 0x28, 0x0, &(0x7f0000000b40)=0x8, 0x8) ioctl$DRM_IOCTL_MAP_BUFS(r6, 0xc0186419, &(0x7f0000001340)={0x8, &(0x7f0000000b80)=""/227, &(0x7f0000001280)=[{0x8, 0x6a, 0x59, &(0x7f0000000c80)=""/106}, {0x5, 0xe9, 0x8, &(0x7f0000000d00)=""/233}, {0x7fffffff, 0x98, 0x10000, &(0x7f0000000e00)=""/152}, {0x6fa, 0x2d, 0x99b, &(0x7f0000000ec0)=""/45}, {0xc3f, 0x92, 0x0, &(0x7f0000000f00)=""/146}, {0x2, 0xee, 0x401, &(0x7f0000000fc0)=""/238}, {0x9, 0xcb, 0x1, &(0x7f00000010c0)=""/203}, {0xa214, 0xb5, 0xffff, &(0x7f00000011c0)=""/181}]}) r11 = syz_genetlink_get_family_id$batadv(&(0x7f00000013c0)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r9, &(0x7f0000001480)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001440)={&(0x7f0000001400)={0x34, r11, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xde51}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xffff}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x1) r12 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ftruncate(r12, 0x2) [ 254.624331][ T9579] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 254.701804][ T9594] IPVS: ftp: loaded support on port[0] = 21 [ 254.724050][ T9579] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 254.780897][ T9584] team0: Port device team_slave_0 added [ 254.820806][ T9579] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 254.863821][ T9579] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 254.916086][ T9584] team0: Port device team_slave_1 added [ 254.942732][ T9589] chnl_net:caif_netlink_parms(): no params data found [ 254.962901][ T9586] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.967130][ T9598] IPVS: ftp: loaded support on port[0] = 21 [ 254.969995][ T9586] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.984270][ T9586] device bridge_slave_0 entered promiscuous mode [ 254.993191][ T9586] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.002423][ T9586] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.010097][ T9586] device bridge_slave_1 entered promiscuous mode [ 255.017742][ T9584] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 255.024831][ T9584] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.051385][ T9584] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 255.068078][ T9584] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 255.075138][ T9584] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.101598][ T9584] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 255.213706][ T9584] device hsr_slave_0 entered promiscuous mode [ 255.270939][ T9584] device hsr_slave_1 entered promiscuous mode [ 255.310678][ T9584] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 255.318615][ T9584] Cannot create hsr debugfs directory [ 255.351249][ T9586] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 255.376614][ T9586] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 255.431108][ T9586] team0: Port device team_slave_0 added [ 255.437346][ T9589] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.447022][ T9589] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.454931][ T9589] device bridge_slave_0 entered promiscuous mode [ 255.463780][ T9589] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.471784][ T9589] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.479463][ T9589] device bridge_slave_1 entered promiscuous mode [ 255.497619][ T9586] team0: Port device team_slave_1 added [ 255.519468][ T9586] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 255.526499][ T9586] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.553071][ T9586] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 255.598734][ T9586] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 255.605901][ T9586] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.632541][ T9586] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 255.653589][ T9589] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 255.666331][ T9589] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 255.784723][ T9586] device hsr_slave_0 entered promiscuous mode [ 255.840972][ T9586] device hsr_slave_1 entered promiscuous mode [ 255.900639][ T9586] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 255.900676][ T9586] Cannot create hsr debugfs directory [ 255.952727][ T9598] chnl_net:caif_netlink_parms(): no params data found [ 255.963990][ T9589] team0: Port device team_slave_0 added [ 255.995610][ T9589] team0: Port device team_slave_1 added [ 256.017013][ T9594] chnl_net:caif_netlink_parms(): no params data found [ 256.053479][ T9589] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 256.060543][ T9589] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 256.086731][ T9589] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 256.128734][ T9589] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 256.137035][ T9589] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 256.163622][ T9589] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 256.187707][ T9598] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.196435][ T9598] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.204913][ T9598] device bridge_slave_0 entered promiscuous mode [ 256.222040][ T9579] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.250052][ T9598] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.260872][ T9598] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.268681][ T9598] device bridge_slave_1 entered promiscuous mode [ 256.373817][ T9589] device hsr_slave_0 entered promiscuous mode [ 256.410903][ T9589] device hsr_slave_1 entered promiscuous mode [ 256.460563][ T9589] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 256.468129][ T9589] Cannot create hsr debugfs directory [ 256.507131][ T9594] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.515117][ T9594] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.523052][ T9594] device bridge_slave_0 entered promiscuous mode [ 256.531297][ T9594] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.538348][ T9594] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.546562][ T9594] device bridge_slave_1 entered promiscuous mode [ 256.559525][ T9584] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 256.616399][ T9598] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 256.647746][ T9584] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 256.704476][ T9598] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 256.724076][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.732765][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.745728][ T9594] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 256.755998][ T9584] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 256.837657][ T9584] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 256.895861][ T9579] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.908573][ T9594] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 256.946347][ T9594] team0: Port device team_slave_0 added [ 256.971521][ T9598] team0: Port device team_slave_0 added [ 256.980150][ T9594] team0: Port device team_slave_1 added [ 257.000897][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 257.009659][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.018794][ T2887] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.026006][ T2887] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.034979][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 257.045672][ T9598] team0: Port device team_slave_1 added [ 257.058102][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 257.066792][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.076129][ T2858] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.083245][ T2858] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.138226][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 257.150258][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 257.159431][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 257.168542][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.177030][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 257.185461][ T9594] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 257.192723][ T9594] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 257.219504][ T9594] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 257.232452][ T9594] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 257.239557][ T9594] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 257.266497][ T9594] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 257.277772][ T9586] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 257.323520][ T9586] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 257.404149][ T9586] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 257.469005][ T9586] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 257.545226][ T9598] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 257.553228][ T9598] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 257.579700][ T9598] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 257.603425][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 257.615662][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.693949][ T9594] device hsr_slave_0 entered promiscuous mode [ 257.740810][ T9594] device hsr_slave_1 entered promiscuous mode [ 257.790631][ T9594] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 257.798209][ T9594] Cannot create hsr debugfs directory [ 257.804839][ T9598] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 257.811922][ T9598] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 257.838165][ T9598] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 257.868558][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 257.878224][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.887686][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 257.896261][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.973967][ T9598] device hsr_slave_0 entered promiscuous mode [ 258.041094][ T9598] device hsr_slave_1 entered promiscuous mode [ 258.080600][ T9598] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 258.088198][ T9598] Cannot create hsr debugfs directory [ 258.156671][ T9589] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 258.205123][ T9579] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 258.251873][ T9589] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 258.305708][ T9589] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 258.402907][ T9589] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 258.505200][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 258.513244][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 258.542626][ T9579] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 258.569573][ T9584] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.634721][ T9594] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 258.709321][ T9594] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 258.767497][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.776922][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.785067][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 258.793844][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 