Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.17' (ECDSA) to the list of known hosts. 2020/07/19 13:37:59 fuzzer started 2020/07/19 13:37:59 dialing manager at 10.128.0.26:36697 2020/07/19 13:37:59 syscalls: 3206 2020/07/19 13:37:59 code coverage: enabled 2020/07/19 13:37:59 comparison tracing: enabled 2020/07/19 13:37:59 extra coverage: enabled 2020/07/19 13:37:59 setuid sandbox: enabled 2020/07/19 13:37:59 namespace sandbox: enabled 2020/07/19 13:37:59 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/19 13:37:59 fault injection: enabled 2020/07/19 13:37:59 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/19 13:37:59 net packet injection: enabled 2020/07/19 13:37:59 net device setup: enabled 2020/07/19 13:37:59 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/19 13:37:59 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/19 13:37:59 USB emulation: enabled 13:40:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x16b}, 0x1a58c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) syzkaller login: [ 223.277140][ T6837] IPVS: ftp: loaded support on port[0] = 21 [ 223.400364][ T6837] chnl_net:caif_netlink_parms(): no params data found 13:40:48 executing program 1: ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x29, 0x9, 0x2, 0x9, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x1, 0x8, 0x92e, 0xbddd}}) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) syz_emit_ethernet(0x5e, &(0x7f0000000040)={@link_local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @local, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @mcast2, @loopback={0xff00000000000000}}}}}}}, 0x0) [ 223.475165][ T6837] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.483932][ T6837] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.493766][ T6837] device bridge_slave_0 entered promiscuous mode [ 223.503614][ T6837] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.511216][ T6837] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.519727][ T6837] device bridge_slave_1 entered promiscuous mode [ 223.544295][ T6837] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 223.556963][ T6837] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 223.585203][ T6837] team0: Port device team_slave_0 added [ 223.594806][ T6837] team0: Port device team_slave_1 added [ 223.619198][ T6837] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 223.626607][ T6837] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 223.652948][ T6837] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 223.666836][ T6837] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 223.673801][ T6837] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 223.700121][ T6837] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 223.734558][ T6985] IPVS: ftp: loaded support on port[0] = 21 13:40:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) [ 223.779271][ T6837] device hsr_slave_0 entered promiscuous mode [ 223.796310][ T6837] device hsr_slave_1 entered promiscuous mode [ 224.093510][ T7039] IPVS: ftp: loaded support on port[0] = 21 [ 224.151380][ T6985] chnl_net:caif_netlink_parms(): no params data found 13:40:49 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r0 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r1, &(0x7f0000000dc0)=[{&(0x7f0000000180)='0', 0x1}, {&(0x7f00000005c0)='3', 0x1}], 0x2) [ 224.262015][ T6837] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 224.352781][ T6985] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.375959][ T6985] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.384043][ T6985] device bridge_slave_0 entered promiscuous mode [ 224.407975][ T6837] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 224.450551][ T6985] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.465379][ T6985] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.474560][ T6985] device bridge_slave_1 entered promiscuous mode [ 224.488278][ T6837] netdevsim netdevsim0 netdevsim2: renamed from eth2 13:40:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='size=%7']) [ 224.563982][ T6837] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 224.632972][ T7182] IPVS: ftp: loaded support on port[0] = 21 [ 224.703767][ T6985] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 224.777784][ T6985] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 224.842151][ T7225] IPVS: ftp: loaded support on port[0] = 21 [ 224.864094][ T6985] team0: Port device team_slave_0 added [ 224.880668][ T6985] team0: Port device team_slave_1 added [ 224.898317][ T7039] chnl_net:caif_netlink_parms(): no params data found 13:40:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) [ 224.978617][ T6985] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 224.987571][ T6985] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.017547][ T6985] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 225.070213][ T6985] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 225.078765][ T6985] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.106233][ T6985] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 225.235447][ T7356] IPVS: ftp: loaded support on port[0] = 21 [ 225.301317][ T7225] chnl_net:caif_netlink_parms(): no params data found [ 225.319897][ T7182] chnl_net:caif_netlink_parms(): no params data found [ 225.379262][ T6985] device hsr_slave_0 entered promiscuous mode [ 225.445876][ T6985] device hsr_slave_1 entered promiscuous mode [ 225.505596][ T6985] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 225.513387][ T6985] Cannot create hsr debugfs directory [ 225.519110][ T7039] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.526277][ T7039] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.534003][ T7039] device bridge_slave_0 entered promiscuous mode [ 225.543965][ T7039] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.551096][ T7039] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.559595][ T7039] device bridge_slave_1 entered promiscuous mode [ 225.641967][ T7039] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 225.658166][ T7039] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 225.700029][ T7039] team0: Port device team_slave_0 added [ 225.715105][ T7039] team0: Port device team_slave_1 added [ 225.779564][ T7039] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 225.788676][ T7039] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.818523][ T7039] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 225.872245][ T7039] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 225.883580][ T7039] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.910711][ T7039] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 225.954886][ T7182] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.964321][ T7182] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.972901][ T7182] device bridge_slave_0 entered promiscuous mode [ 225.984112][ T7225] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.992520][ T7225] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.000968][ T7225] device bridge_slave_0 entered promiscuous mode [ 226.039615][ T7039] device hsr_slave_0 entered promiscuous mode [ 226.085842][ T7039] device hsr_slave_1 entered promiscuous mode [ 226.125342][ T7039] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 226.132927][ T7039] Cannot create hsr debugfs directory [ 226.142618][ T7182] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.151163][ T7182] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.159890][ T7182] device bridge_slave_1 entered promiscuous mode [ 226.168073][ T7225] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.175136][ T7225] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.196277][ T7225] device bridge_slave_1 entered promiscuous mode [ 226.241524][ T7182] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 226.290024][ T6985] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 226.354974][ T7182] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 226.372507][ T7225] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 226.382852][ T6985] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 226.439545][ T7356] chnl_net:caif_netlink_parms(): no params data found [ 226.459738][ T7225] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 226.469247][ T6985] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 226.526619][ T6985] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 226.563236][ T7182] team0: Port device team_slave_0 added [ 226.586693][ T7225] team0: Port device team_slave_0 added [ 226.599141][ T7225] team0: Port device team_slave_1 added [ 226.632883][ T7182] team0: Port device team_slave_1 added [ 226.647763][ T6837] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.669815][ T7225] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 226.677429][ T7225] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.704888][ T7225] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 226.720191][ T7225] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 226.727296][ T7225] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.753452][ T7225] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 226.869051][ T7225] device hsr_slave_0 entered promiscuous mode [ 226.925444][ T7225] device hsr_slave_1 entered promiscuous mode [ 226.965074][ T7225] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 226.972661][ T7225] Cannot create hsr debugfs directory [ 226.979755][ T7182] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 226.987994][ T7182] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.014392][ T7182] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 227.051204][ T7182] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 227.058601][ T7182] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.088401][ T7182] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 227.134045][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.148029][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.168519][ T6837] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.193638][ T7356] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.208303][ T7356] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.218426][ T7356] device bridge_slave_0 entered promiscuous mode [ 227.256617][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.269190][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.278805][ T2554] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.286370][ T2554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.298172][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.308752][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.317363][ T2554] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.324420][ T2554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.333322][ T7356] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.340849][ T7356] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.349119][ T7356] device