[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c.
[   44.810934][   T26] audit: type=1800 audit(1561232116.238:25): pid=7859 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0
[   44.831566][   T26] audit: type=1800 audit(1561232116.248:26): pid=7859 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0
[   44.863648][   T26] audit: type=1800 audit(1561232116.248:27): pid=7859 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.0.143' (ECDSA) to the list of known hosts.
2019/06/22 19:35:29 fuzzer started
2019/06/22 19:35:32 dialing manager at 10.128.0.26:41373
2019/06/22 19:35:32 syscalls: 2465
2019/06/22 19:35:32 code coverage: enabled
2019/06/22 19:35:32 comparison tracing: enabled
2019/06/22 19:35:32 extra coverage: extra coverage is not supported by the kernel
2019/06/22 19:35:32 setuid sandbox: enabled
2019/06/22 19:35:32 namespace sandbox: enabled
2019/06/22 19:35:32 Android sandbox: /sys/fs/selinux/policy does not exist
2019/06/22 19:35:32 fault injection: enabled
2019/06/22 19:35:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/06/22 19:35:32 net packet injection: enabled
2019/06/22 19:35:32 net device setup: enabled
19:37:52 executing program 0:

syzkaller login: [  201.154366][ T8023] IPVS: ftp: loaded support on port[0] = 21
19:37:52 executing program 1:

[  201.289016][ T8023] chnl_net:caif_netlink_parms(): no params data found
[  201.371136][ T8023] bridge0: port 1(bridge_slave_0) entered blocking state
[  201.387574][ T8023] bridge0: port 1(bridge_slave_0) entered disabled state
[  201.396529][ T8023] device bridge_slave_0 entered promiscuous mode
[  201.412746][ T8026] IPVS: ftp: loaded support on port[0] = 21
[  201.422791][ T8023] bridge0: port 2(bridge_slave_1) entered blocking state
[  201.430921][ T8023] bridge0: port 2(bridge_slave_1) entered disabled state
[  201.439422][ T8023] device bridge_slave_1 entered promiscuous mode
19:37:52 executing program 2:

[  201.470447][ T8023] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  201.490581][ T8023] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  201.547254][ T8023] team0: Port device team_slave_0 added
[  201.567098][ T8023] team0: Port device team_slave_1 added
19:37:53 executing program 3:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0)
ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2f)
ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3)
r1 = dup(r0)
write$uinput_user_dev(r1, &(0x7f0000000080)={'syz1\x00'}, 0x45c)

[  201.647718][ T8023] device hsr_slave_0 entered promiscuous mode
[  201.694546][ T8023] device hsr_slave_1 entered promiscuous mode
[  201.789822][ T8028] IPVS: ftp: loaded support on port[0] = 21
[  201.796435][ T8023] bridge0: port 2(bridge_slave_1) entered blocking state
[  201.803624][ T8023] bridge0: port 2(bridge_slave_1) entered forwarding state
[  201.811475][ T8023] bridge0: port 1(bridge_slave_0) entered blocking state
[  201.818595][ T8023] bridge0: port 1(bridge_slave_0) entered forwarding state
[  201.847197][ T8030] IPVS: ftp: loaded support on port[0] = 21
19:37:53 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0)
vmsplice(r0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0)

[  201.939971][ T8026] chnl_net:caif_netlink_parms(): no params data found
[  202.113541][ T8026] bridge0: port 1(bridge_slave_0) entered blocking state
[  202.129214][ T8026] bridge0: port 1(bridge_slave_0) entered disabled state
[  202.137572][ T8026] device bridge_slave_0 entered promiscuous mode
[  202.146764][ T8026] bridge0: port 2(bridge_slave_1) entered blocking state
[  202.153867][ T8026] bridge0: port 2(bridge_slave_1) entered disabled state
[  202.163346][ T8026] device bridge_slave_1 entered promiscuous mode
[  202.181002][ T8028] chnl_net:caif_netlink_parms(): no params data found
[  202.223893][ T8034] IPVS: ftp: loaded support on port[0] = 21
[  202.242677][ T8023] 8021q: adding VLAN 0 to HW filter on device bond0
[  202.252802][ T8026] bond0: Enslaving bond_slave_0 as an active interface with an up link
19:37:53 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmmsg(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001700)}}], 0x40000e5, 0x0)