258.814127][ T9594] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 258.862717][ T9594] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 258.946332][ T9584] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.956984][ T9598] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 259.026455][ T9598] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 259.087212][ T9598] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 259.165122][ T9586] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.176448][ T9598] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 259.224033][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.232957][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.241932][ T2858] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.248984][ T2858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.256768][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 259.264953][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.274944][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.283116][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.291067][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.303408][ T9579] device veth0_vlan entered promiscuous mode [ 259.331229][ T9586] 8021q: adding VLAN 0 to HW filter on device team0 [ 259.346447][ T9579] device veth1_vlan entered promiscuous mode [ 259.364939][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 259.375916][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.383812][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.391804][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.400265][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.408777][ T2856] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.415883][ T2856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.423619][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 259.444543][ T9589] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.486838][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 259.497329][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.506338][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.514812][ T2856] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.521954][ T2856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.529478][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.538565][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.547034][ T2856] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.554144][ T2856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.562644][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 259.571523][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 259.580264][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 259.589374][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.597951][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 259.634423][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 259.643736][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 259.653644][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 259.662561][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.671198][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 259.679565][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.687937][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 259.699084][ T9584] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 259.730641][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 259.739414][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 259.750035][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 259.758541][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.766372][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.775009][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 259.804305][ T9579] device veth0_macvtap entered promiscuous mode [ 259.816629][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 259.825417][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 259.833906][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 259.842758][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 259.852810][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 259.865900][ T9589] 8021q: adding VLAN 0 to HW filter on device team0 [ 259.897053][ T9579] device veth1_macvtap entered promiscuous mode [ 259.911977][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 259.920020][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 259.930022][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.939425][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 259.948150][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.975587][ T9586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 259.988360][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 259.996781][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.004712][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.015293][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.023901][ T2856] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.031002][ T2856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.039638][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.067711][ T9584] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 260.080265][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 260.092149][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.101715][ T2856] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.108780][ T2856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.150855][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 260.159599][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 260.173415][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 260.181626][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.193679][ T9598] 8021q: adding VLAN 0 to HW filter on device bond0 [ 260.209476][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 260.222509][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 260.234404][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 260.243334][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 260.259562][ T9586] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 260.288598][ T9579] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 260.307854][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 260.316329][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 260.325100][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 260.334041][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 260.343212][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 260.351846][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.359619][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.367898][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 260.376774][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 260.396852][ T9589] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 260.407145][ T9579] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 260.419845][ T9594] 8021q: adding VLAN 0 to HW filter on device bond0 [ 260.431368][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.440069][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.453258][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 260.462166][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 260.472374][ T9598] 8021q: adding VLAN 0 to HW filter on device team0 [ 260.620084][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.629973][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.645369][ T2856] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.652549][ T2856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.660770][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.712561][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 260.723213][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.732466][ T2887] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.739539][ T2887] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.747263][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 260.756273][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 260.765506][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 260.773338][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.780928][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 260.789648][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 260.799871][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 260.815320][ T9594] 8021q: adding VLAN 0 to HW filter on device team0 [ 260.835231][ T9589] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 260.856809][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.864832][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.886831][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 260.896344][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 260.937831][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 260.947271][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 260.956217][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.965432][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.974717][ T2689] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.974768][ T2689] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.975258][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 260.975776][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.976148][ T2689] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.976197][ T2689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.976616][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 260.977250][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.977993][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.978586][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.979143][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 261.064921][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 261.074040][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 23:03:07 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x4000, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000040)) clone(0x3103012ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x1, 0x5, 0x5, &(0x7f00000000c0)) [ 261.082116][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.090070][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.126881][ T9598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 261.138123][ T9584] device veth0_vlan entered promiscuous mode [ 261.151543][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 261.161950][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 261.207285][ T9586] device veth0_vlan entered promiscuous mode [ 261.242607][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 261.255075][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 261.269490][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 261.281349][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 261.290389][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 261.300558][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 261.312397][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 