bridge_slave_1 entered promiscuous mode [ 227.391670][ T7183] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.400273][ T7183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.450190][ T7182] device hsr_slave_0 entered promiscuous mode [ 227.505451][ T7182] device hsr_slave_1 entered promiscuous mode [ 227.554929][ T7182] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 227.562570][ T7182] Cannot create hsr debugfs directory [ 227.602529][ T7039] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 227.652854][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.663414][ T7356] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 227.687362][ T7039] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 227.737151][ T7039] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 227.787977][ T7039] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 227.860472][ T7356] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 227.900627][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 227.910092][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.932920][ T7356] team0: Port device team_slave_0 added [ 227.961656][ T7183] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 227.972108][ T7183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 227.982417][ T7183] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.003606][ T7356] team0: Port device team_slave_1 added [ 228.044375][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.061503][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.106534][ T7356] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 228.113518][ T7356] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 228.140551][ T7356] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 228.151839][ T7183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.162272][ T7183] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.188757][ T7356] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 228.197772][ T7356] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 228.225912][ T7356] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 228.238981][ T6837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.328116][ T7356] device hsr_slave_0 entered promiscuous mode [ 228.355989][ T7356] device hsr_slave_1 entered promiscuous mode [ 228.404756][ T7356] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 228.412469][ T7356] Cannot create hsr debugfs directory [ 228.446318][ T7225] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 228.510211][ T7225] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 228.581137][ T7225] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 228.630228][ T7225] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 228.738612][ T6837] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 228.761996][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 228.770670][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.786984][ T6985] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.813085][ T7182] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 228.900600][ T7183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 228.911229][ T7183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 228.930535][ T7182] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 228.966056][ T7182] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 229.024049][ T7182] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 229.081419][ T6985] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.088549][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.100337][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.139370][ T7356] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 229.206694][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.221704][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.230694][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.237862][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.272735][ T7356] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 229.306381][ T7356] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 229.350825][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.358941][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.368287][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.377166][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.384483][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.392666][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 229.401700][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.410610][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.420749][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.428931][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.441785][ T6837] device veth0_vlan entered promiscuous mode [ 229.452750][ T7356] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 229.535975][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.551302][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.560234][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.572260][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 229.595013][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.603703][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.647197][ T6837] device veth1_vlan entered promiscuous mode [ 229.667794][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 229.682005][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.698022][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.720006][ T6985] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 229.738981][ T6985] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.760028][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.771594][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.804773][ T7039] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.866152][ T6837] device veth0_macvtap entered promiscuous mode [ 229.878337][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 229.887627][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.902310][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.910231][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 229.922446][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 229.942020][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 229.957908][ T6985] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.976492][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.003285][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.036181][ T7039] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.061419][ T6837] device veth1_macvtap entered promiscuous mode [ 230.083794][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.094665][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.103219][ T2494] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.110394][ T2494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.131951][ T7225] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.169690][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.179191][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 230.189673][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.200326][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.209754][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.218618][ T7949] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.225761][ T7949] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.233492][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.242890][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.264093][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.272321][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.290638][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.299024][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.315640][ T6837] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 230.328634][ T7225] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.337225][ T6985] device veth0_vlan entered promiscuous mode [ 230.356695][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.373736][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.381925][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.390948][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.399528][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.408771][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.418925][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.427862][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.437902][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 230.450131][ T6837] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 230.469231][ T6985] device veth1_vlan entered promiscuous mode [ 230.490858][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 230.501581][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.513642][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.524386][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.532986][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.542102][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.549395][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.569359][ T6837] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.579045][ T6837] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.594442][ T6837] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.603203][ T6837] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.627099][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 230.636349][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.644846][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.655066][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.663275][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.672619][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.681270][ T8154] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.688420][ T8154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.707646][ T7039] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 230.722111][ T7039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 230.801604][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.810102][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.819254][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.828309][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.869567][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.878992][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.889745][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.899441][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.909696][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 230.989327][ T7182] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.018112][ T7225] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 231.032898][ T7225] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 231.050709][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.059916][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.068738][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 