[  202.306687][ T8026] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  202.342057][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  202.366522][    T5] bridge0: port 1(bridge_slave_0) entered disabled state
[  202.387142][    T5] bridge0: port 2(bridge_slave_1) entered disabled state
[  202.396962][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  202.412749][ T8028] bridge0: port 1(bridge_slave_0) entered blocking state
[  202.421469][ T8028] bridge0: port 1(bridge_slave_0) entered disabled state
[  202.432068][ T8028] device bridge_slave_0 entered promiscuous mode
[  202.451377][ T8030] chnl_net:caif_netlink_parms(): no params data found
[  202.470636][ T8023] 8021q: adding VLAN 0 to HW filter on device team0
[  202.478954][ T8028] bridge0: port 2(bridge_slave_1) entered blocking state
[  202.486502][ T8028] bridge0: port 2(bridge_slave_1) entered disabled state
[  202.497422][ T8028] device bridge_slave_1 entered promiscuous mode
[  202.513262][ T8026] team0: Port device team_slave_0 added
[  202.545202][ T8028] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  202.554960][ T8026] team0: Port device team_slave_1 added
[  202.586908][ T8028] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  202.596983][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  202.607322][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  202.616165][ T2796] bridge0: port 1(bridge_slave_0) entered blocking state
[  202.623213][ T2796] bridge0: port 1(bridge_slave_0) entered forwarding state
[  202.648838][ T8039] IPVS: ftp: loaded support on port[0] = 21
[  202.668520][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  202.677688][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  202.686543][ T2796] bridge0: port 2(bridge_slave_1) entered blocking state
[  202.693598][ T2796] bridge0: port 2(bridge_slave_1) entered forwarding state
[  202.701289][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  202.745931][ T8026] device hsr_slave_0 entered promiscuous mode
[  202.804677][ T8026] device hsr_slave_1 entered promiscuous mode
[  202.862687][ T8030] bridge0: port 1(bridge_slave_0) entered blocking state
[  202.870028][ T8030] bridge0: port 1(bridge_slave_0) entered disabled state
[  202.877793][ T8030] device bridge_slave_0 entered promiscuous mode
[  202.885857][ T8030] bridge0: port 2(bridge_slave_1) entered blocking state
[  202.892921][ T8030] bridge0: port 2(bridge_slave_1) entered disabled state
[  202.900904][ T8030] device bridge_slave_1 entered promiscuous mode
[  202.916791][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  202.925836][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  202.934598][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  202.943036][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  202.976357][ T8030] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  202.986779][ T8028] team0: Port device team_slave_0 added
[  202.993754][ T8028] team0: Port device team_slave_1 added
[  203.008849][ T8030] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  203.029975][ T8030] team0: Port device team_slave_0 added
[  203.045633][ T8030] team0: Port device team_slave_1 added
[  203.055384][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  203.063819][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  203.147113][ T8028] device hsr_slave_0 entered promiscuous mode
[  203.214453][ T8028] device hsr_slave_1 entered promiscuous mode
[  203.322432][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  203.332090][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  203.341696][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  203.350228][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  203.425935][ T8030] device hsr_slave_0 entered promiscuous mode
[  203.484555][ T8030] device hsr_slave_1 entered promiscuous mode
[  203.601491][ T8023] 8021q: adding VLAN 0 to HW filter on device batadv0
[  203.611419][ T8034] chnl_net:caif_netlink_parms(): no params data found
[  203.635513][ T8026] 8021q: adding VLAN 0 to HW filter on device bond0
[  203.701554][ T8026] 8021q: adding VLAN 0 to HW filter on device team0
[  203.716114][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  203.724054][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  203.769377][ T8034] bridge0: port 1(bridge_slave_0) entered blocking state
[  203.777219][ T8034] bridge0: port 1(bridge_slave_0) entered disabled state
[  203.785444][ T8034] device bridge_slave_0 entered promiscuous mode
[  203.793381][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  203.802735][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  203.811211][   T22] bridge0: port 1(bridge_slave_0) entered blocking state
[  203.818309][   T22] bridge0: port 1(bridge_slave_0) entered forwarding state
[  203.826830][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  203.835596][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  203.843915][   T22] bridge0: port 2(bridge_slave_1) entered blocking state
[  203.851048][   T22] bridge0: port 2(bridge_slave_1) entered forwarding state
[  203.858639][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  203.882297][ T8026] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  203.893157][ T8026] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
19:37:55 executing program 0:
r0 = socket(0x10, 0x2, 0xc)
write(r0, &(0x7f0000000140)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffd308", 0x1f)

[  203.947253][ T8034] bridge0: port 2(bridge_slave_1) entered blocking state
[  203.967988][ T8034] bridge0: port 2(bridge_slave_1) entered disabled state
[  203.983118][ T8051] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'.
19:37:55 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000100))
bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10)
r2 = socket$packet(0x11, 0x2, 0x300)
pipe(&(0x7f00000002c0))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000380)={0x0, <r3=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0)
getsockname(r2, &(0x7f0000002380)=@hci, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0)
setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000040)=0x32, 0x4)
connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10)
sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0)