261.321806][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.332984][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 261.351050][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.371294][ T2852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.392982][ T9584] device veth1_vlan entered promiscuous mode [ 261.428266][ T9586] device veth1_vlan entered promiscuous mode [ 261.449030][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 261.458082][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 261.473504][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 261.487357][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 261.498837][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 261.514238][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 261.525498][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 261.537430][ T9594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 261.574168][ T9598] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 261.702878][ T9584] device veth0_macvtap entered promiscuous mode [ 261.739575][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 261.749351][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 261.765903][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 261.792906][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 261.808808][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.826466][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 261.836867][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.863324][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.894900][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 261.911269][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 261.927211][ T9584] device veth1_macvtap entered promiscuous mode [ 261.976245][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 262.005976][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 262.035287][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 262.062115][ T9589] device veth0_vlan entered promiscuous mode [ 262.085960][ T9586] device veth0_macvtap entered promiscuous mode [ 262.116792][ T9594] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 262.148352][ T9584] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.173053][ T9584] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.203460][ T9584] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 262.216041][ T9586] device veth1_macvtap entered promiscuous mode [ 262.258689][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 262.291310][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 262.312545][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 262.331449][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 262.343595][ T9584] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.370669][ T9584] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.392420][ T9584] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 262.433549][ T9589] device veth1_vlan entered promiscuous mode [ 262.491031][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 262.499710][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 262.531958][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 262.551193][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 262.597027][ T9598] device veth0_vlan entered promiscuous mode [ 262.630254][ T9586] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.670535][ T9586] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.704883][ T9586] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.745764][ T9586] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.775886][ T9586] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 262.800665][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 262.809041][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.841897][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 262.861930][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 262.991309][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 262.999440][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.015213][ T9586] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 263.040513][ T9586] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 263.059578][ T9586] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 263.076536][ T9586] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 263.089165][ T9586] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 263.112839][ T9598] device veth1_vlan entered promiscuous mode [ 263.120158][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 263.129903][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 263.140029][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 263.235706][ T9633] Unknown ioctl -1067952547 [ 263.241644][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 263.254535][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 263.264964][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 263.275204][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 263.284565][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 263.305047][ T9589] device veth0_macvtap entered promiscuous mode [ 263.315575][ T9633] Unknown ioctl -1067952547 23:03:09 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40000000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = dup2(r0, r1) setsockopt$inet6_int(r2, 0x29, 0x4a, &(0x7f00000014c0)=0x9759, 0x4) recvmmsg(r0, &(0x7f0000008880), 0x4000000000005e3, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 263.360085][ T9594] device veth0_vlan entered promiscuous mode [ 263.391355][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 263.399618][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 263.421773][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.455705][ T9589] device veth1_macvtap entered promiscuous mode [ 263.479488][ T9594] device veth1_vlan entered promiscuous mode [ 263.507878][ T9638] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:03:09 executing program 1: r0 = getpid() openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r2, &(0x7f0000000280)={0x1a, 0x0, 0x7}, 0x10) sendmmsg(r2, &(0x7f00000001c0), 0x400000000000150, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffffffffffffe) timerfd_create(0x1, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000080)={0x4, 0xffffff80}) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000) [ 263.534622][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.548062][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.556595][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 263.573615][ T2689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 263.634244][ T9598] device veth0_macvtap entered promiscuous mode [ 263.689018][ T9589] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 263.714812][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 263.714826][ T27] audit: type=1800 audit(1580857389.905:31): pid=9640 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16524 res=0 [ 263.730654][ T9589] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 263.790553][ T9589] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 263.812444][ T9589] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 263.822399][ T9589] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 263.836165][ T27] audit: type=1804 audit(1580857390.025:32): pid=9640 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir431861612/syzkaller.OxGj4b/2/file0" dev="sda1" ino=16524 res=1 [ 263.836494][ T9589] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 263.927159][ T9589] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 263.942262][ T9598] device veth1_macvtap entered promiscuous mode [ 263.953963][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 263.969127][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 23:03:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0x6, 0x24}) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x50242, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) chdir(&(0x7f0000000080)='./file0\x00') mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000280)='./file0\x00', 0x2, 0x0) r2 = accept$alg(r0, 0x0, 0x0) r3 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x101, 0x2400) ioctl$RTC_UIE_OFF(r3, 0x7004) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000380)=""/148, 0xfe0f}], 0x1}}], 0x1, 0x0, 0x0) lookup_dcookie(0x2, &(0x7f00000009c0)=""/4096, 0x1000) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000200)) [ 263.978226][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 263.994331][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 264.016343][ T9589] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 264.067022][ T9589] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 264.121791][ T9589] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 264.162036][ T9589] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 264.183074][ T9650] overlayfs: failed to resolve 'file0ÿÿÿ': -2 [ 264.208027][ T9589] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 264.250413][ T9589] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 264.279157][ T9653] capability: warning: `syz-executor.2' uses deprecated v2 capabilities in a way that may be insecure [ 264.285744][ T9589] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 264.331152][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 264.340084][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 264.360458][ C0] hrtimer: interrupt took 46123 ns [ 264.384619][ T9647] overlayfs: failed to resolve 'file0ÿÿÿ': -2 [ 264.410303][ T9594] device veth0_macvtap entered promiscuous mode 23:03:10 executing program 1: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)={[{@block={'block', 0x3d, 0x800}}]}) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) [ 264.466734][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 264.479496][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 264.545529][ T9598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 264.589663][ T9598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 264.605118][ T9660] ISOFS: Unable to identify CD-ROM format. [ 264.635905][ T9598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 264.681216][ T9598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 264.715141][ T9598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 264.744927][ T9598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 264.787103][ T9598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 264.818183][ T9598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 264.855575][ T9598] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 264.876160][ T9594] device veth1_macvtap entered promiscuous mode [ 264.904853][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 264.923814][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 264.940922][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 264.954525][ T9598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 264.977992][ T9598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 264.988461][ T9598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 265.009095][ T9598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.019565][ T9598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 265.030304][ T9598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.040385][ T9598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 265.051166][ T9598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.064234][ T9598] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 265.077704][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 265.087627][ T9660] ISOFS: Unable to identify CD-ROM format. [ 265.088936][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 265.233723][ T9594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 265.255975][ T9594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:03:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$caif_stream(0x25, 0x1, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U+', 0x2}, 0x16, 0x2) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000300)=""/4096, 0x1000}], 0x1}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 265.310544][ T9594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 265.350502][ T9594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.361698][ T9594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 265.390509][ T9594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.400385][ T9594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 23:03:11 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) getsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000180)={r4}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x100, 0x9, 0x4000, 0x7, r4}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={r5, 0xeff}, &(0x7f00000000c0)=0x8) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) write$P9_RREMOVE(r6, &(0x7f0000000240)={0x7, 0x7b, 0x2}, 0x7) r7 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x1, 0x7}) r8 = socket$inet(0x10, 0x3, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000280)=0x2d01) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r11, &(0x7f00000017c0), 0x199, 0x0) r12 = socket$inet(0x2, 0x80001, 0x84) r13 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r13, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r12, 0x84, 0x75, &(0x7f0000000180)={r14}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r11, 0x84, 0xf, &(0x7f00000002c0)={r14, @in={{0x2, 0x4e20, @remote}}, 0x9, 0x200, 0x10001, 0x3, 0x1c}, &(0x7f0000000380)=0x98) sendmsg$NFT_BATCH(r10, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002cc0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x5}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELTABLE={0x20, 0xb, 0xa, 0x3, 0x0, 0x0, {0x5}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x4}}, 0x68}}, 0x0) [ 265.431296][ T9594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.464867][ T9594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 265.481649][ T9594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.495026][ T9594] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 265.571836][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 265.593804][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 23:03:11 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f00000000c0)={0x3, @bcast, 0xee01}) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e3, 0x0, @perf_bp={0x0}, 0x404, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmdt(0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x2710}) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f0000000300)="14b1df25", 0x4, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x83, &(0x7f0000000180), 0x8) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = gettid() tkill(r6, 0x3c) pidfd_open(r6, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000080)=r6) r7 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$KVM_SET_VAPIC_ADDR(r7, 0x4008ae93, &(0x7f0000000180)=0x10000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 265.686755][ T9594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 265.701986][ T9594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.714028][ T9679] x_tables: duplicate underflow at hook 1 [ 265.758373][ T9594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 265.784862][ T9677] input: syz0 as /devices/virtual/input/input5 [ 265.821630][ T9594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.858024][ T9679] x_tables: duplicate underflow at hook 1 [ 265.871947][ T9685] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 265.876805][ T9594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 23:03:12 executing program 3: mmap(&(0x7f0000003000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) write$FUSE_POLL(r2, &(0x7f0000000040)={0x18, 0x0, 0x1, {0x6}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000000), 0x0) ftruncate(r3, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x2, 0x2012, r3, 0x0) [ 265.970170][ T9594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 266.002901][ T9594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 23:03:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@grpid='grpid'}]}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) fsmount(r3, 0x0, 0x4) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) sendmsg$NL80211_CMD_START_AP(r4, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x800}, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000000)=0x3ff, &(0x7f00000000c0)=0x2) [ 266.050699][ T9594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 266.088747][ T9594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 266.113011][ T9594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 266.150161][ T9594] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 266.267036][ T9700] XFS (loop2): Invalid superblock magic number [ 266.291482][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 266.308706][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 266.411852][ T9677] input: syz0 as /devices/virtual/input/input6 [ 266.898454][ T9732] Unknown ioctl -2147204314 [ 266.982269][ T9732] Unknown ioctl 1075883590 [ 267.012435][ T9732] Unknown ioctl -2147204314 [ 267.058099][ T9735] Unknown ioctl 1075883590 23:03:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x74}, [@ldst={0x3fd}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x42d, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffa2}, 0x48) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) write$nbd(r1, &(0x7f00000000c0)={0x67446698, 0x0, 0x0, 0x0, 0x4, "b820dac5920caf7050293927396989ebc5d346bc405ab7"}, 0x27) 23:03:13 executing program 3: r0 = socket$inet6(0xa, 0x803, 0xfe) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@rand_addr="6470b7826adc3f7d9d284fc83e8ed4c6", 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in=@multicast2, 0x0, 0x3c}, 0x2, @in6=@rand_addr="d20bcdc3e9b3cda281d0bcf3fafdf6f7", 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x8001}}, 0xe8) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x400002, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x9, 0x3}, &(0x7f0000000080)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000240)=[@in6={0xa, 0x4e20, 0x2, @rand_addr="b3d9e2e312e42a3dd931c106a07f7b2c", 0x3}, @in6={0xa, 0x4e20, 0x80000000, @rand_addr="2bb5256a1ae9f7f5afe8ca7c7709a3d7", 0x1}, @in={0x2, 0x4e22, @multicast2}], 0x48) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r2, 0x3}, 0x8) r4 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) fcntl$setflags(r4, 0x2, 0x1) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r5, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r5, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r5, 0x5501, 0x0) fcntl$setlease(r5, 0x400, 0x2) sendmmsg(r0, &(0x7f0000005000)=[{{&(0x7f0000000300)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0}}], 0x1, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:03:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$caif_stream(0x25, 0x1, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U+', 0x2}, 0x16, 0x2) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000300)=""/4096, 0x1000}], 0x1}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 23:03:13 executing program 5: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="756d61736b3d30303030303030303030303030303030303030303030302c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030302c6572726f72733d726544e82a41b67092636f7665722c636173655f73656e7369746976653d6e6f2c6572726f72733d636f6e74696e75652c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030322c73686f775f7379735f66696c65733d7965732c64697361626c655f7370617273653d7965732c646d61736b3d303030303030303030303030303030303030"]) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2802, 0x0) lseek(r0, 0x1, 0x1) open$dir(&(0x7f0000000040)='./file0\x00', 0x101400, 0x145) 23:03:13 executing program 2: mknod(&(0x7f00000005c0)='./bus\x00', 0x94d, 0x0) lsetxattr$security_capability(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.capability\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mount(&(0x7f0000000240)=@sg0='/dev/sg0\x00', &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x4000, &(0x7f0000000300)='em1\x00') chdir(&(0x7f0000000080)='./file0\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) [ 267.208735][ T9744] ntfs: (device loop5): parse_options(): Invalid errors option argument: reDè*A¶p’cover [ 267.246857][ T9746] input: syz0 as /devices/virtual/input/input8 [ 267.256851][ T9745] 9pnet_virtio: no channels available for device /dev/sg0 [ 267.278928][ T9744] ntfs: (device loop5): parse_options(): Invalid errors option argument: reDè*A¶p’cover [ 267.305310][ T9748] Invalid argument reading file caps for ./bus [ 267.374726][ T9743] input: syz0 as /devices/virtual/input/input9 [ 267.460639][ T9761] 9pnet_virtio: no channels available for device /dev/sg0 23:03:13 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x40, 0x80580) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000100)={0xffffffc1, 0x2, 0x5}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') r2 = gettid() tkill(r2, 0x3c) pidfd_open(r2, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000340)='/dev/md0\x00', 0x2000, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcsu\x00', 0x8100, 0x0) kcmp(0xffffffffffffffff, r2, 0x6, r3, r4) lseek(0xffffffffffffffff, 0x10000000000000, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000040)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x101200, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000429bd7000ffdbdf25020000003c00070008000100", @ANYRES32=r6, @ANYBLOB="080c0100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB], 0x11}, 0x1, 0x0, 0x0, 0x63a5884918c15440}, 0x0) arch_prctl$ARCH_GET_FS(0x1003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, 0x0, 0x0) setsockopt(r0, 0x10000, 0x0, &(0x7f00000001c0)="254f3a9bd2a8da07796fe15c06e4c608423c2423e04b5aa98b1c98d954bbf4216e05673fe8a89e47d14382f68175800248983ff4f8a4fadf4158a4ec0449930ace3500f38d0cac5117d960ece5b474f9291668b89b7851692bccdd0e3e5ee7d4c19f5164935aa0093d165047d5a71e53cbb0af6d689ec8f9aede08663920e3190853323d1c32958e794c0525556628dbb108327070bc4eba0ae22627ee88926607652c18d5768225992510ee499410d02e1b1c5fd0cd105c3bbdb52e721273e29ed8f6a8657c722d2c6f65cb5c6d0427125574e6b943613d3f16e71b0f02cc21f34d481eaf84da763e0463674ca309deaf0d", 