231.077837][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.086703][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.098433][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.110518][ T6985] device veth0_macvtap entered promiscuous mode [ 231.171117][ T7182] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.183689][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.201342][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 231.224953][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 231.232512][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 231.247457][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.255864][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.270427][ T7356] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.289432][ T6985] device veth1_macvtap entered promiscuous mode [ 231.318165][ T7039] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.361005][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.375715][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.385560][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.394915][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.403509][ T8154] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.410776][ T8154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.418692][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 231.426912][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 231.439176][ T7356] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.462078][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.470383][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.479775][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.488856][ T7949] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.496008][ T7949] bridge0: port 2(bridge_slave_1) entered forwarding state 13:40:56 executing program 0: [ 231.517540][ T7225] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.548127][ T6985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 231.574581][ T6985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 231.588227][ T6985] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 231.614845][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready 13:40:56 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000008ac0), 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_FPEMU(0x9, 0x0) setxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x24, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 231.623533][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.658984][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 231.686454][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 231.691079][ C0] hrtimer: interrupt took 35131 ns [ 231.718776][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.748072][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.779013][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.786449][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.846554][ T6985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 231.859327][ T6985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 231.872701][ T8179] overlayfs: workdir and upperdir must reside under the same mount [ 231.891146][ T6985] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 231.905324][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.920108][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 13:40:56 executing program 0: sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x64}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8993, &(0x7f0000000180)={'bond0\x00', @ifru_flags}) [ 231.943030][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.952584][ T7949] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.959862][ T7949] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.979968][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 231.991260][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 232.008373][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.054566][ T6985] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 232.063309][ T6985] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 232.085541][ T6985] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 232.103155][ T6985] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 232.132344][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.143375][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 232.161303][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.179867][ T7039] device veth0_vlan entered promiscuous mode [ 232.202989][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.211846][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.223049][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.233063][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.246503][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.255465][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 232.264404][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 13:40:57 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000880)={{0x7, 0x0, 0x0, 0x0, 'syz1\x00'}}) 13:40:57 executing program 0: syz_usb_connect(0x0, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000fcf858105e0483022583000000010902120001000000000904000000020c07"], 0x0) [ 232.309364][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 232.348911][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.365012][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.374013][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.394502][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.402994][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.412357][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.422072][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.431922][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.450737][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.467773][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 232.487157][ T7039] device veth1_vlan entered promiscuous mode [ 232.558152][ T7182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.579764][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.599771][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.611594][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 232.620882][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.632273][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.641686][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.653074][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.662761][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.673512][ T7913] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 232.683854][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.691636][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.702452][ T7225] device veth0_vlan entered promiscuous mode [ 232.781835][ T7356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.808816][ T7225] device veth1_vlan entered promiscuous mode [ 232.875512][ T7182] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 232.882729][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 232.899477][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 232.910844][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 232.923786][ T7913] usb 1-1: Using ep0 maxpacket: 16 [ 232.940593][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 232.957512][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 13:40:57 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001f000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000280)="3e650f0d8c4c070f20c06635000001000f22c02e0f00100f143dba4100edba2100b001eeba4300b80f00ef0fc732b8bf0f8ee866b86e0000000f23c00f21f86635020006000f23f8", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0071, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 233.006600][ T7039] device veth0_macvtap entered promiscuous mode [ 233.060249][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 233.072021][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 233.074033][ T7913] usb 1-1: New USB device found, idVendor=045e, idProduct=0283, bcdDevice=83.25 [ 233.088103][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 233.088857][ T7913] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 233.101755][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 233.108333][ T8210] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 233.119310][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 233.134697][ T7913] usb 1-1: config 0 descriptor?? [ 233.142874][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 233.157122][ T7356] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 233.178090][ T7913] snd-usb-audio: probe of 1-1:0.0 failed with error -22 [ 233.194804][ T7039] device veth1_macvtap entered promiscuous mode [ 233.242700][ T7182] device veth0_vlan entered promiscuous mode [ 233.265420][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.277581][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.288037][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 233.299980][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.315406][ T7225] device veth0_macvtap entered promiscuous mode [ 233.334178][ T7225] device veth1_macvtap entered promiscuous mode 13:40:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') getdents64(r0, &(0x7f0000000100)=""/170, 0xaa) [ 233.352578][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 233.361214][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 233.372126][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 233.390617][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 233.393273][ T12] usb 1-1: USB disconnect, device number 2 [ 233.409268][ T7182] device veth1_vlan entered promiscuous mode [ 233.451399][ T7039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 233.476124][ T7039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.487649][ T7039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 13:40:58 executing program 1: [ 233.512933][ T7039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.530926][ T7039] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 233.575690][ T7225] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 233.597465][ T7225] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.622595][ T7225] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 233.644282][ T7225] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.669829][ T7225] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 233.680766][ T7225] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.693774][ T7225] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 233.715561][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 233.725402][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 233.736657][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 233.746865][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 