[  203.987735][ T8034] device bridge_slave_1 entered promiscuous mode
[  204.010992][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  204.019476][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  204.032165][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  204.046210][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  204.056216][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  204.065367][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  204.073962][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  204.082440][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  204.091280][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  204.099716][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  204.120064][ T8039] chnl_net:caif_netlink_parms(): no params data found
[  204.143986][ T8034] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  204.165272][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  204.173779][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  204.191761][ T8030] 8021q: adding VLAN 0 to HW filter on device bond0
[  204.199280][    C1] protocol 88fb is buggy, dev hsr_slave_0
[  204.199382][    C1] protocol 88fb is buggy, dev hsr_slave_1
[  204.226448][ T8028] 8021q: adding VLAN 0 to HW filter on device bond0
[  204.234121][    C0] hrtimer: interrupt took 41850 ns
[  204.241502][ T8034] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  204.283939][ T8034] team0: Port device team_slave_0 added
[  204.293708][ T8034] team0: Port device team_slave_1 added
[  204.304248][    C1] protocol 88fb is buggy, dev hsr_slave_0
[  204.310816][    C1] protocol 88fb is buggy, dev hsr_slave_1
[  204.346577][ T8028] 8021q: adding VLAN 0 to HW filter on device team0
[  204.358157][ T8026] 8021q: adding VLAN 0 to HW filter on device batadv0
[  204.378345][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  204.386967][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  204.396476][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  204.404927][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  204.420789][ T8030] 8021q: adding VLAN 0 to HW filter on device team0
[  204.428162][    C1] protocol 88fb is buggy, dev hsr_slave_0
[  204.428220][    C1] protocol 88fb is buggy, dev hsr_slave_1
[  204.476248][ T8034] device hsr_slave_0 entered promiscuous mode
[  204.514728][ T8034] device hsr_slave_1 entered promiscuous mode
[  204.534261][    C1] protocol 88fb is buggy, dev hsr_slave_0
[  204.540385][    C1] protocol 88fb is buggy, dev hsr_slave_1
[  204.559908][ T8039] bridge0: port 1(bridge_slave_0) entered blocking state
[  204.567766][ T8039] bridge0: port 1(bridge_slave_0) entered disabled state
[  204.576680][ T8039] device bridge_slave_0 entered promiscuous mode
[  204.599436][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  204.609200][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  204.618162][    T5] bridge0: port 1(bridge_slave_0) entered blocking state
[  204.625292][    T5] bridge0: port 1(bridge_slave_0) entered forwarding state
[  204.633202][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  204.642959][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  204.651949][    T5] bridge0: port 1(bridge_slave_0) entered blocking state
[  204.659251][    T5] bridge0: port 1(bridge_slave_0) entered forwarding state
[  204.667349][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  204.675487][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  204.684044][ T8039] bridge0: port 2(bridge_slave_1) entered blocking state
[  204.692251][ T8039] bridge0: port 2(bridge_slave_1) entered disabled state
[  204.700909][ T8039] device bridge_slave_1 entered promiscuous mode
[  204.716012][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  204.728771][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  204.737855][   T22] bridge0: port 2(bridge_slave_1) entered blocking state
[  204.745576][   T22] bridge0: port 2(bridge_slave_1) entered forwarding state
[  204.783600][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  204.793305][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  204.803320][   T22] bridge0: port 2(bridge_slave_1) entered blocking state
[  204.810496][   T22] bridge0: port 2(bridge_slave_1) entered forwarding state
19:37:56 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20)

[  204.827855][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  204.841407][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  204.852756][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
19:37:56 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20)

[  204.891466][ T8039] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  204.913051][ T8039] bond0: Enslaving bond_slave_1 as an active interface with an up link
19:37:56 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20)

[  204.971237][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  204.980611][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  205.000479][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  205.012988][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
19:37:56 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20)

[  205.028127][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  205.044647][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  205.053685][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  205.069499][ T8028] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  205.080887][ T8028] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
19:37:56 executing program 1:
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)

[  205.119263][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  205.128978][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  205.141221][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
19:37:56 executing program 1:
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)

[  205.166980][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  205.180887][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  205.193126][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  205.217851][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  205.230238][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  205.243443][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  205.258017][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  205.267823][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  205.306210][ T8039] team0: Port device team_slave_0 added
[  205.314737][ T8039] team0: Port device team_slave_1 added
[  205.323616][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  205.333646][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  205.360915][ T8030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  205.404612][ T8034] 8021q: adding VLAN 0 to HW filter on device bond0
[  205.431121][ T8030] 8021q: adding VLAN 0 to HW filter on device batadv0
[  205.476328][ T8039] device hsr_slave_0 entered promiscuous mode
[  205.525064][ T8039] device hsr_slave_1 entered promiscuous mode
[  205.588074][ T8028] 8021q: adding VLAN 0 to HW filter on device batadv0
[  205.605146][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  205.613624][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  205.647968][ T8034] 8021q: adding VLAN 0 to HW filter on device team0
[  205.680167][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
19:37:57 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10020, &(0x7f0000001200))
r1 = accept4(r0, 0x0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ad", 0x1)
sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0)

[  205.697204][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  205.725144][    T5] bridge0: port 1(bridge_slave_0) entered blocking state
[  205.732527][    T5] bridge0: port 1(bridge_slave_0) entered forwarding state
[  205.741777][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  205.760536][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  205.771981][    T5] bridge0: port 2(bridge_slave_1) entered blocking state
[  205.779415][    T5] bridge0: port 2(bridge_slave_1) entered forwarding state
[  205.789011][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  205.811839][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  205.826533][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  205.836977][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  205.849754][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  205.872161][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  205.906264][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  205.926741][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  205.941322][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  205.955358][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
19:37:57 executing program 1:
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)

[  205.978399][ T8034] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  205.991618][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  206.024555][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  206.039241][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  206.079721][ T8034] 8021q: adding VLAN 0 to HW filter on device batadv0
[  206.099776][ T8039] 8021q: adding VLAN 0 to HW filter on device bond0
[  206.120306][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  206.129002][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  206.152074][ T8039] 8021q: adding VLAN 0 to HW filter on device team0
[  206.171593][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  206.181798][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  206.190768][ T3547] bridge0: port 1(bridge_slave_0) entered blocking state
[  206.198154][ T3547] bridge0: port 1(bridge_slave_0) entered forwarding state
[  206.206980][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  206.226593][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  206.236486][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  206.246991][ T8040] bridge0: port 2(bridge_slave_1) entered blocking state
[  206.254606][ T8040] bridge0: port 2(bridge_slave_1) entered forwarding state
[  206.262879][ T8040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  206.285296][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  206.295160][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  206.305096][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  206.325944][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
19:37:57 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
recvmsg(r1, &(0x7f00000003c0)={0x0, 0xfffffffffffffe2f, &(0x7f0000000080)=[{&(0x7f0000000400)=""/219, 0xdb}, {0x0}], 0x2}, 0x2)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505)
shutdown(r1, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
readv(r3, &(0x7f0000000380)=[{&(0x7f0000000240)=""/142, 0xfd36}], 0x1000000000000017)
r4 = dup(r3)
r5 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e)
shutdown(r4, 0x0)
r6 = socket$inet_udp(0x2, 0x2, 0x0)
recvmsg(r6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/1, 0x1}], 0x1}, 0x0)
shutdown(r5, 0x0)
shutdown(r2, 0x0)