0xf2) r8 = userfaultfd(0x0) ioctl$UFFDIO_API(r8, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x74}) ioctl$UFFDIO_REGISTER(r8, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r8, &(0x7f0000009f9c)=""/100, 0x64) 23:03:13 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) shutdown(r0, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="bd", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="87"], 0x1) sendto$inet6(r0, &(0x7f0000000080)='~', 0x1, 0x0, 0x0, 0x0) close(r0) 23:03:13 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @default, 0x7}, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null]}, 0x48) ioctl$sock_proto_private(r0, 0x89e1, &(0x7f0000000400)) 23:03:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='erspan0\x00', 0xff89) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) r3 = fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, 0xffffffffffffffff) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 23:03:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000200)={0x28, 0x0, 0x0, @hyper}, 0x10) listen(r0, 0x0) accept4$vsock_stream(r0, 0x0, 0x0, 0x0) [ 267.972993][ T9775] input: syz0 as /devices/virtual/input/input11 23:03:14 executing program 4: getresgid(&(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x31, 0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x45) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10) connect$inet(r0, &(0x7f0000000400)={0x2, 0xfffe, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 23:03:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8478071cb0b1faef781090461155795cc9e864c8f0ddd65e33aa96dcb0e1770fc0ece2b983d3a76f7c21862389881cf6b4155b960b26acae399bea5999b523cc921") unshare(0x20400) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="fd00"}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x82, &(0x7f00000001c0)={r3}, 0x8) 23:03:14 executing program 2: clock_getres(0x9b21b50e778100c, 0x0) clock_gettime(0x0, &(0x7f0000000040)) futex(&(0x7f0000000000), 0x81, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0)=0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) mount(&(0x7f0000000140)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='romfs\x00', 0x6888, &(0x7f0000000240)='trusted\xeftrustednodev\x82em0lo]ppp1\']GPL$]-,eth0\\,}\x00') getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r3}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000100)={r3, 0x100, 0x20, "2a1cbb87a3514d775b54a5dfb0610eaeff56bb0dc514661dc5b6c53b1f306ce7"}, 0x28) [ 268.348924][ T9788] input: syz0 as /devices/virtual/input/input12 23:03:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='erspan0\x00', 0xff89) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) r3 = fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, 0xffffffffffffffff) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 23:03:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000400), &(0x7f0000000440)=0x4) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e20, @remote}, {0x6, @local}, 0x91, {0x2, 0x4e21, @empty}, 'batadv0\x00'}) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r1 = fcntl$getown(0xffffffffffffffff, 0x9) execveat(0xffffffffffffffff, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r1, 0x4, 0xffffffffffffffff, 0x8) listen(r0, 0x20000000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r3, 0xc0044306, &(0x7f0000000000)=0x6) r4 = socket$inet6(0xa, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x20) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) ioctl$sock_inet_SIOCSIFBRDADDR(r6, 0x891a, &(0x7f0000000200)={'ip6tnl0\x00', {0x2, 0x4e21, @multicast1}}) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = dup(0xffffffffffffffff) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f00000000c0)={0x8, [0x6, 0x1], 0x3b55}, 0x10) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f00000001c0), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) r9 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r9, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x28f, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 23:03:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) r0 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x9, 0x80) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = fsopen(&(0x7f0000000040)='ubifs\x00', 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x4}, 0x0, 0x0, &(0x7f0000000480)={0x5, 0xd, 0x1, 0x3f}, &(0x7f00000004c0)=0x8000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x5}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=r3, 0x4) dup2(r1, r2) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f00000003c0)={0xffffffffffffffff, r1, 0x2b, 0x2c, &(0x7f0000000240)="a486e00947ba95b2e684e883930aa4bbe415ed425c01daf48885a1730f1f3bcb01972c725b123cd929f924d2", 0x66, 0x40, 0x9, 0x4, 0x6, 0x0, 0x2, 'syz0\x00'}) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x1800, 0x0) getsockopt$CAN_RAW_LOOPBACK(r4, 0x65, 0x3, &(0x7f00000000c0), &(0x7f0000000140)=0x4) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r5 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/snapshot\x00', 0x200, 0x0) ioctl$SOUND_MIXER_WRITE_RECSRC(r6, 0xc0044dff, &(0x7f0000000700)=0x710) fchdir(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r8 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x2, 0x2) write$9p(r7, &(0x7f0000001400)="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", 0x19d) sendfile(r7, r8, 0x0, 0x10000) [ 268.711728][ T9803] input: syz0 as /devices/virtual/input/input14 [ 268.862672][ T9788] input: syz0 as /devices/virtual/input/input15 [ 268.922689][ T27] audit: type=1804 audit(1580857395.105:33): pid=9812 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir184618693/syzkaller.KsgPrD/7/file0/file0" dev="loop2" ino=22 res=1 23:03:15 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) open(&(0x7f0000000100)='./file1\x00', 0x24000, 0xa0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f0000000180)='./file1\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$nl_generic(0x10, 0x3, 0x10) eventfd2(0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r4, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r4, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) r5 = dup2(r4, 0xffffffffffffffff) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') write$FUSE_GETXATTR(r5, &(0x7f0000000080)={0x18}, 0x2750) [ 269.158119][ T9821] input: syz0 as /devices/virtual/input/input16 23:03:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x1c5003, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x18) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x6) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U-', 0x82}, 0x16, 0x2) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control\x00', 0x141800, 0x0) ioctl$UI_SET_FFBIT(r3, 0x4004556b, 0x38) 23:03:15 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='erspan0\x00', 0xff89) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) r3 = fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, 0xffffffffffffffff) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 23:03:15 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0xab, &(0x7f0000000200)=0x0) fcntl$setstatus(r0, 0x4, 0x4800) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) r3 = gettid() tkill(r3, 0x3c) pidfd_open(r3, 0x0) rt_sigqueueinfo(r3, 0x3f, &(0x7f0000000100)={0x1, 0x1ff, 0x400}) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) io_submit(r1, 0x3, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x10, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) 23:03:15 executing program 3: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) setsockopt(r2, 0x1, 0xf8d, &(0x7f00000002c0)="5dc53e24a9cdef44921a4c9db09a7402cac209aa8d1d42e37da19fc50eca8ca2647d1bffee85d1ac799b09561f632030aec779d20e8bcf5892e8c27ff53ecdb2832b4422332cb3f15dec837955500a8211aa4a23ca120ec74667f69a7e1e2a1fa364e93ca340ed5eda36726f647386412679a80fe801aa8b42840a1a01d6f49226e99a541ae53e60592fcef6bf921b706964f6dcb81e6d97471db345e67bbb99e86b441feaaa98fc893261fa2b9fd9f1fb011ee28470bbde75f06e573bde2d864e788d92d4ab243369a07667a6c2fb919c6b894e32e9cece6bd73d4e9deb8c167340673ee431204c183fa8259fbb788ff44ae866f58e2e90970977cc4ef42afc36d5ed97647beaed6e900938acd69e89852b01086b85cdce3ce540161467b8013ee218d9c8f0110131aae4ffabcd98a28ebacce0b9729a0280aa73ad4c9dd780749b0fc87a3e8595d69afb45b77dad6984962510e06d900483c5bf1776970cea6e797c7839a41ea1f6638da068dec8c5b6419d3133cef41ee0267113bf847458dee22aa3cc5c598493b0430fcb5c8b72df17bf8bea0134fe8cf4348bc021cd8df2b114c6ea35d6f4ba5b83234aa68134a3df04675d144b1604d9ee1050e5317dc08606660f5e6b7583a4835db4c71d3b7ff4582dd54e1b2ed3fb2db801beed51eb3f95c33b92a77043ac4c8b5dce9b7872c1b88796ec8e5f011591f7a0c8565973cdce873808c47bbce86edad65938fa485058abb5c6cde1cc8c8c0097c0a3f2ffa26c8cb1bc5bf2fb5b06f22ac39786cbec9d2ddf7797c2767df238acb58cf0788b85354e309dc6b2a589d56dd5f2834f2bed4be9bf190a0e8b121c9b67fd0a2fc2baceddcfb2231ed0636fb2eb99d6ad772309957b889b4395299b6af4812d42d1418bb7057b6dbaea7c9176dfb5222057b4382f9bb5ec6d562f394e990e0f9d2439f3b79ef392eb106d89dccba3df383dd5dfd8f8fc1d5bb0f6024175c624988d1ca7a74b72254c77485283d62758f76995ee68b9eaadfa8ebf8534a85943241a48731213ae745da2f2ed4b1d2f57b6e21c4de1a92aef8ef6f13207196883e4b6e0a2312fe81792620fbd9779ba515a92b053f7f4e7396b2b40aab903df8673d5e22c56d9fa378143f433c29252405d89f09e75808ac7c939a9a3deb6da0bc6322a815f00c3af011ea391f42445813a60f17bc37cc034cf2a72d7ca97d128583dc352c6d3ac879b17c4bef239f0833630ca2654aa9dee085fe677d76becd8b9c550ecfaa77dba462895d568029710e80fb2fafd5208fb182d97c92f4e5f29be2f202f77b4308b86699ce7b6fb0293a5c335196048a37657aa28e421e8b51158b4b50e83f79af280e8515ee10a3b7c6636be50769c6a534cbe8a08d7f72f053a220d614bc23e7d5e3e9d8be1c01a395ae3a5337447123b69922db20e19ab2209caa80683b89de44a11193cd9884e0c63e81d3eb77c45edf1807260a2c8f77bd760f8bfb1626a6adeee89f471d63e5f7bcb03b77b7108ce33affcf6f2b0e33d80f34c2c311df1ce7315c507727a2f4ccc7fb9c16ded60c4c59316435a4a7db84f08e72a8388f77c1d3e04483002921978b1e8791994b5791428175b7f962bf025a3bd7ce3b09c99490e51113b6ef1b7c456f330639169f4373960418af5f20f9b6e44012a9b19bba1a203059e21d1af55ac7a09ee91bf3f179986374eb4063256609212e8126cc246ba19dbcfbbbe63897cbe4a890b92dd88aa83bb5362387d4ea7c17655f10a243dc84f00e78c1a4f5cef5b3cfd00aeabd48d77ec24efd0b85e93d65dd267d9fd4cd71b097eb2f8e35fdea981ff7fd5f89541135bb29fade7998090c58a2aa2926439d3f636c921efe46d4f61799b1064f89e73bd9dcb196279c43e15cb29e66570259d47132208991f9c412ed55b0c7fc46548cc21dbfd1302ad22eaf15604f227d450adbd159cd74aff5cde1e6bc263a85ee8bd4c108905ef5bde3f5313cb37bd085bdaeed2d78979164232fd6e7765d3f3b230c71579b8eaefd8523127416b13daca5466d0772c6f8ce9087dead0e8e51379cd9d6f4929ed19fe41dd9b195a56db5878703e373d622187e6bc860174212d32f146bc937828da69b9f107c5d9051d7fecbdea72208d01a2bfc85eed2352d5927e4f47b6d87e7d1ed2f12e8b351570742ee72783767b93ad37a675de30a775bc3df134c4519815ed2d78997256e0e6a0f565ed1c141d58d00761f47def50ef41abee65ce5c11f2cf9a23b7196ea29629557db80574461ef7b35cdd654ff79ed7ab60be441264c8a2c4e672405791dda221546fe761fb20ebd9673643f5739a34f376b490743843bf0d4188d5a05231