233.756629][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 233.766276][ T2494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 233.778821][ T7039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 233.794651][ T7039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.805175][ T7039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 233.815925][ T7039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.828216][ T7039] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 233.842747][ T7225] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 233.859046][ T7225] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.869522][ T7225] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 233.881411][ T7225] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.891758][ T7225] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 233.902710][ T7225] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.918956][ T7225] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 233.930355][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 233.942623][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 233.952659][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 233.961758][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 233.975307][ T7039] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 233.984400][ T7039] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 233.994152][ T7039] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 234.002908][ T7039] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 234.026967][ T7225] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 234.038278][ T7225] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 234.047822][ T7225] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 234.057005][ T7225] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 234.069692][ T7182] device veth0_macvtap entered promiscuous mode [ 234.082165][ T7913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 234.091094][ T7913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 234.101453][ T7913] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 234.159230][ T7182] device veth1_macvtap entered promiscuous mode [ 234.178263][ T7913] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 234.185818][ T12] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 234.194217][ T7913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 234.202835][ T7913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 234.333346][ T7356] device veth0_vlan entered promiscuous mode [ 234.340337][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 234.350867][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.472712][ T7182] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.473006][ T12] usb 1-1: Using ep0 maxpacket: 16 [ 234.485593][ T7182] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.509594][ T8241] tmpfs: Bad value for 'size' [ 234.511880][ T7182] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.533195][ T7182] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.543807][ T7182] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.555671][ T7182] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.565653][ T7182] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.578830][ T7182] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.590265][ T7182] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 234.599356][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.609114][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 234.617993][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 234.623181][ T12] usb 1-1: New USB device found, idVendor=045e, idProduct=0283, bcdDevice=83.25 [ 234.628202][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.649721][ T8241] tmpfs: Bad value for 'size' [ 234.678292][ T12] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 234.691989][ T12] usb 1-1: config 0 descriptor?? [ 234.717977][ T7356] device veth1_vlan entered promiscuous mode [ 234.747429][ T12] snd-usb-audio: probe of 1-1:0.0 failed with error -22 [ 234.762644][ T7182] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.775374][ T7182] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.785715][ T7182] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.798035][ T7182] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.808597][ T7182] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.821784][ T7182] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.831822][ T7182] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.842544][ T7182] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.854630][ T7182] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 234.874636][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 234.885170][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 234.895671][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 234.905775][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 234.918942][ T7182] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 234.937159][ T7182] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 234.947540][ T7183] usb 1-1: USB disconnect, device number 3 [ 234.952621][ T7182] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 234.968021][ T7182] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 13:40:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r2, @ANYBLOB="0080000000800000f2ff00000800010075333200c0010200bc01010004000200b40105510004d72000000807000000ff03"], 0x1ec}}, 0x0) [ 235.041965][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 235.072637][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 235.086335][ T7356] device veth0_macvtap entered promiscuous mode [ 235.160315][ T7356] device veth1_macvtap entered promiscuous mode [ 235.237320][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 235.259252][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 235.347780][ T7356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 235.360656][ T7356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.392658][ T7356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 235.417496][ T7356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.438199][ T7356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 235.456838][ T7356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.471987][ T7356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 235.489478][ T7356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.500146][ T7356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 235.514417][ T7356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.527382][ T7356] batman_adv: batadv0: Interface activated: batadv_slave_0 13:41:00 executing program 3: 13:41:00 executing program 1: writev(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x78) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) socket$netlink(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000040)="1f11c391ebb0498200c347e9bd472454e7f8bd23544bcb8aa2529d374448452e2f7b27efda85e330dc9220b9081ef4e1f31c0e632cad4fc988caf71b479bc6c8e1c31a471c0300000061d295561c906c7f45fb3d2197e86aa42fa237e4880e1c43f22ef649b1e31f8eac87aef5fd0dc37827e4d4c83a4bc5b6d97b441cbfc80000", 0x32}, {&(0x7f0000000840)="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", 0xfd}, {&(0x7f0000000940)="c97bead89525da49a6e9e27830e41ac4aa53b96bf12be3495b331e23ee0c4747d34977d8bf41ab9f082d981f820fa784fd2274ad3944d71110286a211b65db461de7cd29323b", 0x46}, {&(0x7f00000009c0)="9a97b4714716eac6000e39ae06bb1893e3abdb1c3bc5439ded8ec8258984d920fd5c16aa0e08751b24f01dfbe9739d021138fe06f497c78c21c8c2aeb603c16ad31d42ed3f239652eced63555f131fba39d3cb2bac97a366e5b3aacf5705ae4ae9bfece85d6c15f38cf83738cbd3d0648ceb04dceb7d968e12f6be4a7cf42dcaf8fc9ec5a4c44ce73338ead1d78e9054becf951dd58c56d458f90d69dad1bea60ac98f3ffc14fd9d7d0b984911e3d4e82eb41ec3236ac6f6460e4fb7", 0xfffffdd9}, {&(0x7f0000000a80)="8b392db9b7a4ffb8f4184472a38d4021e56db1c33c4b2b363aa62702ccc4c13a65eca09d69ea4a69debbb41b0862798f28174adb11b105f136e0410359c1f3cc0e1eebe2490039a3806968aaefe814e21ed9596058b3450a5784210b84cbc39cbac76865ea762634b394bf62656fed0bed1daf55aa352b13e45b08c63726b9956e3879922591e38b9f149cca01321d3ecc7bc5c261cbc774e2a2d45e54c61f", 0x9f}, {&(0x7f0000000b40)="cc0004b41ece4bba9770befebb3520104bd32c10a73f84e0c8c28fe2f74d57d8b3d514616ecb3d72ad882932e78da5", 0x2f}], 0x7}, 0x0) splice(r1, 0x0, r0, 0x0, 0x6e803, 0x0) [ 235.541963][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 235.551959][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 235.566799][ T7356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 235.582246][ T7356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.594600][ T7356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 235.610406][ T7356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.621846][ T7356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 235.633008][ T7356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.643427][ T7356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 235.654369][ T7356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.665940][ T7356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 235.676975][ T7356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.691910][ T7356] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 235.705478][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 235.720121][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 235.741440][ T7356] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 235.759976][ T7356] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 235.779036][ T7356] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 235.792415][ T7356] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 13:41:01 executing program 5: 13:41:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x44, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @private1}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x44}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 13:41:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="6c0200080005021b40c2040000005e00000200004100df58e0b134e1299ab1c600044af715e54ba360c16ae18f1f971e3c445f732493b1c90036a850067b373aadfd1dbcc5428cf85f1b5469c98cb4fa2d0e33e9ea0380e79099aa84fb7391344fa60d16b04f8db41003ffdac6cca9d84aa75c809b41b0d8bf4ed086f2a7c1931a8747e1da4b9884eb9ad6a0268db2cfbc1b93b0061811f1aa968bcdc7616837c21387f0e8327a36e3e9a4f8210c43ac2bb9418e14232de7c0617ff1883da7ccc71222c4149338ab6eb5c1de"], 0x20) r1 = socket$netlink(0x10, 0x3, 0x5204b513ebdf1e67) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f00000000c0)={'ip6gre0\x00'}) r2 = accept4(r0, 0x0, 0x0, 0x80800) sendto$inet6(r2, &(0x7f00000002c0), 0xffffffffffffff94, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x7, 0x4403e871, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 13:41:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000004c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x44}}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x10, 