[  206.345217][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  206.355215][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  206.374066][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  206.384007][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  206.397440][ T8039] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  206.416407][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  206.425859][ T8037] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  206.450379][ T8039] 8021q: adding VLAN 0 to HW filter on device batadv0
19:37:58 executing program 5:
recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
poll(&(0x7f0000000040), 0x2000000000000014, 0x4e)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockname$inet(0xffffffffffffffff, 0x0, 0x0)
recvfrom$inet(r0, 0x0, 0xfffffd0c, 0x0, 0x0, 0x800e0046e)
ppoll(&(0x7f0000000000)=[{r0, 0x80}], 0x1, 0x0, 0x0, 0x0)
shutdown(r0, 0x1)
shutdown(r0, 0x0)

19:37:58 executing program 0:
poll(&(0x7f0000000080), 0x200000000000002e, 0x4e)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0xc83df61c, 0x0, 0x0, 0x800e0086e)
readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000040)=""/55, 0x37}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8)
shutdown(r0, 0x0)

19:37:58 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='loginuid\x00')
write$cgroup_subtree(r0, 0x0, 0x100000086)

19:37:58 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x41000000000003, &(0x7f0000000100)=<r0=>0x0)
r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
io_submit(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}])

19:37:58 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000340)=""/151, 0x0, 0x97, 0x1}, 0x20)

19:37:58 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0)
r2 = dup2(r1, r0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'})
ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000200)={0x28b})

19:37:58 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000340)=""/151, 0x0, 0x97, 0x1}, 0x20)

19:37:58 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000340)=""/151, 0x0, 0x97, 0x1}, 0x20)

19:37:58 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/151, 0x1a, 0x97, 0x1}, 0x20)

19:37:58 executing program 2:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
setsockopt$inet_buf(r0, 0x0, 0x5d, &(0x7f0000000100)="8fee4a81", 0x4)
r1 = dup(r0)
syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x800e0080d)

19:37:58 executing program 0:
r0 = open(&(0x7f0000000080)='./file0\x00', 0x143042, 0x0)
write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0)
r1 = gettid()
write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0xffffffffffffffdf)
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
write$P9_RCLUNK(r0, 0x0, 0x0)
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0)
r2 = semget$private(0x0, 0x4, 0x40)
semctl$IPC_INFO(r2, 0x3, 0x3, &(0x7f00000000c0)=""/116)
tkill(r1, 0x1000000000016)

19:37:58 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000100))
bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10)
r2 = socket$packet(0x11, 0x2, 0x300)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pipe(&(0x7f00000002c0)={<r3=>0xffffffffffffffff})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000380)={0x0, <r4=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0)
getpeername$packet(r3, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e40)=0x14)
getsockname(r2, 0x0, &(0x7f0000002400))
setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000040)=0x32, 0x4)
connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10)
sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0)

19:37:58 executing program 3:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000000340)=""/151, 0x26, 0x97, 0x1}, 0x20)

19:37:58 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000200))

19:37:58 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/151, 0x1a, 0x97, 0x1}, 0x20)

19:37:58 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x41000000000003, &(0x7f0000000100)=<r0=>0x0)
r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
io_submit(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}])
ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0)

19:37:58 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/151, 0x1a, 0x97, 0x1}, 0x20)

19:37:58 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)=""/219, 0xdb}, {0x0}], 0x2}, 0x0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505)
shutdown(r1, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
readv(r3, &(0x7f0000000380)=[{&(0x7f0000000240)=""/142, 0x8e}], 0x1)
r4 = dup(r3)
r5 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e)
shutdown(r4, 0x0)
readv(r2, &(0x7f0000000680)=[{&(0x7f00000000c0)=""/141, 0x8d}, {0x0}, {0x0}], 0x3)
shutdown(r5, 0x0)
shutdown(r2, 0x0)

19:37:58 executing program 5:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000000401010000409fbc60e130e2d215434805000200040001000800020004000180"], 0x24}}, 0x0)
ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0)

19:37:58 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20)

19:37:58 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20)

[  207.684421][    C1] protocol 88fb is buggy, dev hsr_slave_0
[  207.690406][    C1] protocol 88fb is buggy, dev hsr_slave_1
19:37:59 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
readv(r0, &(0x7f0000000b00)=[{&(0x7f0000000700)=""/161, 0xa1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7)
r1 = dup(r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549)
shutdown(r1, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
recvmsg(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)=""/43, 0x2b}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0)
r4 = dup(r3)
r5 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d)
shutdown(r4, 0x0)
r6 = socket$inet6_sctp(0x1c, 0x5, 0x84)
readv(r6, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}], 0x1)
shutdown(r5, 0x0)
shutdown(r2, 0x0)

19:37:59 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20)

19:37:59 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = eventfd(0x0)
ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2})
ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000140)={r2, 0x0, 0x1})

19:37:59 executing program 0:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc))
r1 = syz_open_pts(r0, 0x0)
ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000000))

19:37:59 executing program 5:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
pwritev(r1, &(0x7f0000000140)=[{0x0, 0xffffffffffffffea}, {0x0}], 0x2, 0x0)
recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x800e0080d)

19:37:59 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x1}]}}, &(0x7f0000000340)=""/151, 0x26, 0x97, 0x1}, 0x20)

19:37:59 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070")
prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffd000/0x1000)=nil)

