[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 44.810934][ T26] audit: type=1800 audit(1561232116.238:25): pid=7859 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 44.831566][ T26] audit: type=1800 audit(1561232116.248:26): pid=7859 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 44.863648][ T26] audit: type=1800 audit(1561232116.248:27): pid=7859 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.143' (ECDSA) to the list of known hosts. 2019/06/22 19:35:29 fuzzer started 2019/06/22 19:35:32 dialing manager at 10.128.0.26:41373 2019/06/22 19:35:32 syscalls: 2465 2019/06/22 19:35:32 code coverage: enabled 2019/06/22 19:35:32 comparison tracing: enabled 2019/06/22 19:35:32 extra coverage: extra coverage is not supported by the kernel 2019/06/22 19:35:32 setuid sandbox: enabled 2019/06/22 19:35:32 namespace sandbox: enabled 2019/06/22 19:35:32 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/22 19:35:32 fault injection: enabled 2019/06/22 19:35:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/22 19:35:32 net packet injection: enabled 2019/06/22 19:35:32 net device setup: enabled 19:37:52 executing program 0: syzkaller login: [ 201.154366][ T8023] IPVS: ftp: loaded support on port[0] = 21 19:37:52 executing program 1: [ 201.289016][ T8023] chnl_net:caif_netlink_parms(): no params data found [ 201.371136][ T8023] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.387574][ T8023] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.396529][ T8023] device bridge_slave_0 entered promiscuous mode [ 201.412746][ T8026] IPVS: ftp: loaded support on port[0] = 21 [ 201.422791][ T8023] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.430921][ T8023] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.439422][ T8023] device bridge_slave_1 entered promiscuous mode 19:37:52 executing program 2: [ 201.470447][ T8023] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 201.490581][ T8023] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 201.547254][ T8023] team0: Port device team_slave_0 added [ 201.567098][ T8023] team0: Port device team_slave_1 added 19:37:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000080)={'syz1\x00'}, 0x45c) [ 201.647718][ T8023] device hsr_slave_0 entered promiscuous mode [ 201.694546][ T8023] device hsr_slave_1 entered promiscuous mode [ 201.789822][ T8028] IPVS: ftp: loaded support on port[0] = 21 [ 201.796435][ T8023] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.803624][ T8023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.811475][ T8023] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.818595][ T8023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.847197][ T8030] IPVS: ftp: loaded support on port[0] = 21 19:37:53 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) vmsplice(r0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0) [ 201.939971][ T8026] chnl_net:caif_netlink_parms(): no params data found [ 202.113541][ T8026] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.129214][ T8026] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.137572][ T8026] device bridge_slave_0 entered promiscuous mode [ 202.146764][ T8026] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.153867][ T8026] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.163346][ T8026] device bridge_slave_1 entered promiscuous mode [ 202.181002][ T8028] chnl_net:caif_netlink_parms(): no params data found [ 202.223893][ T8034] IPVS: ftp: loaded support on port[0] = 21 [ 202.242677][ T8023] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.252802][ T8026] bond0: Enslaving bond_slave_0 as an active interface with an up link 19:37:53 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001700)}}], 0x40000e5, 0x0) [ 202.306687][ T8026] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 202.342057][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.366522][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.387142][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.396962][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 202.412749][ T8028] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.421469][ T8028] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.432068][ T8028] device bridge_slave_0 entered promiscuous mode [ 202.451377][ T8030] chnl_net:caif_netlink_parms(): no params data found [ 202.470636][ T8023] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.478954][ T8028] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.486502][ T8028] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.497422][ T8028] device bridge_slave_1 entered promiscuous mode [ 202.513262][ T8026] team0: Port device team_slave_0 added [ 202.545202][ T8028] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 202.554960][ T8026] team0: Port device team_slave_1 added [ 202.586908][ T8028] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 202.596983][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.607322][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.616165][ T2796] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.623213][ T2796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.648838][ T8039] IPVS: ftp: loaded support on port[0] = 21 [ 202.668520][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.677688][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.686543][ T2796] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.693598][ T2796] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.701289][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.745931][ T8026] device hsr_slave_0 entered promiscuous mode [ 202.804677][ T8026] device hsr_slave_1 entered promiscuous mode [ 202.862687][ T8030] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.870028][ T8030] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.877793][ T8030] device bridge_slave_0 entered promiscuous mode [ 202.885857][ T8030] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.892921][ T8030] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.900904][ T8030] device bridge_slave_1 entered promiscuous mode [ 202.916791][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.925836][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.934598][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.943036][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.976357][ T8030] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 202.986779][ T8028] team0: Port device team_slave_0 added [ 202.993754][ T8028] team0: Port device team_slave_1 added [ 203.008849][ T8030] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 203.029975][ T8030] team0: Port device team_slave_0 added [ 203.045633][ T8030] team0: Port device team_slave_1 added [ 203.055384][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.063819][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.147113][ T8028] device hsr_slave_0 entered promiscuous mode [ 203.214453][ T8028] device hsr_slave_1 entered promiscuous mode [ 203.322432][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 203.332090][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.341696][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.350228][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.425935][ T8030] device hsr_slave_0 entered promiscuous mode [ 203.484555][ T8030] device hsr_slave_1 entered promiscuous mode [ 203.601491][ T8023] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 203.611419][ T8034] chnl_net:caif_netlink_parms(): no params data found [ 203.635513][ T8026] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.701554][ T8026] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.716114][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.724054][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.769377][ T8034] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.777219][ T8034] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.785444][ T8034] device bridge_slave_0 entered promiscuous mode [ 203.793381][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.802735][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.811211][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.818309][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.826830][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.835596][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.843915][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.851048][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.858639][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.882297][ T8026] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 203.893157][ T8026] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 19:37:55 executing program 0: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000140)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffd308", 0x1f) [ 203.947253][ T8034] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.967988][ T8034] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.983118][ T8051] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 19:37:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000100)) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) getsockname(r2, &(0x7f0000002380)=@hci, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000040)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 203.987735][ T8034] device bridge_slave_1 entered promiscuous mode [ 204.010992][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.019476][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.032165][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.046210][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.056216][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 204.065367][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.073962][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 204.082440][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 204.091280][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 204.099716][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 204.120064][ T8039] chnl_net:caif_netlink_parms(): no params data found [ 204.143986][ T8034] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 204.165272][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 204.173779][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 204.191761][ T8030] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.199280][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 204.199382][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 204.226448][ T8028] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.234121][ C0] hrtimer: interrupt took 41850 ns [ 204.241502][ T8034] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 204.283939][ T8034] team0: Port device team_slave_0 added [ 204.293708][ T8034] team0: Port device team_slave_1 added [ 204.304248][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 