0x0, 0xf, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xe}, 0x40028}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:41:01 executing program 3: 13:41:01 executing program 1: 13:41:01 executing program 3: 13:41:01 executing program 4: 13:41:01 executing program 1: 13:41:01 executing program 5: 13:41:01 executing program 1: 13:41:01 executing program 3: 13:41:01 executing program 5: 13:41:01 executing program 4: 13:41:02 executing program 0: 13:41:02 executing program 2: 13:41:02 executing program 1: 13:41:02 executing program 3: 13:41:02 executing program 4: 13:41:02 executing program 5: 13:41:02 executing program 4: 13:41:02 executing program 3: 13:41:02 executing program 2: 13:41:02 executing program 0: 13:41:02 executing program 5: 13:41:02 executing program 1: 13:41:02 executing program 4: 13:41:02 executing program 3: 13:41:02 executing program 2: 13:41:02 executing program 1: 13:41:02 executing program 0: 13:41:02 executing program 4: 13:41:02 executing program 5: 13:41:02 executing program 3: 13:41:02 executing program 4: 13:41:02 executing program 1: 13:41:02 executing program 2: 13:41:02 executing program 0: 13:41:02 executing program 5: 13:41:02 executing program 4: 13:41:02 executing program 1: 13:41:02 executing program 3: 13:41:02 executing program 2: 13:41:02 executing program 0: 13:41:02 executing program 2: 13:41:02 executing program 5: 13:41:02 executing program 4: 13:41:02 executing program 1: 13:41:02 executing program 3: 13:41:02 executing program 0: 13:41:02 executing program 5: 13:41:02 executing program 2: 13:41:02 executing program 4: 13:41:02 executing program 1: 13:41:02 executing program 3: 13:41:03 executing program 0: 13:41:03 executing program 5: 13:41:03 executing program 2: 13:41:03 executing program 4: 13:41:03 executing program 3: 13:41:03 executing program 1: 13:41:03 executing program 0: 13:41:03 executing program 5: 13:41:03 executing program 2: 13:41:03 executing program 1: 13:41:03 executing program 4: 13:41:03 executing program 3: 13:41:03 executing program 0: 13:41:03 executing program 5: 13:41:03 executing program 1: 13:41:03 executing program 2: 13:41:03 executing program 4: 13:41:03 executing program 3: 13:41:03 executing program 0: 13:41:03 executing program 5: 13:41:03 executing program 1: 13:41:03 executing program 2: 13:41:03 executing program 4: 13:41:03 executing program 3: 13:41:03 executing program 0: 13:41:03 executing program 1: 13:41:03 executing program 2: 13:41:03 executing program 5: 13:41:03 executing program 4: 13:41:03 executing program 3: 13:41:03 executing program 0: 13:41:03 executing program 1: 13:41:03 executing program 5: 13:41:03 executing program 2: 13:41:03 executing program 4: 13:41:03 executing program 3: 13:41:03 executing program 0: 13:41:03 executing program 5: 13:41:03 executing program 2: 13:41:03 executing program 1: 13:41:03 executing program 4: 13:41:03 executing program 3: 13:41:03 executing program 0: 13:41:03 executing program 5: 13:41:03 executing program 1: 13:41:04 executing program 2: 13:41:04 executing program 4: 13:41:04 executing program 5: 13:41:04 executing program 1: 13:41:04 executing program 0: 13:41:04 executing program 3: 13:41:04 executing program 2: 13:41:04 executing program 1: 13:41:04 executing program 4: 13:41:04 executing program 0: 13:41:04 executing program 5: 13:41:04 executing program 2: 13:41:04 executing program 3: 13:41:04 executing program 4: 13:41:04 executing program 1: 13:41:04 executing program 0: 13:41:04 executing program 5: 13:41:04 executing program 3: 13:41:04 executing program 2: 13:41:04 executing program 4: 13:41:04 executing program 1: 13:41:04 executing program 0: 13:41:04 executing program 5: 13:41:04 executing program 2: 13:41:04 executing program 3: 13:41:04 executing program 4: 13:41:04 executing program 5: 13:41:04 executing program 0: 13:41:04 executing program 1: 13:41:04 executing program 2: 13:41:04 executing program 3: 13:41:04 executing program 5: 13:41:04 executing program 4: 13:41:04 executing program 0: 13:41:04 executing program 1: 13:41:04 executing program 5: 13:41:04 executing program 4: 13:41:04 executing program 2: 13:41:04 executing program 3: 13:41:04 executing program 0: 13:41:04 executing program 1: 13:41:05 executing program 5: 13:41:05 executing program 2: 13:41:05 executing program 4: 13:41:05 executing program 0: 13:41:05 executing program 3: 13:41:05 executing program 1: 13:41:05 executing program 2: 13:41:05 executing program 5: 13:41:05 executing program 0: 13:41:05 executing program 4: 13:41:05 executing program 1: 13:41:05 executing program 3: 13:41:05 executing program 5: 13:41:05 executing program 2: 13:41:05 executing program 0: 13:41:05 executing program 4: 13:41:05 executing program 1: 13:41:05 executing program 3: 13:41:05 executing program 2: 13:41:05 executing program 5: 13:41:05 executing program 0: 13:41:05 executing program 1: 13:41:05 executing program 4: 13:41:05 executing program 3: 13:41:05 executing program 2: 13:41:05 executing program 0: 13:41:05 executing program 5: 13:41:05 executing program 4: 13:41:05 executing program 3: 13:41:05 executing program 1: 13:41:05 executing program 2: 13:41:05 executing program 1: 13:41:05 executing program 5: 13:41:05 executing program 3: 13:41:05 executing program 2: 13:41:05 executing program 4: 13:41:05 executing program 0: 13:41:05 executing program 5: 13:41:05 executing program 1: 13:41:05 executing program 3: 13:41:05 executing program 4: 13:41:05 executing program 0: 13:41:06 executing program 2: 13:41:06 executing program 1: 13:41:06 executing program 5: 13:41:06 executing program 3: 13:41:06 executing program 4: 13:41:06 executing program 1: 13:41:06 executing program 0: 13:41:06 executing program 5: 13:41:06 executing program 3: 13:41:06 executing program 4: 13:41:06 executing program 2: 13:41:06 executing program 1: 13:41:06 executing program 0: 13:41:06 executing program 5: 13:41:06 executing program 3: 13:41:06 executing program 4: 13:41:06 executing program 2: 13:41:06 executing program 1: pipe(0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) syz_genetlink_get_family_id$tipc2(0x0) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000001640)={0x0, &(0x7f0000000040)=""/188, 0x0}) ioctl(0xffffffffffffffff, 0x100, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) accept(0xffffffffffffffff, 0x0, &(0x7f0000000540)) geteuid() signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x400]}, 0x8, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0xe00) sendfile(r2, r3, 0x0, 0x12000) r4 = accept4$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @dev}, &(0x7f0000000200)=0x10, 0x800) clock_gettime(0x0, &(0x7f0000007c80)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000007a40)=[{{&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000500)=""/49, 0x31}, 0x3}, {{&(0x7f0000001680)=@phonet, 0x80, &(0x7f0000001780)=[{&(0x7f0000001700)=""/70, 0x46}], 0x1, &(0x7f00000017c0)=""/114, 0x72}, 0x200}, {{0x0, 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001900)=""/154, 0x9a}, 0x2}, {{0x0, 0x0, &(0x7f0000002a00), 0x0, &(0x7f0000002a40)=""/93, 0x5d}, 0xf}, {{&(0x7f0000002ac0), 0x80, &(0x7f0000002b80)=[{&(0x7f0000002b40)=""/40, 0x28}], 0x1, &(0x7f0000002bc0)=""/192, 0xc0}, 0x2}, {{&(0x7f0000002c80)=@nl=@proc, 0x80, &(0x7f0000003000)=[{&(0x7f0000002d00)=""/169, 0xa9}, {&(0x7f0000002dc0)=""/201, 0xc9}, {&(0x7f0000002ec0)=""/109, 0x6d}, {&(0x7f0000002f40)=""/59, 0x3b}, {&(0x7f0000002f80)=""/79, 0x4f}], 0x5, &(0x7f0000003080)=""/98, 0x62}, 0x6}, {{&(0x7f0000003100)=@caif, 0x80, &(0x7f00000035c0)=[{&(0x7f0000003180)=""/140, 0x8c}, {&(0x7f0000003240)=""/121, 0x79}, {&(0x7f00000032c0)=""/80, 0x50}, {&(0x7f0000003340)=""/151, 0x97}, {&(0x7f0000000000)=""/56, 0x38}, {&(0x7f0000003440)=""/55, 0x37}, {&(0x7f0000003480)=""/199, 0xc7}, {&(0x7f0000003580)=""/39, 0x27}], 0x8, &(0x7f0000003640)=""/42, 0x2a}, 0x9}, {{&(0x7f0000003680)=@caif=@dgm, 0x80, &(0x7f0000003900)=[{&(0x7f0000003700)=""/13, 0xd}, {&(0x7f0000007d00)=""/160, 0xa0}, {&(0x7f0000003800)=""/181, 0xb5}, {&(0x7f00000038c0)=""/3, 0x3}], 0x4, &(0x7f0000003940)=""/4096, 0x1000}}, {{&(0x7f0000004940)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000006a00)=[{&(0x7f00000049c0)=""/4096, 0x1000}, {&(0x7f00000059c0)=""/24, 0x18}, {&(0x7f0000005a00)=""/4096, 0x1000}], 0x3, &(0x7f0000007dc0)=""/4104, 0x1008}, 0x8}], 0x9, 0x2002, &(0x7f0000007cc0)={r5, r6+60000000}) 13:41:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r0, 0x0, 0x0) 13:41:06 executing program 5: 13:41:06 executing program 4: 13:41:06 executing program 3: 13:41:06 executing program 2: 13:41:06 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000840)=[{{0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f0000000780)=""/149, 0x95}}], 0x1, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f00000008c0)={&(0x7f0000000100), 0xc, &(0x7f0000000880)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB], 0x3c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000000)={'sit0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x19, 0x0, 0x3f, 0x48, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, 0x8000, 0x10, 0x80000001, 0x3}}) syz_genetlink_get_family_id$nl80211(0x0) msgget(0x3, 0x80) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)}], 0x0, &(0x7f0000000000)=ANY=[]) 13:41:06 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2c, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_FLAGS={0x8}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_MASK={0x8}]}, 0x2c}}, 0x0) 13:41:06 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x10, 0xd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x912, 0x9, 0x8001, 0x3, 0x6fc, 0x9, 0xd4c6}, 0x0, 0x8, 0xffffffffffffffff, 0x9) write(r0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000003c0)=""/123, &(0x7f0000000440)=0x7b) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x6}, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r2, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x162e}, 0x0, 0x3, 0xffffffffffffffff, 0x0) 13:41:06 executing program 3: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000880)=@acquire={0x128, 0x17, 0x1, 0x0, 0x0, {{@in6=@remote}, @in=@dev, {@in6=@local, @in=@empty}, {{@in=@broadcast, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}}}, 0x128}}, 0x0) [ 241.926604][ T8536] splice write not supported for file (pid: 8536 comm: syz-executor.1) [ 241.968363][ T29] audit: type=1800 audit(1595166066.683:2): pid=8543 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15824 res=0 [ 242.042461][ T29] audit: type=1804 audit(1595166066.683:3): pid=8543 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir744779636/syzkaller.0dyK8A/40/file0" dev="sda1" ino=15824 res=1 13:41:06 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) [ 242.208677][ T8536] splice write not supported for file (pid: 8536 comm: syz-executor.1) [ 242.262940][ T8550] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 13:41:07 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000d00ff00289250a80020008200090080000efffeffe80900fbffffffffffffff100003ffffffffffffffffefffffe7ee00000000000000000200000000", 0x58}], 0x1) 13:41:07 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000180)='\x14\xccmPn\x9be\x13\x1d\xe5\x1c\x95\x14tc\x93\xe6\xd1\xa47\xf9\vc8tU\x90\x13\xf3\xfc9\x9bP\xe5\x12\x85\x9c\x86\x87\xe3\x88\xdb\xb5\xd5\xe0q\xfb\r?