19:37:59 executing program 2:
poll(&(0x7f00000002c0)=[{0xffffffffffffffff, 0x1}, {}, {}, {}, {}], 0x5, 0x4e)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0x499, 0x0, 0x0, 0x800e003b8)
shutdown(r0, 0x0)

19:37:59 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x1}]}}, &(0x7f0000000340)=""/151, 0x26, 0x97, 0x1}, 0x20)

19:37:59 executing program 3:
r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000000004002, 0x0)
writev(r0, &(0x7f00000007c0)=[{&(0x7f0000000680)="cf", 0x1}], 0x1)

19:37:59 executing program 0:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0)
setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0)=0x13, 0x4)
getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4)

[  208.340913][ T8245] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
19:37:59 executing program 0:
openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000980)={0x1, 0x3b4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe)
keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0)
r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd)
keyctl$dh_compute(0x17, &(0x7f00000000c0)={r1, r0, r1}, &(0x7f00000009c0)=""/240, 0xf0, 0x0)
lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180))

19:37:59 executing program 2:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='loginuid\x00')
write$cgroup_subtree(r0, 0x0, 0x0)

19:37:59 executing program 3:
poll(&(0x7f0000000200), 0x2000000000000038, 0x4e)
poll(0x0, 0x0, 0xc5)
poll(&(0x7f0000000040), 0x2000000000000014, 0x4e)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0xfffffd26, 0x0, 0x0, 0x800e00885)
recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000200)=""/197, 0xc5}, {0x0}, {0x0}], 0x3}, 0x0)
shutdown(r0, 0x0)

19:38:00 executing program 4:
syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaabfba1f3617fe86dd601bfc97004d8800fe800000000000000000000000000000479c000000000000000000000000000100004e20004d9078e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc371ac37ed0ef566736bb635b6f7f859cac2be4696da4502e00bfd490a46dbba897ed54b20a69193cd07148eeb6c1d7b2e30f857a75ff21b4b38c3d07a82b44b25104e94acd024b4033ae91018891eec4eddc0ed38f084d5991a55fc6c35dca54ffa8be71972b5abdd5a2394fd3fdb52a509cebf44c708b15020dd85b75278aa12cae100a9031"], 0x0)

19:38:00 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x1}]}}, &(0x7f0000000340)=""/151, 0x26, 0x97, 0x1}, 0x20)

19:38:00 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0)
ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x5000000)
socket$inet(0x2, 0x0, 0x8000000003)

19:38:00 executing program 2:
r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x445)
poll(&(0x7f0000000080)=[{r0}], 0x1, 0x80000001)
write$binfmt_misc(r0, &(0x7f0000002580)=ANY=[@ANYBLOB='s'], 0x1)
ioctl$int_in(r0, 0x80000000005001, 0x0)

19:38:00 executing program 0:
accept$unix(0xffffffffffffff9c, 0x0, 0x0)
poll(&(0x7f0000000140), 0x17, 0x8000000000049)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0xffffff4b, 0x0, 0x0, 0x800e00907)
readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/137, 0x89}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6)
shutdown(r0, 0x0)

19:38:00 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20)

19:38:00 executing program 4:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0xfffffffffffffffe, 0x44031, 0xffffffffffffffff, 0x0)
syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00')

19:38:00 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='loginuid\x00')
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(r0, 0x0, 0x0)

19:38:00 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20)

19:38:00 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97, 0x1}, 0x20)

19:38:00 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='maps\x00')
pread64(r0, 0x0, 0x0, 0x0)

19:38:00 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20)

19:38:00 executing program 0:
accept4(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
poll(&(0x7f0000000040), 0x2000000000000014, 0x4e)
recvfrom$inet(r0, 0x0, 0x10101, 0x0, 0x0, 0x800e00871)
select(0x1db, &(0x7f0000000000), 0x0, 0x0, 0x0)
shutdown(r0, 0x0)

19:38:00 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070")
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup2(r1, r1)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sync()
setsockopt$inet6_tcp_buf(r2, 0x6, 0xd, &(0x7f00000002c0)='O', 0x1)
rseq(0x0, 0x0, 0x0, 0x0)

19:38:00 executing program 3:
mkdir(&(0x7f0000001b40)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x800000, 0x0)
chdir(&(0x7f0000000000)='./file0\x00')
r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0)
write$P9_RWRITE(r0, &(0x7f0000000040)={0xb}, 0xb)
close(0xffffffffffffffff)

19:38:01 executing program 2:
dup(0xffffffffffffffff)
shutdown(0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/34, 0x22}], 0x1}, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545)
shutdown(r0, 0x0)
r2 = socket$inet6_sctp(0x1c, 0x3, 0x84)
readv(r2, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/104, 0x68}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7)
shutdown(r1, 0x0)

19:38:01 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20)

19:38:01 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
readv(r0, &(0x7f0000000840)=[{&(0x7f0000000100)=""/111, 0x6f}, {0x0}], 0x2)
r1 = dup(r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549)
shutdown(r1, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
recvmsg(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/34, 0x22}], 0x1}, 0x2)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545)
shutdown(r3, 0x0)
r5 = socket$inet6_sctp(0x1c, 0x3, 0x84)
readv(r5, &(0x7f0000000000)=[{&(0x7f0000003a00)=""/4096, 0x1000}], 0x30)
shutdown(r4, 0x0)
shutdown(r2, 0x0)

19:38:01 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})