204.310816][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 204.346577][ T8028] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.358157][ T8026] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 204.378345][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.386967][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.396476][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.404927][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.420789][ T8030] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.428162][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 204.428220][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 204.476248][ T8034] device hsr_slave_0 entered promiscuous mode [ 204.514728][ T8034] device hsr_slave_1 entered promiscuous mode [ 204.534261][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 204.540385][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 204.559908][ T8039] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.567766][ T8039] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.576680][ T8039] device bridge_slave_0 entered promiscuous mode [ 204.599436][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.609200][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.618162][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.625292][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.633202][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.642959][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.651949][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.659251][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.667349][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.675487][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.684044][ T8039] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.692251][ T8039] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.700909][ T8039] device bridge_slave_1 entered promiscuous mode [ 204.716012][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.728771][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.737855][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.745576][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.783600][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.793305][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.803320][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.810496][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state 19:37:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20) [ 204.827855][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 204.841407][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 204.852756][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 19:37:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20) [ 204.891466][ T8039] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 204.913051][ T8039] bond0: Enslaving bond_slave_1 as an active interface with an up link 19:37:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20) [ 204.971237][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.980611][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.000479][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.012988][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 19:37:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20) [ 205.028127][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.044647][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.053685][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.069499][ T8028] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 205.080887][ T8028] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 19:37:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 205.119263][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.128978][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.141221][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 19:37:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 205.166980][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.180887][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.193126][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.217851][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.230238][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.243443][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.258017][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.267823][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.306210][ T8039] team0: Port device team_slave_0 added [ 205.314737][ T8039] team0: Port device team_slave_1 added [ 205.323616][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.333646][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.360915][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.404612][ T8034] 8021q: adding VLAN 0 to HW filter on device bond0 [ 205.431121][ T8030] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 205.476328][ T8039] device hsr_slave_0 entered promiscuous mode [ 205.525064][ T8039] device hsr_slave_1 entered promiscuous mode [ 205.588074][ T8028] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 205.605146][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.613624][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.647968][ T8034] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.680167][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 