\x1c\xf5$Q\xdbKo\xe0\x0f\xf1W\xc9w\x10\xa9\xdeW^\x9e\x8eV\xcf8\x00\x02\xb6a\f\xe1\x8a\xeaw\xfe\x8b\xc2\nh\xa4c\xba]\x00\x00\x00\x00-?\xccG_\x16\xa4\x1bQn\xd0\x06\xc7FIR\xd3\x88\f/@*\xe6\x8a\x13)H\xd5\xe7\xa4\xaf\xc5\xe6\xb2p$\xb9\xce\x98\xedY\x8a\xb2t\xaan|\x8a\xa9\x9d\xbd\xcc\xc5\r\x8e\xbb\x1e\xf6:i\xa5r`\xa4ij\x1b\x9a\xfe\x94\x95\xec26!\xe82', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80001, 0x0) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x58, r3, 0x24c, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}]}]}, 0x58}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0xfc}, 0x1, 0x0, 0x0, 0x40}, 0x20005040) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x90000005}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0xa4, r3, 0x800, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x50}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x21, 0x1}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5e7}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x29c}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4008000}, 0x8000) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_CLR_FD(r0, 0x4c06) 13:41:07 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f00000000c0)) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000004780)={0x0, 0x989680}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) 13:41:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r0, 0x0, 0x0) 13:41:14 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="0100000000000000d21ba2d8d8f06510d106", @ANYRES16=r1, @ANYBLOB="67d65bd7974023de6ddb96e81394862f7bf63d7f90cfb0fbcfcf880f83f3d646d7e10f56b1cf61109ce9aea151a849dd4a0c082046241de1497f076c8244e71a929ef745496e03c15cbed65e9addabc8d925d74811e17fae8f9e42a5519f6ab7725505d50a0b80c2ed06d613b0920b5d606d74d120384f1237256e5ce3f647a23ed4244e2f810bbfe5c6b4b0f0a0"], 0x188}}, 0x12) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, r1, 0x800, 0x70bd2c, 0x25dfdbfd, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xfff}, {0x6, 0x11, 0x8}, {0x8, 0x15, 0x8}}]}, 0x54}, 0x1, 0x0, 0x0, 0x2000c004}, 0x40001) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r2 = epoll_create1(0x0) fcntl$getownex(r2, 0x24, &(0x7f000045fff8)) mincore(&(0x7f00004bc000/0x1000)=nil, 0x1000, &(0x7f0000000240)=""/124) 13:41:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f00000000c0)=0x1, 0x4) write$binfmt_elf32(r0, &(0x7f0000000600)=ANY=[], 0x1) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7fff, 0x1, [{}]}) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002a80)=""/95, 0x5f}], 0x1}}], 0x400000000000170, 0x0, 0x0) 13:41:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000800), 0x1000) 13:41:14 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) preadv(0xffffffffffffffff, &(0x7f00000027c0), 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000000)={0x37, "a7a7254a2e74e86ba9790b387f8889c56956090d41f8fcca99d01b3e912885e8aac05b69e4d24360051381c349520919b0edd72f6cc35f"}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000001440)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000200), 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x10087a659251, 0x0}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f00000001c0)={0x0, r0}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x43, &(0x7f0000000040), 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 13:41:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x3) 13:41:14 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x88, 0x64, 0x0, 0x0) ftruncate(r0, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r3, 0x88, 0x64, 0x0, &(0x7f0000000040)) getsockopt$sock_buf(r3, 0x1, 0x1a, &(0x7f0000000180)=""/211, &(0x7f00000000c0)=0xd3) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/asound/timers\x00', 0x0, 0x0) ioctl$KVM_SET_CLOCK(r4, 0x4030ae7b, &(0x7f00000002c0)={0x2, 0x2}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000047c0)=[{{&(0x7f0000000f40)=@isdn, 0x80, 0x0, 0x0, &(0x7f0000001240)=""/138, 0x8a}, 0x101}, {{&(0x7f0000001300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001380)}, 0x2}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001440)=""/108, 0x6c}, {0x0}, {&(0x7f00000015c0)=""/14, 0xe}], 0x3, &(0x7f0000000340)=""/208, 0xd0}, 0x14}, {{&(0x7f0000002a40)=@sco, 0x80, &(0x7f00000010c0)=[{&(0x7f0000002ac0)=""/103, 0x67}, {&(0x7f0000002b80)=""/64, 0x40}, {&(0x7f0000000a80)=""/102, 0x66}], 0x3}, 0x1000}], 0x4, 0x40000002, &(0x7f0000004780)={0x0, 0x989680}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) 13:41:14 executing program 0: sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='4~8', @ANYRES16, @ANYBLOB="6f6d216c7fb5c4d0840003000040580001800d0001007564aa8b48e8705f7c7f6587cf4c9b5c47d3e8bf10396a2130ac5187fe41cf401649a6d9bdbbe2c5054f7e0769d61b593bbee1d9894ff01bf72e1c1cee4965b36f027558d6386e2c8af1ec038a9a4ffa48047217beba35b6879b6fd1ff8f9d1eadafc600e93a3de555651879b66c4ef8ce530fabc9e47957d840bb38fc7ed4333dba4298759c2ce3c59c9657471d26a6f0305cbe048bf9620dcdad3cbbd5b4e1eb548b01b85eff9680aa436ead"], 0x3}}, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xdf91}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40480, 0x6, 0x3, 0x0, 0x3, 0x400, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, &(0x7f00000004c0)={&(0x7f0000000100), &(0x7f0000000140)}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000200)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) clone(0x80000, &(0x7f0000000300)="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", &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="2acec3d00f247651d7054c3bab41825d11557e696ed0bb0f3f5aef46cc38a3171d9c39a8640c3c9c64abb06b904f5adfdb62b762bf01") ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x01\x00', 0x0) fsetxattr$system_posix_acl(r1, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x24, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x804c53, 0x0) 13:41:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x0, 0x0, 0x1, 0x8, 0x4000000000}, 0x0, 0x8, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) r2 = open(&(0x7f0000000500)='./file1\x00', 0x400, 0x108) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) sendmsg$nl_xfrm(r2, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x5000021}, 0xc, &(0x7f0000000400)={&(0x7f0000000800)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x404c8b5) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000180)={0x6000, &(0x7f0000000040), 0x8, r2, 0xb}) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r3, &(0x7f0000000800), 0x1000) 13:41:14 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000d00ff00289250a80020008200090080000efffeffe80900fbffffffffffffff100003ffffffffffffffffefffffe7ee00000000000000000200000000", 0x58}], 0x1) 13:41:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x3) 13:41:15 executing program 2: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000040)={0x0, &(0x7f0000000180)}) r0 = socket$inet6(0xa, 0x2, 0x0) readv(r0, &(0x7f0000000000), 0x100000000000000e) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x32, &(0x7f0000000080)={@link_local, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @broadcast}, {0x0, 0x4e22, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 13:41:15 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'vlan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote, r4}, 0x14) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000240)={'vlan0\x00', 0x0}) bind$packet(r6, &(0x7f0000000040)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000080)={@remote, r9}, 0x14) 13:41:15 executing program 0: sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='4~8', @ANYRES16, @ANYBLOB="6f6d216c7fb5c4d0840003000040580001800d0001007564aa8b48e8705f7c7f6587cf4c9b5c47d3e8bf10396a2130ac5187fe41cf401649a6d9bdbbe2c5054f7e0769d61b593bbee1d9894ff01bf72e1c1cee4965b36f027558d6386e2c8af1ec038a9a4ffa48047217beba35b6879b6fd1ff8f9d1eadafc600e93a3de555651879b66c4ef8ce530fabc9e47957d840bb38fc7ed4333dba4298759c2ce3c59c9657471d26a6f0305cbe048bf9620dcdad3cbbd5b4e1eb548b01b85eff9680aa436ead"], 0x3}}, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xdf91}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40480, 0x6, 0x3, 0x0, 0x3, 0x400, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, &(0x7f00000004c0)={&(0x7f0000000100), &(0x7f0000000140)}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000200)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) clone(0x80000, &(0x7f0000000300)="bf138a649635d1affae448ae26fd3cd0624626733c65d9748a5bdc2859c4ae129169bab5bba3abe318225fbb9c86d20b1c09a8e5e8bd0e554532d74c0a6033b44d762a1a08d8d52ede5f3971e272a4fd7884a2ee9e9707cfdd22303d5413298305a52ed49f61c713ff82f019d4a242d5004ffbfec9536efe6be83f89b604ff6eca55281b71bd4b3b2d57246a718552adce07266e6b1b1826000f65313f3aa2581c7f84cb2e77898aec010823922288fd7159e9bae947931fa581772baece247823d0b79456213e78cee05424cd39b34af44ea24b0f3b3d173a46848e06b80da952aa135e8e220ed8853637c96b92ca9030a96127cc9cd907ce0c", &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="2acec3d00f247651d7054c3bab41825d11557e696ed0bb0f3f5aef46cc38a3171d9c39a8640c3c9c64abb06b904f5adfdb62b762bf01") ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x01\x00', 0x0) fsetxattr$system_posix_acl(r1, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000ac0)=ANY=[@ANYBLOB="020000000100000000000000040000000000000010000000e3ffffff20000000000000046f0e4263c6255b139ad4fcef19b045b88a5b92a96e012fc333e440461458580b920bb49816dc0c9ac95378d9744cad9e4a1cbe2bf32a1079204da2d3a0bd893fd0fde96319906c3451083de8d45698a1ebeca5dfd801d417f9ba0b21b336dccc33da1f581d4007ff6c510e6c17b3718ed400acf869d8c069fb8c97be7fce5dccfc6fd843e141e82d072dfa451e3a409f8ea364feb7ed4ae2bb39b5c2dd8bb79dae0714eab98fe1cef6b794b58c9c7c76db3ef4004ec838aa668875fcd3259d334bec082c2b11f879010100000d5ec55f150d32504d70c1ed613f65a77984e58f11f70998c54ede817fed56ce0d00472b2aa23398571d52e9def90e03c296fce82bb35bcde53f23676bbeff79e94a5d2e645ef312373757b4cca24db757e47ca55ac996e002155fcf16d59556c4d504ba0455fb30e41bd0897c3b98d5ef71a02916a13cdce46671e388ac87ed25f605d4bc4912410736fb1dbaa4e63af5894df72ca5f982cd388ba6dc9466b1a7d708127cae9757b5308fd30b33175d57b4b8c69dd1f7d6baeb0e5b20988bb458d3c2d3e6bcd36905652ae0c6ccfc4ec355c0400eb1dfb9b8c4bee0d2a385fad1be6b0177304db834ffab767927ce925f855d174c8df03823222edee5bf7947d214efcd3df50876f29f1592f17a8d5911095538dc470b6eeb2114069758785dcc4a7c7bf30900284dda6cc7fe623151168451cfb70000000000000000000000000000bd3152dedae9abbe2444735e79870c5292bc56c350464197b46b9c753e433a42ffdfe741d05c3c40599d2147ce2da24e49d37049f7cd8f90e6e6db95503151fce52974f758b8dd44bd9702ca28c0e4b7a2857df365c2a0aeaf7ae1574f19fc02a6240d5855876ba0686269cf65045a137bbb6515c22774cb672073e22fb32337dbe4e22682ad54ffa5c9749339c1da7421d1c9dc8984717b1a95fd11c79d357731b03f7fd568ccc162d0fced87958b70009f26eaabe7258a6601d90889abf1bb34b74a7cb3b8d3703fc66074d983b1d396de5a67747e8e1c576f6ea687fc30dd1451"], 