19:38:01 executing program 4:
r0 = socket$kcm(0x29, 0xfffffffffffffffd, 0x0)
close(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000200)="f21c", 0x0}, 0x18)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0)
r2 = openat$cgroup(r1, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0)
r3 = openat$cgroup_ro(r2, &(0x7f0000000280)='cpB1\x82\x12,\xf8\x18\x11c\x17\v\x95\xdc\xa3\x18b\xbeV\x18\r\xe0Zt\x00', 0x0, 0x0)
r4 = openat$cgroup_ro(r3, &(0x7f0000000340)='cp\xaf#\x8b\xa6\x12\xb9\x81\xc8\xe4\x1c\xc4\n+\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0)
r5 = openat$cgroup_ro(r4, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0)
write$cgroup_int(r5, &(0x7f0000000580)=0x7, 0x12)
r6 = openat$cgroup_ro(r5, &(0x7f0000000400)='io.stat\x00', 0x0, 0x0)
ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000480)={r4})
r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x4e, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
socket$kcm(0x29, 0x2, 0x0)
r8 = getpid()
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x20000000, @perf_bp={&(0x7f0000000100), 0x5}, 0x1411, 0xc92, 0x3e}, r8, 0x3, 0xffffffffffffffff, 0x0)
ioctl$TUNGETSNDBUF(r6, 0x800454d3, &(0x7f00000006c0))
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10)
close(0xffffffffffffffff)
sendmsg(r7, &(0x7f0000000080)={&(0x7f0000000380)=@in={0x2, 0x4e22, @empty}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0xffffffffffffffd2, 0x20000001}, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091})
ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r6})
socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, <r9=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00')
ioctl$TUNSETVNETLE(r9, 0x400454dc, &(0x7f0000000040))
bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c)
r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x0, &(0x7f0000000780)=ANY=[], 0x0}, 0x48)
close(r10)
socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040))
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)

19:38:01 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20)

19:38:01 executing program 5:

19:38:01 executing program 4:

19:38:01 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97}, 0x20)

19:38:01 executing program 0:

19:38:01 executing program 2:

19:38:01 executing program 5:
accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000000))
poll(&(0x7f0000000140), 0x17, 0x8000000000049)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0xffffff4b, 0x0, 0x0, 0x800e00907)
readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/137, 0x89}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6)
shutdown(r0, 0x0)

19:38:01 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0)
r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0)
r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
getsockname$unix(r1, &(0x7f0000000300), 0x0)
setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000000)=0x4, 0x4)
getdents64(r0, &(0x7f0000002400)=""/4096, 0xc8b7)
r2 = accept(0xffffffffffffffff, 0x0, 0x0)
chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0)
ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
keyctl$link(0x8, 0x0, r3)
setsockopt$inet6_int(r2, 0x29, 0x5, &(0x7f0000000400), 0x4)

19:38:01 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97}, 0x20)

19:38:01 executing program 3:
r0 = open(&(0x7f0000000080)='./file0\x00', 0x143042, 0x0)
gettid()
ioctl$int_in(0xffffffffffffffff, 0x0, 0x0)
write$P9_RCLUNK(r0, &(0x7f0000000100)={0xfffffffffffffde3}, 0x0)

19:38:01 executing program 2:

19:38:01 executing program 3:

19:38:01 executing program 1:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3}]}]}}, &(0x7f0000000340)=""/151, 0x32, 0x97}, 0x20)

19:38:01 executing program 0:

19:38:01 executing program 2:

19:38:02 executing program 0:

19:38:02 executing program 3:

19:38:02 executing program 2:

19:38:02 executing program 5:

19:38:02 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0)
r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0)
r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
getsockname$unix(r1, &(0x7f0000000300), 0x0)
setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000000)=0x4, 0x4)
getdents64(r0, &(0x7f0000002400)=""/4096, 0xc8b7)
r2 = accept(0xffffffffffffffff, 0x0, 0x0)
chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0)
ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
keyctl$link(0x8, 0x0, r3)
setsockopt$inet6_int(r2, 0x29, 0x5, &(0x7f0000000400), 0x4)

19:38:02 executing program 1:

19:38:02 executing program 0:

19:38:02 executing program 1:

19:38:02 executing program 3:

19:38:02 executing program 2:

19:38:02 executing program 3:

19:38:02 executing program 5:

19:38:02 executing program 0:

19:38:02 executing program 1:

19:38:02 executing program 2:

19:38:02 executing program 0:

19:38:02 executing program 4:

19:38:02 executing program 5:

19:38:02 executing program 3:

19:38:02 executing program 2:

19:38:02 executing program 0:

19:38:02 executing program 1:

19:38:02 executing program 2:

19:38:02 executing program 3:

19:38:02 executing program 0:

19:38:02 executing program 5:

19:38:02 executing program 1:

19:38:02 executing program 4:

19:38:02 executing program 2:

19:38:02 executing program 0:

19:38:02 executing program 3:

19:38:02 executing program 5:

19:38:02 executing program 1:

19:38:02 executing program 0:

19:38:02 executing program 2:

19:38:03 executing program 4:

19:38:03 executing program 5:

19:38:03 executing program 3:

19:38:03 executing program 2:

19:38:03 executing program 1:

19:38:03 executing program 0:

19:38:03 executing program 3:

19:38:03 executing program 5:

19:38:03 executing program 1:

19:38:03 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="fddc04005e0bcfec7be070")
r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00')
sendmsg(0xffffffffffffffff, 0x0, 0x4000050)
preadv(r1, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100)

19:38:03 executing program 2:
mkdir(&(0x7f0000001b40)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x800000, 0x0)
chdir(&(0x7f0000000000)='./file0\x00')
r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0)
write$P9_RWRITE(r0, &(0x7f0000000040)={0xb}, 0xb)
close(r0)