535a948a6f04d1f21359b05be1fee7b9fe4e8ad210577dc6427350ee3ceb7b98fb25aaf7614638a4b1453f91eb06ff2a1e259fe388c63557b66c917567ee27ea5caad02f89c2dbd69217d593142d826e37d80f9c2e5ce01f9d6a9759204b83733f6d5f387458cf1b0bcd4b5bfbfd12665f0ae1b0f90e8ed202cc5ae1198ec555da309f20f70c85f9860c63b06da2cf9ba7c2e3ed59d9d60da6964a123825ebc1508cf8b0974dce566077390a77fa0063a1f4579d6b6abbdfce26f86c19bbb7a0f0293808b52b4b6d2ecc9ad263edfb19834d454e7063081c7cca1b36dbb12713a7565e59a1a3f10e49a144bc6ad698a53854c1025680e18be576030ac9a82f47906bbd98a475e187a439a852ecce3ec6eff025adede8c80f08de8397c1512484001170936b30f3bef418cf5d6d0051c3641d00a80a64f35a8fa29b448413db4fd7db3a3cbbd3c69236d5d853d90f4c10a7a8ba5935781eb915e62ba1cad235de4826aae626a87222529ad90fbef33f35a40782d9f15e47a76d3cf48cc70ed8ddbbc5da58dd699a77db80b62bcafea13f2377a0e94ae425843a64a77d0ac47e281418001b2bbcfa5ef4621d4b8659531db297488c29bf28370f527effe47d187f4f5fdecabef96b5d9e9784e68f6b91491e3f71eee133a96a3f20fa2508785d70486a74c8c4ecf7b6532240f9668226e351998a22aa39b9de3bc13bb6124bbc389a9e42dd1674d8b292476a81f91a9771f27ed18cf4b667b021c8f1c1c08f65681c6ca92a223307c0c365bce8e6b9effc3061d0b4a5d0f89683db8b0fb4ffdef3e5b98de7090584df33f6d9df3af7ad10434e90cbb0f416869f785dadf42c40a06a3b32295e076b3112c6410ca0b28b332cd3f8ba3ea36eb595a38915fa3a8c3a5b4efee4202902f8edadcde093c638f6025aa9631f12c151e46cf51e19f2e8fde9f4a729ac25bbb89b10f7bcaa8d32b60023b52f770bdc97c98bbb3d960acd928b12d0bce4f8db33045aad7afcf6e37789310fd8d84dcb6d2af9789d7454c16b7abe6068fb662c2f76a3d067c8d81405322b58cda19afa9e4c9e35781f524477704a4a21707890195575ccb2b112ae5e2cf13cad48d253a7d98bb4833db1ba879b2a8686b84023967dbb9b55afbca8e8b561ba1a8e2a50838ade9b979a0ecc97528eba715896de4238c798f5e54ca41648a6bce468eb916a553601a287693e3d7c00e73440927bbbc048ca4a7c33f22f9190e920122717730f965d035ec4368c459c6664eb316263cd6400f7164bfdf0585bf608481383919b89f151f36e1610d23d966536e6a4f826bcc0cf2d660290a5a34edda2caded19ec7b2c28fdf6b7bdcab0adbd7ea2d2e32a29a7a31d53f719a0debc11b2ca0496ff8e77588d5d39e3d6389ec4273c4a6eee124439c1694e5e21aa8aa4d20ea67941e21db2b4700281d334683899bf9ee0069e9bcd27370f60eb8d673e199b0a06bd374b02fc991febd0bbcfaa6b42ff23e5d7243efcefbd8c60c1968ba61aa63b677e1a4ce0c2cf1522a297f0686e0a3a6cad8021ac0f11e31dcb165ab11741a03737eaa41a2853eb58a84d258419e24b2c0b8fbbc1fdb30bc4e8cdceba8439c84b10a8ad9e19b0f9c3abb0c5319e7dad9cb7e44bc4ec066ee15500c34e3c8e63f5974b4f6f53fe2aae543000ecdf3b78875682b49a07f595f630947594d6c4471846ab4fb6e066dccd8cdace40dfbf197e0d452741b13984fd466487f45a0c3d1bbb895b4bd109bc098f20beb1e258df63dd87a3cc1cbd6f9e6c7a9ff04c5a913e3ff3e3585137dd98a4454d008d986778bdbcb685efd004cd262be8e6533c27abca780c69f06fb09de75bb6cbcccb4fa194d71a713411b2fcde4954772225aebb7fbe698b13a7597267514cee790210787dfaa7ce2115e1dabf7cb1a00242d42db43f8555e3761687bfd22de3c2aca8fd0262fbcef00b230f138cca4abe877b06643f5ad77a6765b42d4441c0e3ec0581f06b94782c9517057544937a39d72b97463195288e612f5a987a9a3132500add74f59019a0b878966c9abeca03748ed8a18f09587ddfb5a469849dad5082c8d3bcfe6e8ee9e97fdb6f8dfd3fb810b88f5e33217aaa85934b638517ae1a86e28d2b2cfe1b2ae68f6b6a13a1f6eb0c017e88fcbe952d29e14904bfd8fa4fdeb66d3b22ca43815b9212767e71eafda774d294d6aaad4dadaac56ae39a9bc9465651537d8560611a009f59f91e70c053cade28ed6467bb27f7fb9ba27090c19103b10fa98fc2c961d903fd1c234b94e244028620bf17c0b2f91632f816713ef25962b98156bc555461a3fefdebb8edc959d038155f94eeebebeecebdf80d49e27d522aa33c3a84f6d8274ab8fa5c771f43839c3d4c573731c7b9ad65bd01747443d91777dd944a717efa60e33ba182d29742b8190fb87d9c1120e3921ed8ac4ea08a686d50f70b89949e62283f21d718dde97c6a8c883fd3bd2b9c24cf9bbd55bd6073a9f81d811966e85c26d3442c8e8c79c86a8c42195584d3ab7b008122638368013d86b68ac32011dd7a54afce96e70d188ae9aaba5e292efd44bf51aa17258217cc285be6c29af129f2d7f4a8066211eaaec9667a1d139fc018baf0c9afb79855ccb981251ab654663ba2bceb62cf33a4e301d10aa70a7d593a2cb0e3fc6b01cf3cb6aef7d5701f422bee79ad669e23dac5eb471c15e2490fa5b9a8842d7afeb7429693a691e8ca2823351a22e89ded10842e4fd1ee694f788797636e9787b18e340b6d7d290c87365f05cf54589208089ccdb11a60f93ecc9ed6fe4e2bcfa9a5a3e80fc3909b24adaddcdd60274504c9b334cb6e613dc1e2b3f9130decaace4510d2b92d46d932702f9ef972d8ecf3a208d2867eb063ff62e65805a4375bf16f68843d0a81fbf17e6a350405b13c34e70a960496307799967b27a532976a93fb7709c3943a3988bcea847772529673b54946c2e17a1dfe863190f28b8a838d3ed8c9e44d09887db3620f95fcdb1e30951461d6bb0663cb143f25f29ba1c00a666f36833cacb970ebdb251a5868deffe869e9f44ca29aeb02dcc7a7c003b7f19160364c512cb53c421e267a0c4f0b93dc2bba41bbae8d846ca8b406ab26999d96a056f7b1aaf2565babd33c55b29a0de23d5bdc20664f4f7f4cc044b1adbb5b895f5923157c14e83cb847b4c7a80c07bf0548c6ebbf7f69e2a5bb26bfdd797fb805fdc9c23698787add1070225170470b916819faf50086a82d31137dc6b2047b7f9d2cf7fdaac4e29e97dad84b7a140a6f20f1c91bb2df838d32d152a63ba4923801919e3aded9c1d59cfece0070e70e880f39974165c5ad7c8631cd2fc30a2dbd56c7dc48627a155985bd7108045bf7cb1ad349d1ed23f8b3f331f980331f7e2bdaeca9db28414568eef48", 0x1000) sendto$inet6(r1, 0x0, 0x0, 0x3a8f7dc2ac1e8d0b, &(0x7f0000000040)={0xa, 0x4e33, 0x0, @mcast2}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0x3c, &(0x7f0000005140)={0x1}, 0xa1) sendto$inet6(r1, &(0x7f0000000240)="577a33ca0fd2e527ed630e85ff46f5f1c0a4e72c1656bddc746d06e74749837b1f262fcd15373d14d528dce50824f70e74705aa5236dfdbd73554fe7091aa68edf3611eb047ec938b48af12c04eeb4536e6211e2f8370e6b8ae87c", 0xff77, 0x4000000, 0x0, 0x4ccd8c9804c515e5) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) sendmsg$IPSET_CMD_DEL(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000000a0601880005000100cb728b0c4594298dc40700000006000000660cbe24296c34a45900000000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4044000}, 0x40) [ 269.589004][ T9833] input: syz0 as /devices/virtual/input/input19 23:03:15 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='@'], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) writev(r0, &(0x7f0000000380), 0x0) lseek(r0, 0x0, 0x1) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "f346adac8b4c4691", "36ce8cc9d39855977339e5afb8cb410b", "c69ce734", "ce0f038c86b6aa5d"}, 0x28) [ 269.645384][ T9837] input: syz0 as /devices/virtual/input/input18 [ 269.663268][ T9834] input: syz0 as /devices/virtual/input/input20 [ 269.687875][ T9837] input: failed to attach handler leds to device input18, error: -6 23:03:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000040)={0x2, 0x80, 0x401, 0xfffffff8}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) r2 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_S_FBUF(r2, 0x4030560b, &(0x7f0000000140)={0x0, 0x38, &(0x7f00000002c0)="e68cd6aef6dee7ce634d63986d9298ea5e326232173091df75baa7d57b7149d64aece9367b0d9e61005f8755dc62a667a3acc56a4c71ae01d50af807e4c0a7f72d8528f2584d38a155a1be361f998ac6dd73b228368e0c74426d9c7575873ea33bb368638886968e8b6fe520effcaf0421144058ead7c25fbb20b702ab5d120479f808db6c42ccd8d4323db01ab983837a26e2b44701f99f58e123be7f0614dcde8b41f700ee20730d0b7add91844024f42f7aa67672ab86df94a39bd408f1faa79be798d022e1cf5f175b58607d555b00f57736485619590c6208e5ec9bea623aea9536d8fa26093c9322438ff1b0", {0x800, 0x2, 0xb5315258, 0x9, 0x7ff, 0x4, 0x0, 0x579}}) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c00000010001f0c010000000000000000000000b080e64c36", @ANYRESDEC=r1, @ANYBLOB="0000000000000000140012800a000100767863616e0000000400028008001b00", @ANYRES32=0x0, @ANYBLOB="b55316e428fe60dbd6611678160a6b0c0cbf4d597d32e6703354945aaa3d724aac4b93fee391809ff5150e248148db5eb92464c3225cde4a8ae44addf264b4e30032bf0b196df8c89bd84c5f82407326213fd5f6c65e39555685e8d1faf1174fd3e0dee2caa6a7251b25c5531037efc7076e11c8dfc18ae9a43665a96b2b2ad870d3587a2f318fb03f62196a0630856e90251ff7d3e2745a074ace1539cbf10180465bbaf16bcd008d8c0dd989228845711e4b893f8f06550592cbb440119a5517a30c342ba5a956a399fbee33c4bc8116d0724a2f60"], 0x5}}, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x100000001, 0x4000) [ 269.939512][ T9833] input: syz0 as /devices/virtual/input/input22 [ 270.011403][ T9855] input: syz0 as /devices/virtual/input/input21 [ 270.080660][ T9855] input: failed to attach handler leds to device input21, error: -6 [ 270.094444][ T9861] input: syz0 as /devices/virtual/input/input23 23:03:16 executing program 1: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x64, 0x2, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x80}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_PORT={0x6}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x1}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x64}}, 0x0) [ 270.250830][ T9861] input: syz0 as /devices/virtual/input/input24 23:03:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r2, &(0x7f0000000400)=[{&(0x7f0000001840)=""/53, 0x35}, {&(0x7f0000001780)=""/153, 0x99}, {&(0x7f0000000280)=""/1, 0x1}, {&(0x7f00000002c0)=""/168, 0xa8}, {&(0x7f0000000380)=""/37, 0x25}, {&(0x7f00000003c0)}], 0x6, 0xfffffffffffffffd) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f00000016c0)={0x53, 0xfffffffffffffffe, 0xe8, 0x4, @buffer={0x0, 0x1000, &(0x7f0000000480)=""/4096}, &(0x7f0000001480)="47eda3cd77dd07002e45c6c29c61afca36f7b3a2a2eabe2a9c74b56f38ad6b932fd719fb8a9d1626f0d7bc52817af21e8b28a590ef45c262e7eb748a4970d4de3a781fecb0b612047d6797bfa10db056a0b9ba00269b819c6924f1fcb0b5010ead3a6d41ab62ceda7846db5a0c8558b1f681cdf95386d606dd21f4021b52a9845783da1971684a62bb655c875c932b88735af48580bc342dc2826ebfa601eb9469088b06b78b15b7bd4d4c3d48645b5b8f805436a21bcd82e179e3ef9c4f9147d6ea138262c0ff7422b68855ed8431b79e83f15aa2b906c29c39f5ecacd55d8cfdab717deefcdf31", &(0x7f0000001580)=""/245, 0x5, 0x8026, 0x0, &(0x7f0000001680)}) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000000)) getpeername$netrom(r2, &(0x7f00000001c0)={{0x3, @rose}, [@netrom, @default, @rose, @netrom, @null, @null, @null, @default]}, &(0x7f0000000100)=0x48) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = fsopen(&(0x7f0000000080)='ubifs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x6, 0x0, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x5, 0x480440) ioctl$SIOCAX25DELFWD(r2, 0x89eb, &(0x7f0000000140)={@null, @null}) 23:03:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@can_delroute={0x14c, 0x19, 0x801, 0x0, 0x0, {}, [@CGW_CS_CRC8={0x120, 0x6, {0x0, 0x90, 0x0, 0x0, 0x0, "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", 0x0, "8f5c44baac1124fafca849729ab7aa2bd877689e"}}, @CGW_MOD_XOR={0x18, 0x3, {{{}, 0x0, 0x0, 0x0, 0x0, "ebc425d18e395d48"}, 0x2}}]}, 0x14c}}, 0x0) r1 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x361180, 0x0) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, &(0x7f00000002c0)={0x6, 0x1d11, 0x75, 0x80800, r3}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400283}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r4, 0x400, 0x70bd29, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r4, 0x300, 0x70bd28, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x3, @media='eth\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000080}, 0x20000000) 23:03:16 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x8000000000004, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x10) recvfrom$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) poll(&(0x7f0000000100), 0x0, 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x75bf1f50) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002500e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff"], 