0x24, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x804c53, 0x0) 13:41:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x913}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000003c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_genetlink_get_family_id$tipc(0x0) 13:41:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="24000000200003041dfffd946f6105000a00000a1f00000ec010080008001100d27f1e00", 0x24}], 0x1}, 0x0) 13:41:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r0, &(0x7f0000000800), 0x1000) socket$inet_tcp(0x2, 0x1, 0x0) 13:41:15 executing program 3: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0xa, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="5500000018007f001cfe05b2a4a280930a6a0001fe80000214000000390009002d0050000600000019000540029b841325f75afb83de441100ae20ca3ab822056a060cec4fab91d471cd34938c42f030dd941e7931", 0x55}], 0x1}, 0x0) [ 250.623461][ T8658] BPF: (anon) type_id=1 bits_offset=0 [ 250.630392][ T8658] BPF: [ 250.633639][ T8662] BPF: (anon) type_id=1 bits_offset=0 [ 250.640066][ T8658] BPF:Member exceeds struct_size [ 250.650810][ T8662] BPF: [ 250.653761][ T8658] BPF: [ 250.653761][ T8658] [ 250.663681][ T8662] BPF:Member exceeds struct_size 13:41:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@ipv6_getroute={0x1c, 0x1a, 0x1}, 0x1c}}, 0x0) [ 250.681496][ T8662] BPF: [ 250.681496][ T8662] 13:41:15 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/33, 0x21) getdents64(r0, &(0x7f0000002700)=""/4104, 0x1008) [ 250.775779][ T8669] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 250.783348][ T8669] IPv6: NLM_F_CREATE should be set when creating new route [ 250.790691][ T8669] IPv6: NLM_F_CREATE should be set when creating new route 13:41:15 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x0, 0x1}, 0x20) 13:41:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r0, &(0x7f0000000800), 0x1000) 13:41:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x1040000007, 0x1, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x44140}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, 0x0}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:41:16 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xb732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7}}) writev(r0, &(0x7f0000001680)=[{0x0}, {&(0x7f00000001c0)="7a40000000000000007918dcbcea9ad049dc33b2a99e35c50f4fcd7b981ce1ffd9d2a822614975812b381a94043b5b9db2f826d02eb79a9276836c7cda5beb856ad43e39ca7bbfa0e62da48aea9b55cc01fff72cf68b13e25275a1accf2856f1760f94dafe", 0x65}, {&(0x7f0000000240)="5d17a828f63525299ed4e4312dd38d3b7448f5d1c8b5cfa161d143837d8c4d278de5b67bca2e8d75b5f8bfad3dc21fc8aa5b73a8d6b21c62891f19fdaa8d0a67489633a767912f1f340fcad66a7da36778d823dbd3c7f209b149ab8fd46fee5233cfcb9d4ec44aa2b60e886d82313fe2f0ab155dd832ba444efadbb24418cd5c92dea66e0670709c3903007b53f453a3f1e96594ca30f5c58dfa1b11a841414d1d1ae3ef157a927cfbe91653e8ffab5427af9f801da3736f35dfdd6899bec3d3bbf6d44026f50477681795a553c060311d368f20463328103576", 0xda}, {&(0x7f0000000340)="6aa88073f16fe997e59f0f8a8d62d260530f1019b4a96312d6650e030371b48ce2334bbb0ab8b1787294878d3b1d3f1219e44bce32f8f0b30e9f49bf4f9b3682808843c060bea9c9464d8cb8702d1db311b8a13a69811eb92fe95a4547dd59cbe6cc2d419157470eb755fc88151b80db6d39b94b3f1df69f5e78cb81fcb54a22766aa7f45c2dc811fa0eeb77bf90bca1f84c7641bb9f7c553fb540fcad0e20cc3556537b99e155e183be3b87101cd6fca97217c7701caa8bee3314228bce694362a524d781e89cdcc17e8d10a7", 0xcd}, {&(0x7f0000000440)="7fc23973471de5a21e7e0ff27d0f3694fc10be272d62c6a1e0c79774c5a2cb2b935fd0daf4fca1713f9ae2f382d953a42cacc05437b069e54bf209f9e6b985a58cd5b53dcc90acf3e5", 0x49}, {&(0x7f00000004c0)="654dada6aeea36b61b52c1a8439a898650ce5a716d59365d7f89889b1084e8c6fd2c0eab5241e61fcaed1d12fec72ddc9905b5cbb861f6aaf79973b19fcfdef36bb90efceb593c74d3e4dec91fa3e23d267065a8cc0c1def1ade964896d0f368142cc588179f652ee21db0b1deefea2df67de19c70bdba430d48ee20da5cf73769aae2b56a38bc5a", 0x88}, {&(0x7f0000000580)="485aa10dc7630611baadfa17843cba0d6724ed6139e6e7ca1efdfb5cbb64cfca30d6bc37105841d1f5083fe56ca9ecc1341e7aea9167d4de016a3c8a3bf95c2416914f78e6e4f8eff2ae80620212e2dcd3e6f4fe2c47f7d09da9b9cc7b9adb107f0315f861c6e7d9f3d021bca626866146035278b254f4146da429b2af09c11cdc8ec89e50da169564396fc9ac46d2d2d985efdbb13feabab84614080c30541ee1c84703ed35969d85ef3616737ea4c45545c4c80a4ba984cb54784106421f1cffeecbf100b5182984295b94b69904ec3507295d0233c2e216c9c9e41b22cc0e48663b9bb0", 0xe5}, {&(0x7f0000000680)="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", 0x200}], 0x8) 13:41:16 executing program 5: mknod(0x0, 0x0, 0xba64) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@ipv6_getroute={0x1c, 0x1a, 0x1}, 0x1c}}, 0x0) [ 251.477581][ T8699] kvm [8696]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000007 data 0x100000002 [ 251.494586][ T8699] kvm [8696]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000000a data 0x100000003 [ 251.505300][ T8699] kvm [8696]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000004 data 0x100000004 [ 251.522256][ T8699] kvm [8696]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000005 data 0x100000004 13:41:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xb732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7}}) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000300)="bffb67f3bd103c", 0x7}, {&(0x7f0000000180)="8e53e343086558", 0x7}, {&(0x7f00000001c0)="043ad757f68c3580faaf435c88a8", 0xe}], 0x3) 13:41:16 executing program 0: sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='4~8', @ANYRES16, @ANYBLOB="6f6d216c7fb5c4d0840003000040580001800d0001007564aa8b48e8705f7c7f6587cf4c9b5c47d3e8bf10396a2130ac5187fe41cf401649a6d9bdbbe2c5054f7e0769d61b593bbee1d9894ff01bf72e1c1cee4965b36f027558d6386e2c8af1ec038a9a4ffa48047217beba35b6879b6fd1ff8f9d1eadafc600e93a3de555651879b66c4ef8ce530fabc9e47957d840bb38fc7ed4333dba4298759c2ce3c59c9657471d26a6f0305cbe048bf9620dcdad3cbbd5b4e1eb548b01b85eff9680aa436ead"], 0x3}}, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xdf91}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40480, 0x6, 0x3, 0x0, 0x3, 0x400, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, &(0x7f00000004c0)={&(0x7f0000000100), &(0x7f0000000140)}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000200)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) clone(0x80000, &(0x7f0000000300)="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", &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="2acec3d00f247651d7054c3bab41825d11557e696ed0bb0f3f5aef46cc38a3171d9c39a8640c3c9c64abb06b904f5adfdb62b762bf01") ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x01\x00', 0x0) fsetxattr$system_posix_acl(r1, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000ac0)=ANY=[@ANYBLOB="020000000100000000000000040000000000000010000000e3ffffff20000000000000046f0e4263c6255b139ad4fcef19b045b88a5b92a96e012fc333e440461458580b920bb49816dc0c9ac95378d9744cad9e4a1cbe2bf32a1079204da2d3a0bd893fd0fde96319906c3451083de8d45698a1ebeca5dfd801d417f9ba0b21b336dccc33da1f581d4007ff6c510e6c17b3718ed400acf869d8c069fb8c97be7fce5dccfc6fd843e141e82d072dfa451e3a409f8ea364feb7ed4ae2bb39b5c2dd8bb79dae0714eab98fe1cef6b794b58c9c7c76db3ef4004ec838aa668875fcd3259d334bec082c2b11f879010100000d5ec55f150d32504d70c1ed613f65a77984e58f11f70998c54ede817fed56ce0d00472b2aa23398571d52e9def90e03c296fce82bb35bcde53f23676bbeff79e94a5d2e645ef312373757b4cca24db757e47ca55ac996e002155fcf16d59556c4d504ba0455fb30e41bd0897c3b98d5ef71a02916a13cdce46671e388ac87ed25f605d4bc4912410736fb1dbaa4e63af5894df72ca5f982cd388ba6dc9466b1a7d708127cae9757b5308fd30b33175d57b4b8c69dd1f7d6baeb0e5b20988bb458d3c2d3e6bcd36905652ae0c6ccfc4ec355c0400eb1dfb9b8c4bee0d2a385fad1be6b0177304db834ffab767927ce925f855d174c8df03823222edee5bf7947d214efcd3df50876f29f1592f17a8d5911095538dc470b6eeb2114069758785dcc4a7c7bf30900284dda6cc7fe623151168451cfb70000000000000000000000000000bd3152dedae9abbe2444735e79870c5292bc56c350464197b46b9c753e433a42ffdfe741d05c3c40599d2147ce2da24e49d37049f7cd8f90e6e6db95503151fce52974f758b8dd44bd9702ca28c0e4b7a2857df365c2a0aeaf7ae1574f19fc02a6240d5855876ba0686269cf65045a137bbb6515c22774cb672073e22fb32337dbe4e22682ad54ffa5c9749339c1da7421d1c9dc8984717b1a95fd11c79d357731b03f7fd568ccc162d0fced87958b70009f26eaabe7258a6601d90889abf1bb34b74a7cb3b8d3703fc66074d983b1d396de5a67747e8e1c576f6ea687fc30dd1451"], 0x24, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x804c53, 0x0) 13:41:16 executing program 4: mknod(0x0, 0x2, 0xba64) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents64(r3, &(0x7f0000000200)=""/170, 0x1b) getdents(r3, &(0x7f0000000040)=""/147, 0x93) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/mcfilter\x00') ioctl$RTC_WKALM_RD(r4, 0x80287010, &(0x7f0000000000)) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r1, r2, 0x0) keyctl$join(0x1, 0x0) dup2(r0, r5) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000040)={0x2c, @empty, 0x4e20, 0x4, 'fo\x00', 0x0, 0x8, 0x29}, 0x2c) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="bc3e9d1cdeb03d75828c8f71923289e394655d0791fecdd6d8fd767c7a5dfc9f9f37c98dbfc81e157ca52bd02f389172eb6ea700000000b39806b2beb6570e361bf4c744", @ANYRES16=r6, @ANYBLOB="45a6000000000000000005000073696d0000000f0002006e657464657673696d30000008000300000000000e0001006e657464657673696d0000000f0002006e65745d696d30000008000200"/86], 0x64}}, 0x0) 13:41:16 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x2, 0xba64) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r1, r2, 0x0) dup2(r0, r3) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, 0x0, 0x0) 13:41:16 executing program 3: mknod(0x0, 0x100, 0xba64) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffffff5ffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x8c}, 0x16, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents64(r1, &(0x7f0000000200)=""/170, 0x1b) getdents(r1, &(0x7f0000000040)=""/147, 0x93) fremovexattr(r1, &(0x7f0000000000)=@known='user.syz\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup3(r2, r3, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents64(r5, &(0x7f0000000200)=""/170, 0x1b) getdents(r5, &(0x7f0000000040)=""/147, 0x93) ioctl$KVM_PPC_ALLOCATE_HTAB(r5, 0xc004aea7, &(0x7f0000000100)=0x2db) dup2(r0, r4) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0) 13:41:16 executing program 0: sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='4~8', @ANYRES16, @ANYBLOB="6f6d216c7fb5c4d0840003000040580001800d0001007564aa8b48e8705f7c7f6587cf4c9b5c47d3e8bf10396a2130ac5187fe41cf401649a6d9bdbbe2c5054f7e0769d61b593bbee1d9894ff01bf72e1c1cee4965b36f027558d6386e2c8af1ec038a9a4ffa48047217beba35b6879b6fd1ff8f9d1eadafc600e93a3de555651879b66c4ef8ce530fabc9e47957d840bb38fc7ed4333dba4298759c2ce3c59c9657471d26a6f0305cbe048bf9620dcdad3cbbd5b4e1eb548b01b85eff9680aa436ead"], 