19:38:03 executing program 0:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0)
bind$bt_l2cap(r0, &(0x7f0000000080), 0xe)
getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4)

19:38:03 executing program 3:
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00')
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000017c0), 0x340, 0x0)

19:38:03 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a)
connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10)

19:38:03 executing program 5:

19:38:03 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0)
ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000100))
ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611)
bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10)
socket$packet(0x11, 0x2, 0x300)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pipe(&(0x7f00000002c0)={<r2=>0xffffffffffffffff})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000380)={0x0, <r3=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0)
getpeername$packet(r2, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e40)=0x14)
setsockopt$sock_int(r0, 0x1, 0x6, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0)

19:38:03 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x35)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000100)="c0dca5055e0bcfec7be070")
ptrace$cont(0x18, r0, 0x0, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x3e})
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)

19:38:03 executing program 1:
poll(&(0x7f0000000200)=[{0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0x4}, {}, {}, {}], 0x5, 0x4e)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0xff8c, 0x0, 0x0, 0x800e004d0)
poll(&(0x7f0000000040)=[{r0, 0x40}, {r0, 0x2000}, {r0, 0x2000}, {r0, 0x8}, {r0, 0x2c}, {r0, 0x10}], 0x6, 0x5)
shutdown(r0, 0x0)

19:38:03 executing program 5:
openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000980)={0x1, 0x3b4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe)
keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0)
r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd)
keyctl$dh_compute(0x17, &(0x7f00000000c0)={r1, r0, r1}, &(0x7f00000009c0)=""/240, 0xf0, 0x0)

19:38:03 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil)
recvfrom$inet(r0, 0x0, 0x187bd01f, 0x0, 0x0, 0x800e006d0)
shutdown(r0, 0x0)

19:38:03 executing program 2:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xb, 0x8, 0x7, 0x5, 0x1}, 0x3c)
r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r1}, 0x2c)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000004c0), 0x0}, 0x18)

19:38:03 executing program 3:
recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
poll(&(0x7f0000000040), 0x2000000000000014, 0x4e)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0xfffffd0c, 0x0, 0x0, 0x800e0046e)
ppoll(&(0x7f0000000000)=[{r0, 0x80}], 0x1, 0x0, 0x0, 0x0)
shutdown(r0, 0x0)

19:38:03 executing program 4:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
r1 = socket$unix(0x1, 0x2, 0x0)
setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4)
connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)

19:38:03 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
readv(r0, &(0x7f0000000b00)=[{&(0x7f0000000700)=""/161, 0xa1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6)
r1 = dup(r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549)
shutdown(r1, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
recvmsg(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)=""/43, 0x2b}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0)
r4 = dup(r3)
r5 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d)
shutdown(r4, 0x0)
r6 = socket$inet6_sctp(0x1c, 0x5, 0x84)
readv(r6, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {0x0}], 0x2)
shutdown(r5, 0x0)
shutdown(r2, 0x0)

19:38:03 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000180)=[{0x6}]})
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})

19:38:03 executing program 2:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x9, [{0x0, 0x4}]}]}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000340)=""/151, 0x35, 0x97, 0x1}, 0x20)