19:37:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10020, &(0x7f0000001200)) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ad", 0x1) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 205.697204][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.725144][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.732527][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.741777][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.760536][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.771981][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.779415][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.789011][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.811839][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.826533][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.836977][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.849754][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.872161][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.906264][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.926741][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.941322][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.955358][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 19:37:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 205.978399][ T8034] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 205.991618][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 206.024555][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.039241][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.079721][ T8034] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.099776][ T8039] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.120306][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.129002][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.152074][ T8039] 8021q: adding VLAN 0 to HW filter on device team0 [ 206.171593][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.181798][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.190768][ T3547] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.198154][ T3547] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.206980][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.226593][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.236486][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.246991][ T8040] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.254606][ T8040] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.262879][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.285296][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.295160][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.305096][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.325944][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 19:37:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r1, &(0x7f00000003c0)={0x0, 0xfffffffffffffe2f, &(0x7f0000000080)=[{&(0x7f0000000400)=""/219, 0xdb}, {0x0}], 0x2}, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000240)=""/142, 0xfd36}], 0x1000000000000017) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/1, 0x1}], 0x1}, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) [ 206.345217][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.355215][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.374066][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.384007][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 206.397440][ T8039] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 206.416407][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.425859][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.450379][ T8039] 8021q: adding VLAN 0 to HW filter on device batadv0 19:37:58 executing program 5: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffd0c, 0x0, 0x0, 0x800e0046e) ppoll(&(0x7f0000000000)=[{r0, 0x80}], 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x0) 19:37:58 executing program 0: poll(&(0x7f0000000080), 0x200000000000002e, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xc83df61c, 0x0, 0x0, 0x800e0086e) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000040)=""/55, 0x37}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) shutdown(r0, 0x0) 19:37:58 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='loginuid\x00') write$cgroup_subtree(r0, 0x0, 0x100000086) 19:37:58 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x41000000000003, &(0x7f0000000100)=0x0) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) io_submit(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 19:37:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000340)=""/151, 0x0, 0x97, 0x1}, 0x20) 19:37:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000200)={0x28b}) 19:37:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000340)=""/151, 0x0, 0x97, 0x1}, 0x20) 19:37:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000340)=""/151, 0x0, 0x97, 0x1}, 0x20) 19:37:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/151, 0x1a, 0x97, 0x1}, 0x20) 19:37:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x5d, &(0x7f0000000100)="8fee4a81", 0x4) r1 = dup(r0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x800e0080d) 19:37:58 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x143042, 0x0) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0xffffffffffffffdf) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) write$P9_RCLUNK(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) r2 = semget$private(0x0, 0x4, 0x40) semctl$IPC_INFO(r2, 0x3, 0x3, &(0x7f00000000c0)=""/116) tkill(r1, 0x1000000000016) 19:37:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000100)) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getpeername$packet(r3, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e40)=0x14) getsockname(r2, 0x0, &(0x7f0000002400)) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000040)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 19:37:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000340)=""/151, 0x26, 0x97, 0x1}, 0x20) 19:37:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000200)) 19:37:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/151, 0x1a, 0x97, 0x1}, 0x20) 19:37:58 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x41000000000003, &(0x7f0000000100)=0x0) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) io_submit(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 19:37:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/151, 0x1a, 0x97, 0x1}, 0x20) 19:37:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)=""/219, 0xdb}, {0x0}], 0x2}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000240)=""/142, 0x8e}], 0x1) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) readv(r2, &(0x7f0000000680)=[{&(0x7f00000000c0)=""/141, 0x8d}, {0x0}, {0x0}], 0x3) shutdown(r5, 0x0) shutdown(r2, 0x0) 19:37:58 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000000401010000409fbc60e130e2d215434805000200040001000800020004000180"], 0x24}}, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) 19:37:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20) 19:37:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20) [ 207.684421][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 207.690406][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:37:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000b00)=[{&(0x7f0000000700)=""/161, 0xa1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)=""/43, 0x2b}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r6, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}], 0x1) shutdown(r5, 0x0) shutdown(r2, 0x0) 19:37:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20) 19:37:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000140)={r2, 0x0, 0x1}) 19:37:59 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000000)) 19:37:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) pwritev(r1, &(0x7f0000000140)=[{0x0, 0xffffffffffffffea}, {0x0}], 0x2, 0x0) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x800e0080d) 19:37:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x1}]}}, &(0x7f0000000340)=""/151, 0x26, 0x97, 0x1}, 0x20) 19:37:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffd000/0x1000)=nil) 19:37:59 executing program 2: poll(&(0x7f00000002c0)=[{0xffffffffffffffff, 0x1}, {}, {}, {}, {}], 0x5, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x499, 0x0, 0x0, 0x800e003b8) shutdown(r0, 0x0) 19:37:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x1}]}}, &(0x7f0000000340)=""/151, 0x26, 0x97, 0x1}, 0x20) 19:37:59 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000000004002, 0x0) writev(r0, &(0x7f00000007c0)=[{&(0x7f0000000680)="cf", 0x1}], 0x1) 19:37:59 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0)=0x13, 0x4) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 208.340913][ T8245] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 19:37:59 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x3b4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r1, r0, r1}, &(0x7f00000009c0)=""/240, 0xf0, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)) 19:37:59 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='loginuid\x00') write$cgroup_subtree(r0, 0x0, 0x0) 19:37:59 executing program 3: poll(&(0x7f0000000200), 0x2000000000000038, 0x4e) poll(0x0, 0x0, 0xc5) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffd26, 0x0, 0x0, 0x800e00885) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000200)=""/197, 0xc5}, {0x0}, {0x0}], 0x3}, 0x0) shutdown(r0, 0x0) 19:38:00 executing program 4: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x0) 19:38:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x1}]}}, &(0x7f0000000340)=""/151, 0x26, 0x97, 0x1}, 0x20) 19:38:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x5000000) socket$inet(0x2, 0x0, 0x8000000003) 19:38:00 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x445) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x80000001) write$binfmt_misc(r0, &(0x7f0000002580)=ANY=[@ANYBLOB='s'], 0x1) ioctl$int_in(r0, 0x80000000005001, 0x0) 19:38:00 executing program 0: accept$unix(0xffffffffffffff9c, 0x0, 0x0) poll(&(0x7f0000000140), 0x17, 0x8000000000049) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xffffff4b, 0x0, 0x0, 0x800e00907) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/137, 0x89}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r0, 0x0) 19:38:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20) 19:38:00 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0xfffffffffffffffe, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') 19:38:00 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='loginuid\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 19:38:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20) 19:38:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20) 19:38:00 