0x3}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@remote, 0x17, r4}) 23:03:16 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/keys\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x110, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000040)={0x6, {0x0, 0x0, 0x80000000}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x3da, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x3c, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x3, 'wlc\x00', 0x4, 0xfc1, 0x76}, 0x2c) creat(0x0, 0x0) 23:03:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=@newlink={0x230, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_VFINFO_LIST={0x210, 0x16, 0x0, 0x1, [{0x5c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x7, 0x7ff}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x0, 0x66}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x7}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x20, 0x8}}, @IFLA_VF_RATE={0x10, 0x6, {0x80, 0x6, 0xf55b}}]}, {0x34, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x51, 0x4}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x6}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x4}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x16b, 0x1f}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x6}}]}, {0x6c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x56a4, 0xfffffffb, 0xb4fe}}, @IFLA_VF_VLAN={0x10, 0x2, {0x6, 0xbd6, 0x4}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x2, 0x1f}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x2, 0x4}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x9, 0xdb15}}, @IFLA_VF_VLAN={0x10, 0x2, {0x80000001, 0xab3, 0x1ff}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x101, 0x7fff}}]}, {0x30, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x2c, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x5, 0x62e, 0x7, 0x88a8}}, {0x14, 0x1, {0x8, 0x6fe, 0x3, 0x8100}}]}]}, {0x38, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xd09a, @random="00ee734b4e64"}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x51a7, 0x7}}]}, {0x7c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x2, 0xc000000}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x200, 0x8001}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x2, 0xfff}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x5e, 0x7}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x9, 0x3}}, @IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x3, 0xbee, 0x2, 0x8100}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x7fff, 0x7}}]}]}]}, 0x230}}, 0x0) 23:03:16 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000001c0)=[{0x28, 0x0, 0x1, 0xcb7}, {0x80000006, 0x4d}]}, 0x10) r1 = gettid() tkill(r1, 0x3c) pidfd_open(r1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000400)='gid_map\x00') preadv(r2, &(0x7f0000000380)=[{&(0x7f00000006c0)=""/225, 0xe1}, {&(0x7f00000005c0)=""/227, 0xe3}], 0x2, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x0) clock_gettime(0x0, &(0x7f0000000180)) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r5, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r5, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r5, 0x5501, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r6, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r6, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r6, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r5, 0x5501, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1f) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) ioctl$TIOCL_GETSHIFTSTATE(r2, 0x541c, &(0x7f0000000340)) ioctl$UI_SET_LEDBIT(r4, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r4, 0x5501, 0x0) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000200)={0x0, 0x9, 0x4, 0x20, 0x200, {0x0, 0x2710}, {0x1, 0x4, 0x24, 0x5, 0xe6, 0x7, "a25be321"}, 0x8005, 0x3, @offset, 0x7, 0x0, r4}) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r8, 0x84, 0x75, &(0x7f0000000180)={r9}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000280)={r9, 0x0, 0x20}, &(0x7f00000002c0)=0xc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000300)={r10, 0x1, 0xff, 0x101, 0xb173, 0x6}, 0x14) r11 = gettid() tkill(r11, 0x3c) pidfd_open(r11, 0x0) fcntl$setownex(r3, 0xf, &(0x7f0000000000)={0x0, r11}) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000080)=""/159) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') [ 270.411377][ T9875] UBIFS error (pid: 9875): cannot open "(null)", error -22 [ 270.593811][ T9885] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:03:16 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000002c0)={@mcast2, 0x5, r2}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b16, &(0x7f0000000640)='wlan1\x00\x03\xd3UM\xe1\x04\xbeK\x19\xec\x00\x00\x96\x00\x00\x00\x00\x00\x14\x00\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0\xc6\x0fkzP\xbfQ\xb5\xbd\xcb\xfe\xf5y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4') 23:03:16 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = dup2(r1, r0) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000036c0), 0x12) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x4800) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r4, 0x200006) sendfile(r0, r4, 0x0, 0x8000fffffffe) inotify_rm_watch(0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="b93c564b636700000000b4ce360000a299b7f4d0e3", 0x15) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000240)={'vcan0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0100000000000000000000000000000000c46d6199d0d6fd61c00000009df304b1adea9a6f9e8851ba8708079c0582b515f4afc5fe349091aaedebc541815fc36a4cdaa0ee39"]}) r5 = gettid() tkill(r5, 0x3c) pidfd_open(r5, 0x0) ptrace$setsig(0x4203, r5, 0x4, &(0x7f00000001c0)={0x25, 0x9, 0x3ff}) accept4(r4, 0x0, 0x0, 0x0) [ 270.736658][ C1] IPv4: Oversized IP packet from 127.0.0.1 23:03:17 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) dup2(r0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000300)='/dev/ptmx\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)='))wlan0\x00', &(0x7f0000000400)='syz0\x00', &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', &(0x7f0000000500)='$loem0wlan0vboxnet1\x00', &(0x7f0000000540)='^\x00', &(0x7f0000000580)='/dev/ptmx\x00', &(0x7f00000005c0)='/dev/uinput\x00']) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @in={0x2, 0x4e24, @multicast2}}}, 0x90) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x800, 0x3, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000280)=0x23) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "f4f262481cbe198adbcc16b267d0c1ef2ba083"}) ioctl$KVM_GET_API_VERSION(0xffffffffffffffff, 0xae00, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r5, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000440)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r5, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r5, 0x5501, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r5) ioctl$TCSETSF(r4, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xd67a2a4, 0x0, "e6003ec3000400"}) 23:03:17 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9febf7ff18000000000000000c0000000c000000020000000000000000000004000000000000"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) [ 270.852568][ C0] IPv4: Oversized IP packet from 127.0.0.1 23:03:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="25bca274769e620a2734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a708628a146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x100c0a1, &(0x7f0000000140)=ANY=[@ANYBLOB='journal_patx=./Kiie1,\x00']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f0000000180)) 23:03:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa}]}, 0x40}}, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200800, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000040)="f6e3c2dba58d6dfe3472c9f7ecc83b904fbaff6b791d3d93b69bf5c023c0f2d0ce6502fe81") [ 270.996874][ T9910] input: syz0 as /devices/virtual/input/input25 23:03:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0x400, 0x8, '9P2000.u'}, 0x15) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000440)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x4050) socket$can_raw(0x1d, 0x3, 0x1) r4 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r4, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r5 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r5, &(0x7f0000000140), 0x0, 0x10) accept$packet(r5, 0x0, &(0x7f0000000340)) r6 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r6, &(0x7f0000000140), 0xffffffffffffff68, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r6, 0x8982, &(0x7f0000000300)={0x0, 'macvlan0\x00', {0x8}, 0x7fbf}) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0x4084) r7 = fanotify_init(0x0, 0x0) r8 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) fanotify_mark(r7, 0x102, 0x10, r8, 0x0) fcntl$F_GET_FILE_RW_HINT(r8, 0x40d, &(0x7f00000000c0)) r9 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x400000, 0x0) fcntl$lock(r9, 0x24, &(0x7f0000000140)={0x2, 0x4, 0x8f2d, 0x3, 0xffffffffffffffff}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="9632d1f4ee1cc99c"], 0xfdef) bpf$PROG_LOAD(0x5, 0x0, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x20000, 0x14) 23:03:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000480)='wireguard\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) write$6lowpan_enable(r4, &(0x7f0000000100)='0', 0x1) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x75bf1f50) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002500e50d00"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff"], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'vlan0\x00', r7}) preadv(r3, &(0x7f00000017c0), 0x199, 0x0) accept$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000080)={0x40, r1, 0x4, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r8}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}]}, 0x40}}, 0x0) [ 271.273844][ T9910] input: syz0 as /devices/virtual/input/input26 [ 271.320969][ C1] ================================================================== [ 271.329610][ C1] BUG: KASAN: slab-out-of-bounds in bitmap_port_gc+0x112/0x4f0 [ 271.337163][ C1] Read of size 8 at addr ffff8880963362c0 by task blkid/9931 [ 271.344532][ C1] [ 271.346896][ C1] CPU: 1 PID: 9931 Comm: blkid Not tainted 5.5.0-rc6-next-20200116-syzkaller #0 [ 271.355927][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.366686][ C1] Call Trace: [ 271.369990][ C1] [ 271.372978][ C1] dump_stack+0x197/0x210 [ 271.377326][ C1] ? bitmap_port_gc+0x112/0x4f0 [ 271.382260][ C1] print_address_description.constprop.0.cold+0xd4/0x30b [ 271.389296][ C1] ? bitmap_port_gc+0x112/0x4f0 [ 271.394165][ C1] ? bitmap_port_gc+0x112/0x4f0 [ 271.399037][ C1] __kasan_report.cold+0x1b/0x32 [ 271.403995][ C1] ? bitmap_port_gc+0x112/0x4f0 [ 271.408863][ C1] kasan_report+0x12/0x20 [ 271.413264][ C1] check_memory_region+0x134/0x1a0 [ 271.418392][ C1] __kasan_check_read+0x11/0x20 [ 271.423260][ C1] bitmap_port_gc+0x112/0x4f0 [ 271.428022][ C1] call_timer_fn+0x1ac/0x780 [ 271.432631][ C1] ? bitmap_port_test+0x170/0x170 [ 271.437672][ C1] ? msleep_interruptible+0x150/0x150 [ 271.443084][ C1] ? run_timer_softirq+0x6b1/0x1790 [ 271.448363][ C1] ? trace_hardirqs_on+0x67/0x240 [ 271.453407][ C1] ? bitmap_port_test+0x170/0x170 [ 271.458444][ C1] ? bitmap_port_test+0x170/0x170 [ 271.463489][ C1] run_timer_softirq+0x6c3/0x1790 [ 271.468536][ C1] ? add_timer+0x930/0x930 [ 271.473119][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 271.479293][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 271.484861][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 271.490857][ C1] ? trace_hardirqs_on+0x67/0x240 [ 271.496003][ C1] __do_softirq+0x262/0x98c [ 271.500553][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 271.505481][ C1] irq_exit+0x19b/0x1e0 [ 271.509655][ C1] smp_apic_timer_interrupt+0x1a3/0x610 [ 271.515243][ C1] apic_timer_interrupt+0xf/0x20 [ 271.520290][ C1] [ 271.523265][ C1] RIP: 0010:lock_release+0x4c0/0x960 [ 271.528559][ C1] Code: 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 8c 03 00 00 48 83 3d f7 83 58 08 00 0f 84 7f 01 00 00 48 8b bd 48 ff ff ff 57 9d <0f> 1f 44 00 00 48 b8 00 00 00 00 00 fc ff df 48 01 c3 48 c7 03 00 [ 271.548169][ C1] RSP: 0018:ffffc900016a7b80 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 271.556636][ C1] RAX: 1ffffffff136774f RBX: 1ffff920002d4f75 RCX: 1ffff1100a255dca [ 271.564633][ C1] RDX: dffffc0000000000 RSI: 1ffff1100a255dcc RDI: 0000000000000286 [ 271.572629][ C1] RBP: ffffc900016a7c50 R08: 0000000000000001 R09: ffff8880512aee58 [ 271.580620][ C1] R10: fffffbfff154a5c8 R11: ffffffff8aa52e47 R12: ffff8880512ae5c0 [ 271.588720][ C1] R13: ffffffff81aa765f R14: ffffc900016a7c28 R15: ffff8880512ae5c0 [ 271.596773][ C1] ? fs_reclaim_release+0xf/0x30 [ 271.601742][ C1] ? __kasan_check_read+0x11/0x20 [ 271.606785][ C1] ? lock_downgrade+0x920/0x920 [ 271.611649][ C1] ? lock_acquire+0x190/0x410 [ 271.616353][ C1] fs_reclaim_release+0x22/0x30 [ 271.621222][ C1] kmem_cache_alloc+0x30/0x710 [ 271.626116][ C1] ? __lockdep_free_key_range+0x120/0x120 [ 271.631936][ C1] getname_flags+0xd6/0x5b0 [ 271.636463][ C1] getname+0x1a/0x20 [ 271.640462][ C1] do_sys_openat2+0x4a6/0x840 [ 271.645161][ C1] ? file_open_root+0x5f0/0x5f0 [ 271.650040][ C1] do_sys_open+0xfc/0x190 [ 271.654386][ C1] ? filp_open+0x80/0x80 [ 271.658789][ C1] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 271.664267][ C1] ? do_syscall_64+0x26/0x790 [ 271.668972][ C1] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.675057][ C1] ? do_syscall_64+0x26/0x790 [ 271.679758][ C1] __x64_sys_open+0x7e/0xc0 [ 271.684276][ C1] do_syscall_64+0xfa/0x790 [ 271.688797][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.694695][ C1] RIP: 0033:0x7fa059de0120 [ 271.699122][ C1] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 271.712214][ T27] audit: type=1804 audit(1580857397.905:34): pid=9934 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir706606994/syzkaller.1UI7JN/8/bus" dev="sda1" ino=16555 res=1 [ 271.718951][ C1] RSP: 002b:00007ffd045d1d98 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 271.718975][ C1] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa059de0120 [ 271.718983][ C1] RDX: 00007ffd045d3f41 RSI: 0000000000000000 RDI: 00007ffd045d3f41 [ 271.718990][ C1] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 271.718998][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001497030 [ 271.719006][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 271.719030][ C1] [ 271.719038][ C1] Allocated by task 9869: [ 271.719054][ C1] save_stack+0x23/0x90 [ 271.719074][ C1] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 271.808251][ C1] kasan_kmalloc+0x9/0x10 [ 271.812598][ C1] __kmalloc+0x163/0x770 [ 271.816858][ C1] ip_set_alloc+0x38/0x5e [ 271.821200][ C1] bitmap_port_create+0x3dc/0x7c0 [ 271.826233][ C1] ip_set_create+0x6f1/0x1500 [ 271.831006][ C1] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 271.835956][ C1] netlink_rcv_skb+0x177/0x450 [ 271.840357][ T27] audit: type=1804 audit(1580857398.025:35): pid=9936 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir706606994/syzkaller.1UI7JN/8/bus" dev="sda1" ino=16555 res=1 [ 271.840724][ C1] nfnetlink_rcv+0x1ba/0x460 [ 271.840744][ C1] netlink_unicast+0x59e/0x7e0 [ 271.840754][ C1] netlink_sendmsg+0x91c/0xea0 [ 271.840851][ C1] sock_sendmsg+0xd7/0x130 [ 271.840869][ C1] ____sys_sendmsg+0x753/0x880 [ 271.888307][ C1] ___sys_sendmsg+0x100/0x170 [ 271.892999][ C1] __sys_sendmsg+0x105/0x1d0 [ 271.897608][ C1] __x64_sys_sendmsg+0x78/0xb0 [ 271.902386][ C1] do_syscall_64+0xfa/0x790 [ 271.907003][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.912890][ C1] [ 271.915222][ C1] Freed by task 4788: [ 271.919324][ C1] save_stack+0x23/0x90 [ 271.923494][ C1] __kasan_slab_free+0x102/0x150 [ 271.928440][ C1] kasan_slab_free+0xe/0x10 [ 271.932955][ C1] kfree+0x10a/0x2c0 [ 271.936921][ C1] tomoyo_path_perm+0x24e/0x430 [ 271.941828][ C1] tomoyo_inode_getattr+0x1d/0x30 [ 271.946946][ C1] security_inode_getattr+0xf2/0x150 [ 271.952243][ C1] vfs_getattr+0x25/0x70 [ 271.956520][ C1] vfs_statx+0x15d/0x200 [ 271.960785][ C1] __do_sys_newstat+0xa4/0x130 [ 271.965572][ C1] __x64_sys_newstat+0x54/0x80 [ 271.970356][ C1] do_syscall_64+0xfa/0x790 [ 271.974886][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.980777][ C1] [ 271.983126][ C1] The buggy address belongs to the object at ffff8880963362c0 [ 271.983126][ C1] which belongs to the cache kmalloc-32 of size 32 [ 271.997020][ C1] The buggy address is located 0 bytes inside of [ 271.997020][ C1] 32-byte region [ffff8880963362c0, ffff8880963362e0) [ 272.010242][ C1] The buggy address belongs to the page: [ 272.015893][ C1] page:ffffea000258cd80 refcount:1 mapcount:0 mapping:ffff8880aa4001c0 index:0xffff888096336fc1 [ 272.026310][ C1] flags: 0xfffe0000000200(slab) [ 272.031180][ C1] raw: 00fffe0000000200 ffffea00027d8e08 ffffea00026c4d08 ffff8880aa4001c0 [ 272.039794][ C1] raw: ffff888096336fc1 ffff888096336000 000000010000003f 0000000000000000 [ 272.048386][ C1] page dumped because: kasan: bad access detected [ 272.054806][ C1] [ 272.057142][ C1] Memory state around the buggy address: [ 272.062898][ C1] ffff888096336180: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 272.070975][ C1] ffff888096336200: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 272.079052][ C1] >ffff888096336280: fb fb fb fb fc fc fc fc 04 fc fc fc fc fc fc fc [ 272.087129][ C1] ^ [ 272.093392][ C1] ffff888096336300: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 272.101468][ C1] ffff888096336380: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 272.109538][ C1] ================================================================== [ 272.117612][ C1] Disabling lock debugging due to kernel taint [ 272.123856][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 272.130457][ C1] CPU: 1 PID: 9931 Comm: blkid Tainted: G B 5.5.0-rc6-next-20200116-syzkaller #0 [ 272.140875][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.150935][ C1] Call Trace: [ 272.154228][ C1] [ 272.157100][ C1] dump_stack+0x197/0x210 [ 272.161449][ C1] panic+0x2e3/0x75c [ 272.165455][ C1] ? add_taint.cold+0x16/0x16 [ 272.170141][ C1] ? retint_kernel+0x2b/0x2b [ 272.174746][ C1] ? trace_hardirqs_on+0x5e/0x240 [ 272.179781][ C1] ? bitmap_port_gc+0x112/0x4f0 [ 272.184654][ C1] end_report+0x47/0x4f [ 272.188824][ C1] ? bitmap_port_gc+0x112/0x4f0 [ 272.193684][ C1] __kasan_report.cold+0xe/0x32 [ 272.198642][ C1] ? bitmap_port_gc+0x112/0x4f0 [ 272.203505][ C1] kasan_report+0x12/0x20 [ 272.207848][ C1] check_memory_region+0x134/0x1a0 [ 272.212971][ C1] __kasan_check_read+0x11/0x20 [ 272.217832][ C1] bitmap_port_gc+0x112/0x4f0 [ 272.222552][ C1] call_timer_fn+0x1ac/0x780 [ 272.227150][ C1] ? bitmap_port_test+0x170/0x170 [ 272.232812][ C1] ? msleep_interruptible+0x150/0x150 [ 272.238317][ C1] ? run_timer_softirq+0x6b1/0x1790 [ 272.243524][ C1] ? trace_hardirqs_on+0x67/0x240 [ 272.248554][ C1] ? bitmap_port_test+0x170/0x170 [ 272.253586][ C1] ? bitmap_port_test+0x170/0x170 [ 272.258615][ C1] run_timer_softirq+0x6c3/0x1790 [ 272.263654][ C1] ? add_timer+0x930/0x930 [ 272.268077][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 272.274246][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 272.279802][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 272.285795][ C1] ? trace_hardirqs_on+0x67/0x240 [ 272.290831][ C1] __do_softirq+0x262/0x98c [ 272.295340][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 272.300206][ C1] irq_exit+0x19b/0x1e0 [ 272.304375][ C1] smp_apic_timer_interrupt+0x1a3/0x610 [ 272.309934][ C1] apic_timer_interrupt+0xf/0x20 [ 272.314871][ C1] [ 272.317941][ C1] RIP: 0010:lock_release+0x4c0/0x960 [ 272.323232][ C1] Code: 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 8c 03 00 00 48 83 3d f7 83 58 08 00 0f 84 7f 01 00 00 48 8b bd 48 ff ff ff 57 9d <0f> 1f 44 00 00 48 b8 00 00 00 00 00 fc ff df 48 01 c3 48 c7 03 00 [ 272.342844][ C1] RSP: 0018:ffffc900016a7b80 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 272.351364][ C1] RAX: 1ffffffff136774f RBX: 1ffff920002d4f75 RCX: 1ffff1100a255dca [ 272.359345][ C1] RDX: dffffc0000000000 RSI: 1ffff1100a255dcc RDI: 0000000000000286 [ 272.367325][ C1] RBP: ffffc900016a7c50 R08: 0000000000000001 R09: ffff8880512aee58 [ 272.375301][ C1] R10: fffffbfff154a5c8 R11: ffffffff8aa52e47 R12: ffff8880512ae5c0 [ 272.383281][ C1] R13: ffffffff81aa765f R14: ffffc900016a7c28 R15: ffff8880512ae5c0 [ 272.391276][ C1] ? fs_reclaim_release+0xf/0x30 [ 272.396235][ C1] ? __kasan_check_read+0x11/0x20 [ 272.401277][ C1] ? lock_downgrade+0x920/0x920 [ 272.406135][ C1] ? lock_acquire+0x190/0x410 [ 272.410834][ C1] fs_reclaim_release+0x22/0x30 [ 272.415696][ C1] kmem_cache_alloc+0x30/0x710 [ 272.420593][ C1] ? __lockdep_free_key_range+0x120/0x120 [ 272.426326][ C1] getname_flags+0xd6/0x5b0 [ 272.431172][ C1] getname+0x1a/0x20 [ 272.435082][ C1] do_sys_openat2+0x4a6/0x840 [ 272.439779][ C1] ? file_open_root+0x5f0/0x5f0 [ 272.444649][ C1] do_sys_open+0xfc/0x190 [ 272.448986][ C1] ? filp_open+0x80/0x80 [ 272.453234][ C1] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 272.458696][ C1] ? do_syscall_64+0x26/0x790 [ 272.463379][ C1] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.469453][ C1] ? do_syscall_64+0x26/0x790 [ 272.474152][ C1] __x64_sys_open+0x7e/0xc0 [ 272.478666][ C1] do_syscall_64+0xfa/0x790 [ 272.483186][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.489078][ C1] RIP: 0033:0x7fa059de0120 [ 272.493495][ C1] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 272.513581][ C1] RSP: 002b:00007ffd045d1d98 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 272.522012][ C1] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa059de0120 [ 272.529992][ C1] RDX: 00007ffd045d3f41 RSI: 0000000000000000 RDI: 00007ffd045d3f41 [ 272.537969][ C1] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 272.545946][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001497030 [ 272.554020][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 272.563513][ C1] Kernel Offset: disabled [ 272.567851][ C1] Rebooting in 86400 seconds..