[  212.544284][ T8561] kasan: CONFIG_KASAN_INLINE enabled
[  212.561412][ T8561] kasan: GPF could be caused by NULL-ptr deref or user memory access
[  212.603886][ T8561] general protection fault: 0000 [#1] PREEMPT SMP KASAN
[  212.611103][ T8561] CPU: 1 PID: 8561 Comm: syz-executor.2 Not tainted 5.2.0-rc5+ #4
[  212.619915][ T8561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  212.631121][ T8561] RIP: 0010:btf_struct_resolve+0x42d/0xfc0
[  212.637405][ T8561] Code: e8 03 42 80 3c 28 00 4d 89 e7 74 08 48 89 df e8 a9 5b 25 00 4c 8b 23 49 8d 5c 24 04 48 89 d8 48 c1 e8 03 48 89 85 68 ff ff ff <42> 0f b6 04 28 84 c0 48 8b 55 c8 0f 85 19 04 00 00 4c 8d 6a fc 48
[  212.657697][ T8561] RSP: 0018:ffff88804de7f5f0 EFLAGS: 00010247
[  212.664347][ T8561] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000040000
[  212.672468][ T8561] RDX: ffffc9000a21b000 RSI: 00000000000008b0 RDI: 00000000000008b1
[  212.680776][ T8561] RBP: ffff88804de7f690 R08: ffffffff81897f28 R09: ffff88804de7f51c
[  212.688954][ T8561] R10: 0000000000000009 R11: 1ffff11015d66bf7 R12: 0000000000000000
[  212.697162][ T8561] R13: dffffc0000000000 R14: ffff88809e982840 R15: ffff88804eb28540
[  212.705645][ T8561] FS:  00007fc8b4a09700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000
[  212.714765][ T8561] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  212.721884][ T8561] CR2: 000000000075c000 CR3: 00000000a4fde000 CR4: 00000000001406e0
[  212.730721][ T8561] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  212.739320][ T8561] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  212.747631][ T8561] Call Trace:
[  212.751103][ T8561]  btf_resolve+0x3ed/0xda0
[  212.755799][ T8561]  ? btf_sec_info_cmp+0x110/0x110
[  212.761207][ T8561]  ? kasan_kmalloc+0x9/0x10
[  212.765723][ T8561]  ? __kmalloc_node+0x4d/0x60
[  212.770664][ T8561]  btf_new_fd+0x216a/0x37b0
[  212.775303][ T8561]  ? __might_fault+0xf9/0x160
[  212.779997][ T8561]  ? btf_release+0xd0/0xd0
[  212.785056][ T8561]  __do_sys_bpf+0x1212/0xc5d0
[  212.790282][ T8561]  ? tomoyo_file_ioctl+0x23/0x30
[  212.796120][ T8561]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  212.802891][ T8561]  ? __bfs+0x550/0x550
[  212.807072][ T8561]  ? __lock_acquire+0xcf7/0x1a40
[  212.812363][ T8561]  ? __bpf_prog_put_rcu+0x320/0x320
[  212.817914][ T8561]  ? __lock_acquire+0xcf7/0x1a40
[  212.822910][ T8561]  ? trace_lock_acquire+0x190/0x190
[  212.828765][ T8561]  ? kasan_check_read+0x11/0x20
[  212.834169][ T8561]  ? do_raw_spin_unlock+0x49/0x260
[  212.839609][ T8561]  ? __might_fault+0xf9/0x160
[  212.844701][ T8561]  ? kasan_check_read+0x11/0x20
[  212.849768][ T8561]  ? _copy_to_user+0xca/0xf0
[  212.854583][ T8561]  ? put_timespec64+0x106/0x150
[  212.859873][ T8561]  ? ktime_get_raw+0xf0/0xf0
[  212.864735][ T8561]  ? prepare_exit_to_usermode+0x1e1/0x4f0
[  212.870618][ T8561]  ? __x64_sys_clock_gettime+0x1c5/0x220
[  212.876993][ T8561]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  212.883216][ T8561]  ? trace_irq_disable_rcuidle+0x23/0x1c0
[  212.889278][ T8561]  ? do_syscall_64+0x1d/0x140
[  212.894648][ T8561]  __x64_sys_bpf+0x7a/0x90
[  212.899349][ T8561]  do_syscall_64+0xfe/0x140
[  212.904213][ T8561]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  212.910396][ T8561] RIP: 0033:0x4592c9
[  212.914384][ T8561] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  212.934981][ T8561] RSP: 002b:00007fc8b4a08c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  212.943535][ T8561] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9
[  212.952322][ T8561] RDX: 0000000000000020 RSI: 0000000020000400 RDI: 0000000000000012
[  212.960686][ T8561] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  212.969203][ T8561] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8b4a096d4
[  212.977934][ T8561] R13: 00000000004bf4d3 R14: 00000000004d0aa0 R15: 00000000ffffffff
[  212.986200][ T8561] Modules linked in:
[  212.990423][    C1] net_ratelimit: 2 callbacks suppressed
[  212.990430][    C1] protocol 88fb is buggy, dev hsr_slave_0
[  213.002576][    C1] protocol 88fb is buggy, dev hsr_slave_1
[  213.008814][    C1] protocol 88fb is buggy, dev hsr_slave_0
[  213.014643][    C1] protocol 88fb is buggy, dev hsr_slave_1
[  213.024265][ T8561] ---[ end trace ae421e0b9d4b1aa8 ]---
[  213.030206][ T8561] RIP: 0010:btf_struct_resolve+0x42d/0xfc0
[  213.037970][ T8556] kobject: 'batman_adv' (0000000018e0edc6): kobject_uevent_env
[  213.038362][ T8561] Code: e8 03 42 80 3c 28 00 4d 89 e7 74 08 48 89 df e8 a9 5b 25 00 4c 8b 23 49 8d 5c 24 04 48 89 d8 48 c1 e8 03 48 89 85 68 ff ff ff <42> 0f b6 04 28 84 c0 48 8b 55 c8 0f 85 19 04 00 00 4c 8d 6a fc 48
[  213.047362][ T8561] RSP: 0018:ffff88804de7f5f0 EFLAGS: 00010247
[  213.066828][ T8556] kobject: 'batman_adv' (0000000018e0edc6): kobject_uevent_env: filter function caused the event to drop!
[  213.084522][ T8556] kobject: 'batman_adv' (0000000018e0edc6): kobject_cleanup, parent 00000000b5d59efe
[  213.092281][ T8561] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000040000
[  213.096409][ T8556] kobject: 'batman_adv' (0000000018e0edc6): calling ktype release
[  213.112194][ T8561] RDX: ffffc9000a21b000 RSI: 00000000000008b0 RDI: 00000000000008b1
[  213.121130][ T8561] RBP: ffff88804de7f690 R08: ffffffff81897f28 R09: ffff88804de7f51c
[  213.130010][ T8556] kobject: (0000000018e0edc6): dynamic_kobj_release
[  213.130491][ T8561] R10: 0000000000000009 R11: 1ffff11015d66bf7 R12: 0000000000000000
[  213.141469][ T8556] kobject: 'batman_adv': free name
[  213.146720][ T8561] R13: dffffc0000000000 R14: ffff88809e982840 R15: ffff88804eb28540
[  213.159855][ T8561] FS:  00007fc8b4a09700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000
[  213.160027][ T8556] kobject: 'rx-0' (00000000fe3da133): kobject_cleanup, parent 00000000bfd8be26
[  213.169176][ T8561] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  213.169182][ T8561] CR2: 00007f36ca380db8 CR3: 00000000a4fde000 CR4: 00000000001406e0
[  213.169192][ T8561] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  213.169198][ T8561] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  213.169205][ T8561] Kernel panic - not syncing: Fatal exception
[  213.171452][ T8561] Kernel Offset: disabled
[  213.235797][ T8561] Rebooting in 86400 seconds..