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='maps\x00') pread64(r0, 0x0, 0x0, 0x0) 19:38:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 19:38:00 executing program 0: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) recvfrom$inet(r0, 0x0, 0x10101, 0x0, 0x0, 0x800e00871) select(0x1db, &(0x7f0000000000), 0x0, 0x0, 0x0) shutdown(r0, 0x0) 19:38:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sync() setsockopt$inet6_tcp_buf(r2, 0x6, 0xd, &(0x7f00000002c0)='O', 0x1) rseq(0x0, 0x0, 0x0, 0x0) 19:38:00 executing program 3: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) write$P9_RWRITE(r0, &(0x7f0000000040)={0xb}, 0xb) close(0xffffffffffffffff) 19:38:01 executing program 2: dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/34, 0x22}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x3, 0x84) readv(r2, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/104, 0x68}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) shutdown(r1, 0x0) 19:38:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 19:38:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000840)=[{&(0x7f0000000100)=""/111, 0x6f}, {0x0}], 0x2) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/34, 0x22}], 0x1}, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x3, 0x84) readv(r5, &(0x7f0000000000)=[{&(0x7f0000003a00)=""/4096, 0x1000}], 0x30) shutdown(r4, 0x0) shutdown(r2, 0x0) 19:38:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 19:38:01 executing program 4: r0 = socket$kcm(0x29, 0xfffffffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000200)="f21c", 0x0}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000280)='cpB1\x82\x12,\xf8\x18\x11c\x17\v\x95\xdc\xa3\x18b\xbeV\x18\r\xe0Zt\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000340)='cp\xaf#\x8b\xa6\x12\xb9\x81\xc8\xe4\x1c\xc4\n+\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000580)=0x7, 0x12) r6 = openat$cgroup_ro(r5, &(0x7f0000000400)='io.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000480)={r4}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x4e, &(0x7f0000000780)=ANY=[@ANYBLOB="7ba8f8c81ba657e37300000000000000f4de344dd93d3035cd88c75cb3ef0892e6313fe283071a37ce106bb1cf7fc30c9c8bda1df9cd886c7c1315729b34f8ced91549c4dbcd026ff7cf02901671beee07659cd458ad168e023e97537c91071797507107d300191114521f676a080000000000000072c2e72dbb079ee600b4835d6c99d4525ccde1fc95304908928bee89cb875c20698066d27d53e1bf6339066bc77548c64428e6bf32b6828d9b5c981e5f4e20ae903650d12c43c182e7458c04b5e113a717032d7807ed0080000000000000eb9730c922273dfcfbb18331e4df2fbdac4009df3c90ef194eea212e5f951c75d9fed156a1c4b3c3be788ec3846beba30bb2da91e2bb1566c132b82a02e508a3147afefe5a2dbbd9b29c04593122e44fc7d6c817e39cf962a05c3dd191bcaf54f5240d4a94abb26ddb6d73acfea7a4d866018b11dcccc4d71c00cc951ac2d714766433dc5ed3d7ebf77dc6a44bab64308975b8d10ed945737fb6a0c3faff05f36a1fb8fd90d9e0238d7d5082e95e437f08efbb14cef872e8975c96721d564b50ba35a590f1856f82c083eb795030906b269539512e084796546c49843fabc53640900e776b41c2256f2d76d8ce84c66c6739b1f4664f763db7f0ad6c97457b33d6b9766b1c3aeac6419ff48767117e3f2bb7951bb45c300a923cec8286a40c4efcc56e629207d139681c0cabffb6a4fe574343c8306f4d752d49add67e0c691a33cf8157babfc9ea7d2a4a2a1d279536d0cea0e8b081716f000047d1ba9ad62d13c7dcb84a11f0de4ee6c6dd82a0bd4a61e3e086138cb18f31452ab9f342258b8c228baded16e61d708def7ea8c76713dbf0ae9345cae2684df589543d8fec23"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0x29, 0x2, 0x0) r8 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x20000000, @perf_bp={&(0x7f0000000100), 0x5}, 0x1411, 0xc92, 0x3e}, r8, 0x3, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r6, 0x800454d3, &(0x7f00000006c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) close(0xffffffffffffffff) sendmsg(r7, &(0x7f0000000080)={&(0x7f0000000380)=@in={0x2, 0x4e22, @empty}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0xffffffffffffffd2, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r6}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r9, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x0, &(0x7f0000000780)=ANY=[], 0x0}, 0x48) close(r10) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 19:38:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 19:38:01 executing program 5: 19:38:01 executing program 4: 19:38:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97}, 0x20) 19:38:01 executing program 0: 19:38:01 executing program 2: 19:38:01 executing program 5: accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) poll(&(0x7f0000000140), 0x17, 0x8000000000049) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xffffff4b, 0x0, 0x0, 0x800e00907) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/137, 0x89}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r0, 0x0) 19:38:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockname$unix(r1, &(0x7f0000000300), 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000000)=0x4, 0x4) getdents64(r0, &(0x7f0000002400)=""/4096, 0xc8b7) r2 = accept(0xffffffffffffffff, 0x0, 0x0) chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, r3) setsockopt$inet6_int(r2, 0x29, 0x5, &(0x7f0000000400), 0x4) 19:38:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97}, 0x20) 19:38:01 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x143042, 0x0) gettid() ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000100)={0xfffffffffffffde3}, 0x0) 19:38:01 executing program 2: 19:38:01 executing program 3: 19:38:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97}, 0x20) 19:38:01 executing program 0: 19:38:01 executing program 2: 19:38:02 executing program 0: 19:38:02 executing program 3: 19:38:02 executing program 2: 19:38:02 executing program 5: 19:38:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockname$unix(r1, &(0x7f0000000300), 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000000)=0x4, 0x4) getdents64(r0, &(0x7f0000002400)=""/4096, 0xc8b7) r2 = accept(0xffffffffffffffff, 0x0, 0x0) chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, r3) setsockopt$inet6_int(r2, 0x29, 0x5, &(0x7f0000000400), 0x4) 19:38:02 executing program 1: 19:38:02 executing program 0: 19:38:02 executing program 1: 19:38:02 executing program 3: 19:38:02 executing program 2: 19:38:02 executing program 3: 19:38:02 executing program 5: 19:38:02 executing program 0: 19:38:02 executing program 1: 19:38:02 executing program 2: 19:38:02 executing program 0: 19:38:02 executing program 4: 19:38:02 executing program 5: 19:38:02 executing program 3: 19:38:02 executing program 2: 19:38:02 executing program 0: 19:38:02 executing program 1: 19:38:02 executing program 2: 19:38:02 executing program 3: 19:38:02 executing program 0: 19:38:02 executing program 5: 19:38:02 executing program 1: 19:38:02 executing program 4: 19:38:02 executing program 2: 19:38:02 executing program 0: 19:38:02 executing program 3: 19:38:02 executing program 5: 19:38:02 executing program 1: 19:38:02 executing program 0: 19:38:02 executing program 2: 19:38:03 executing program 4: 19:38:03 executing program 5: 19:38:03 executing program 3: 19:38:03 executing program 2: 19:38:03 executing program 1: 19:38:03 executing program 0: 19:38:03 executing program 3: 19:38:03 executing program 5: 19:38:03 executing program 1: 19:38:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="fddc04005e0bcfec7be070") r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') sendmsg(0xffffffffffffffff, 0x0, 0x4000050) preadv(r1, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 19:38:03 executing program 2: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) write$P9_RWRITE(r0, &(0x7f0000000040)={0xb}, 0xb) close(r0) 19:38:03 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080), 0xe) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 19:38:03 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x340, 0x0) 19:38:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) 19:38:03 executing program 5: 19:38:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000100)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) socket$packet(0x11, 0x2, 0x300) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) getpeername$packet(r2, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e40)=0x14) setsockopt$sock_int(r0, 0x1, 0x6, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:38:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x35) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="c0dca5055e0bcfec7be070") ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 19:38:03 executing program 1: poll(&(0x7f0000000200)=[{0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0x4}, {}, {}, {}], 0x5, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xff8c, 0x0, 0x0, 0x800e004d0) poll(&(0x7f0000000040)=[{r0, 0x40}, {r0, 0x2000}, {r0, 0x2000}, {r0, 0x8}, {r0, 0x2c}, {r0, 0x10}], 0x6, 0x5) shutdown(r0, 0x0) 19:38:03 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x3b4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r1, r0, r1}, &(0x7f00000009c0)=""/240, 0xf0, 0x0) 19:38:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) recvfrom$inet(r0, 0x0, 0x187bd01f, 0x0, 0x0, 0x800e006d0) shutdown(r0, 0x0) 19:38:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xb, 0x8, 0x7, 0x5, 0x1}, 0x3c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000004c0), 0x0}, 0x18) 19:38:03 executing program 3: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffd0c, 0x0, 0x0, 0x800e0046e) ppoll(&(0x7f0000000000)=[{r0, 0x80}], 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 19:38:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 19:38:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000b00)=[{&(0x7f0000000700)=""/161, 0xa1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)=""/43, 0x2b}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r6, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {0x0}], 0x2) shutdown(r5, 0x0) shutdown(r2, 0x0) 19:38:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000180)=[{0x6}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 19:38:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x9, [{0x0, 0x4}]}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0x35, 0x97, 0x1}, 0x20) [ 212.544284][ T8561] kasan: CONFIG_KASAN_INLINE enabled [ 212.561412][ T8561] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 212.603886][ T8561] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 212.611103][ T8561] CPU: 1 PID: 8561 Comm: syz-executor.2 Not tainted 5.2.0-rc5+ #4 [ 212.619915][ T8561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.631121][ T8561] RIP: 0010:btf_struct_resolve+0x42d/0xfc0 [ 212.637405][ T8561] Code: e8 03 42 80 3c 28 00 4d 89 e7 74 08 48 89 df e8 a9 5b 25 00 4c 8b 23 49 8d 5c 24 04 48 89 d8 48 c1 e8 03 48 89 85 68 ff ff ff <42> 0f b6 04 28 84 c0 48 8b 55 c8 0f 85 19 04 00 00 4c 8d 6a fc 48 [ 212.657697][ T8561] RSP: 0018:ffff88804de7f5f0 EFLAGS: 00010247 [ 212.664347][ T8561] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000040000 [ 212.672468][ T8561] RDX: ffffc9000a21b000 RSI: 00000000000008b0 RDI: 00000000000008b1 [ 212.680776][ T8561] RBP: ffff88804de7f690 R08: ffffffff81897f28 R09: ffff88804de7f51c [ 212.688954][ T8561] R10: 0000000000000009 R11: 1ffff11015d66bf7 R12: 0000000000000000 [ 212.697162][ T8561] R13: dffffc0000000000 R14: ffff88809e982840 R15: ffff88804eb28540 [ 212.705645][ T8561] FS: 00007fc8b4a09700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 212.714765][ T8561] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 212.721884][ T8561] CR2: 000000000075c000 CR3: 00000000a4fde000 CR4: 00000000001406e0 [ 212.730721][ T8561] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 212.739320][ T8561] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 212.747631][ T8561] Call Trace: [ 212.751103][ T8561] btf_resolve+0x3ed/0xda0 [ 212.755799][ T8561] ? btf_sec_info_cmp+0x110/0x110 [ 212.761207][ T8561] ? kasan_kmalloc+0x9/0x10 [ 212.765723][ T8561] ? __kmalloc_node+0x4d/0x60 [ 212.770664][ T8561] btf_new_fd+0x216a/0x37b0 [ 212.775303][ T8561] ? __might_fault+0xf9/0x160 [ 212.779997][ T8561] ? btf_release+0xd0/0xd0 [ 212.785056][ T8561] __do_sys_bpf+0x1212/0xc5d0 [ 212.790282][ T8561] ? tomoyo_file_ioctl+0x23/0x30 [ 212.796120][ T8561] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.802891][ T8561] ? __bfs+0x550/0x550 [ 212.807072][ T8561] ? __lock_acquire+0xcf7/0x1a40 [ 212.812363][ T8561] ? __bpf_prog_put_rcu+0x320/0x320 [ 212.817914][ T8561] ? __lock_acquire+0xcf7/0x1a40 [ 212.822910][ T8561] ? trace_lock_acquire+0x190/0x190 [ 212.828765][ T8561] ? kasan_check_read+0x11/0x20 [ 212.834169][ T8561] ? do_raw_spin_unlock+0x49/0x260 [ 212.839609][ T8561] ? __might_fault+0xf9/0x160 [ 212.844701][ T8561] ? kasan_check_read+0x11/0x20 [ 212.849768][ T8561] ? _copy_to_user+0xca/0xf0 [ 212.854583][ T8561] ? put_timespec64+0x106/0x150 [ 212.859873][ T8561] ? ktime_get_raw+0xf0/0xf0 [ 212.864735][ T8561] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 212.870618][ T8561] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 212.876993][ T8561] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 212.883216][ T8561] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 212.889278][ T8561] ? do_syscall_64+0x1d/0x140 [ 212.894648][ T8561] __x64_sys_bpf+0x7a/0x90 [ 212.899349][ T8561] do_syscall_64+0xfe/0x140 [ 212.904213][ T8561] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.910396][ T8561] RIP: 0033:0x4592c9 [ 212.914384][ T8561] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 212.934981][ T8561] RSP: 002b:00007fc8b4a08c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 212.943535][ T8561] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 212.952322][ T8561] RDX: 0000000000000020 RSI: 0000000020000400 RDI: 0000000000000012 [ 212.960686][ T8561] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 212.969203][ T8561] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8b4a096d4 [ 212.977934][ T8561] R13: 00000000004bf4d3 R14: 00000000004d0aa0 R15: 00000000ffffffff [ 212.986200][ T8561] Modules linked in: [ 212.990423][ C1] net_ratelimit: 2 callbacks suppressed [ 212.990430][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 213.002576][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 213.008814][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 213.014643][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 213.024265][ T8561] ---[ end trace ae421e0b9d4b1aa8 ]--- [ 213.030206][ T8561] RIP: 0010:btf_struct_resolve+0x42d/0xfc0 [ 213.037970][ T8556] kobject: 'batman_adv' (0000000018e0edc6): kobject_uevent_env [ 213.038362][ T8561] Code: e8 03 42 80 3c 28 00 4d 89 e7 74 08 48 89 df e8 a9 5b 25 00 4c 8b 23 49 8d 5c 24 04 48 89 d8 48 c1 e8 03 48 89 85 68 ff ff ff <42> 0f b6 04 28 84 c0 48 8b 55 c8 0f 85 19 04 00 00 4c 8d 6a fc 48 [ 213.047362][ T8561] RSP: 0018:ffff88804de7f5f0 EFLAGS: 00010247 [ 213.066828][ T8556] kobject: 'batman_adv' (0000000018e0edc6): kobject_uevent_env: filter function caused the event to drop! [ 213.084522][ T8556] kobject: 'batman_adv' (0000000018e0edc6): kobject_cleanup, parent 00000000b5d59efe [ 213.092281][ T8561] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000040000 [ 213.096409][ T8556] kobject: 'batman_adv' (0000000018e0edc6): calling ktype release [ 213.112194][ T8561] RDX: ffffc9000a21b000 RSI: 00000000000008b0 RDI: 00000000000008b1 [ 213.121130][ T8561] RBP: ffff88804de7f690 R08: ffffffff81897f28 R09: ffff88804de7f51c [ 213.130010][ T8556] kobject: (0000000018e0edc6): dynamic_kobj_release [ 213.130491][ T8561] R10: 0000000000000009 R11: 1ffff11015d66bf7 R12: 0000000000000000 [ 213.141469][ T8556] kobject: 'batman_adv': free name [ 213.146720][ T8561] R13: dffffc0000000000 R14: ffff88809e982840 R15: ffff88804eb28540 [ 213.159855][ T8561] FS: 00007fc8b4a09700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 213.160027][ T8556] kobject: 'rx-0' (00000000fe3da133): kobject_cleanup, parent 00000000bfd8be26 [ 213.169176][ T8561] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 213.169182][ T8561] CR2: 00007f36ca380db8 CR3: 00000000a4fde000 CR4: 00000000001406e0 [ 213.169192][ T8561] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 213.169198][ T8561] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 213.169205][ T8561] Kernel panic - not syncing: Fatal exception [ 213.171452][ T8561] Kernel Offset: disabled [ 213.235797][ T8561] Rebooting in 86400 seconds..