0x3}}, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xdf91}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40480, 0x6, 0x3, 0x0, 0x3, 0x400, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, &(0x7f00000004c0)={&(0x7f0000000100), &(0x7f0000000140)}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000200)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) clone(0x80000, &(0x7f0000000300)="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", &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="2acec3d00f247651d7054c3bab41825d11557e696ed0bb0f3f5aef46cc38a3171d9c39a8640c3c9c64abb06b904f5adfdb62b762bf01") ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x01\x00', 0x0) fsetxattr$system_posix_acl(r1, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x24, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x804c53, 0x0) 13:41:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETGROUP(r3, 0x400454ce, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @multicast2}}) 13:41:17 executing program 2: mknod(0x0, 0x2, 0xba64) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x5}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents64(r3, &(0x7f0000000200)=""/170, 0x1b) getdents(r3, &(0x7f0000000040)=""/147, 0x93) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/mcfilter\x00') ioctl$RTC_WKALM_RD(r4, 0x80287010, &(0x7f0000000000)) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r1, r2, 0x0) keyctl$join(0x1, 0x0) dup2(r0, r5) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000040)={0x2c, @empty, 0x4e20, 0x4, 'fo\x00', 0x0, 0x8, 0x29}, 0x2c) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="bc3e9d1cdeb03d75828c8f71923289e394655d0791fecdd6d8fd767c7a5dfc9f9f37c98dbfc81e157ca52bd02f389172eb6ea700000000b39806b2beb6570e361bf4c744", @ANYRES16=r6, @ANYBLOB="45a6000000000000000005000073696d0000000f0002006e657464657673696d30000008000300000000000e0001006e657464657673696d0000000f0002006e65745d696d30000008000200"/91], 0x64}}, 0x0) 13:41:17 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000000)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000140)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f0000000200)={0x1ff}, 0x0, 0x0) 13:41:17 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2, 0x700}]}]}}, &(0x7f0000004600)=""/200, 0x3e, 0xc8, 0x8}, 0x20) 13:41:17 executing program 3: mknod(0x0, 0x100, 0xba64) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffffff5ffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x8c}, 0x16, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents64(r1, &(0x7f0000000200)=""/170, 0x1b) getdents(r1, &(0x7f0000000040)=""/147, 0x93) fremovexattr(r1, &(0x7f0000000000)=@known='user.syz\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup3(r2, r3, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents64(r5, &(0x7f0000000200)=""/170, 0x1b) getdents(r5, &(0x7f0000000040)=""/147, 0x93) ioctl$KVM_PPC_ALLOCATE_HTAB(r5, 0xc004aea7, &(0x7f0000000100)=0x2db) dup2(r0, r4) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0) [ 252.793385][ T8791] BPF: (anon) type_id=2 bits_offset=1792 [ 252.819137][ T8792] BPF: (anon) type_id=2 bits_offset=1792 [ 252.834552][ T8791] BPF: [ 252.845118][ T8791] BPF:Member bits_offset exceeds its struct size [ 252.852880][ T8792] BPF: [ 252.868789][ T8792] BPF:Member bits_offset exceeds its struct size [ 252.884581][ T8791] BPF: [ 252.884581][ T8791] 13:41:17 executing program 0: mknod(0x0, 0x0, 0xba64) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r1, r2, 0x0) dup2(r0, r3) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0) [ 252.896656][ T8792] BPF: [ 252.896656][ T8792] 13:41:18 executing program 1: mknod(0x0, 0x0, 0xba64) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r1, r2, 0x0) dup2(r0, r3) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r4 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x64, r4, 0x5ab668bdb99ca645, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x2}}}]}, 0x64}}, 0x0) 13:41:18 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:18 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000002d80)=[{{0x0, 0x0, &(0x7f0000003340)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 13:41:18 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0xa, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) 13:41:18 executing program 4: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x2}}, @struct]}}, &(0x7f0000004600)=""/200, 0x3e, 0xc8, 0x8}, 0x20) 13:41:18 executing program 5: mknod(0x0, 0x100, 0xba64) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r1, r2, 0x0) dup2(r0, r3) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0) [ 253.820678][ T8846] BPF:[1] ARRAY (anon) [ 253.837038][ T8847] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 253.846320][ T8849] BPF:[1] ARRAY (anon) [ 253.855974][ T8848] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 253.870472][ T8852] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 253.877567][ T8846] BPF:type_id=4 index_type_id=2 nr_elems=0 [ 253.880750][ T8849] BPF:type_id=4 index_type_id=2 nr_elems=0 [ 253.886773][ T8858] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 253.901036][ T8858] BPF: [ 253.903987][ T8847] BPF: [ 253.906896][ T8848] BPF: [ 253.911148][ T8846] BPF: [ 253.913901][ T8849] BPF: [ 253.914079][ T8852] BPF: 13:41:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x4001, 0x3, 0x2c8, 0x160, 0x0, 0x148, 0x0, 0x148, 0x230, 0x240, 0x240, 0x230, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'bond_slave_1\x00'}, 0x0, 0xf8, 0x160, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'macvtap0\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x5, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x328) [ 253.921121][ T8858] BPF:Member exceeds struct_size [ 253.926287][ T8847] BPF:Member exceeds struct_size [ 253.933131][ T8848] BPF:Member exceeds struct_size [ 253.938327][ T8846] BPF:Invalid index [ 253.943626][ T8858] BPF: [ 253.943626][ T8858] [ 253.944148][ T8849] BPF:Invalid index [ 253.949611][ T8852] BPF:Member exceeds struct_size [ 253.957741][ T8847] BPF: [ 253.957741][ T8847] [ 253.964841][ T8846] BPF: [ 253.964841][ T8846] 13:41:18 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:41:18 executing program 4: mknod(0x0, 0x0, 0xba64) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, 0x0, 0xfffffffffffffdcd) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r1, r2, 0x0) dup2(r0, r3) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0) 13:41:18 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 253.971360][ T8848] BPF: [ 253.971360][ T8848] [ 253.976460][ T8852] BPF: [ 253.976460][ T8852] [ 254.016299][ T8849] BPF: [ 254.016299][ T8849] [ 254.066189][ T8868] Cannot find add_set index 0 as target [ 254.143261][ T8878] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 254.150153][ T8886] Cannot find add_set index 0 as target [ 254.164949][ T8878] BPF: [ 254.175336][ T8878] BPF:Member exceeds struct_size [ 254.187124][ T8878] BPF: [ 254.187124][ T8878] 13:41:18 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:18 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0xa, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) 13:41:19 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0xd, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:19 executing program 5: perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000003001985680c1ba3a20400ff7e280000005e00ffffba162441caf0da3b40c925234476d0b80ca0aa1c0009b3ebea8653b1cc7e6397", 0x4c}], 0x1}, 0x0) 13:41:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@prinfo={0x14}], 0x14}, 0x0) [ 254.345965][ T8899] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 254.371719][ T8898] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 254.385923][ T8899] BPF: [ 254.390495][ T8907] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 254.400153][ T8906] BPF: (anon) type_id=2 bits_offset=0 [ 254.406088][ T8899] BPF:Member exceeds struct_size [ 254.421354][ T8906] BPF: [ 254.431088][ T8906] BPF:Invalid member 13:41:19 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x4, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x80000002, 0x4}, 0x40) [ 254.452583][ T8898] BPF: [ 254.455581][ T8899] BPF: [ 254.455581][ T8899] [ 254.456100][ T8913] BPF: (anon) type_id=2 bits_offset=0 [ 254.467266][ T8906] BPF: [ 254.467266][ T8906] [ 254.470065][ T8907] BPF: [ 254.480435][ T8913] BPF: [ 254.481968][ T8907] BPF:Member exceeds struct_size [ 254.490013][ T8913] BPF:Invalid member [ 254.491714][ T8898] BPF:Member exceeds struct_size 13:41:19 executing program 4: r0 = socket(0x2, 0x3, 0x6c) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="82020000ffffffff"], 0x1) connect$unix(r0, &(0x7f0000000000)=ANY=[], 0x10) write(r0, 0x0, 0x0) 13:41:19 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:19 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:19 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:19 executing program 3: mknod(0x0, 0x2, 0xba64) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x5}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r1, r2, 0x0) dup2(r0, r3) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000040)={0x2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x4, 'fo\x00', 0x0, 0x8, 0x29}, 0x2c) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x64, r4, 0x5ab668bdb99ca645, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x2}}}]}, 0x64}}, 0x0) [ 254.509901][ T8913] BPF: [ 254.509901][ T8913] [ 254.527513][ T8907] BPF: [ 254.527513][ T8907] [ 254.527981][ T8898] BPF: [ 254.527981][ T8898] 13:41:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x100) r1 = socket$inet_sctp(0x2, 0x1, 0x84) dup2(r1, r0) [ 254.585734][ T8923] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 254.595018][ T8923] BPF: [ 254.597931][ T8923] BPF:Member exceeds struct_size [ 254.603662][ T8923] BPF: [ 254.603662][ T8923] [ 254.651093][ T8931] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 254.666669][ T8936] BPF: (anon) type_id=2 bits_offset=0 [ 254.672398][ T8931] BPF: [ 254.676678][ T8931] BPF:Member exceeds struct_size [ 254.682498][ T8939] BPF: (anon) type_id=2 bits_offset=0 [ 254.688046][ T8936] BPF: [ 254.693284][ T8936] BPF:Member exceeds struct_size [ 254.698693][ T8931] BPF: 13:41:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind(r0, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 13:41:19 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 254.698693][ T8931] [ 254.703698][ T8939] BPF: [ 254.715235][ T8939] BPF:Member exceeds struct_size [ 254.720631][ T8936] BPF: [ 254.720631][ T8936] 13:41:19 executing program 0: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)=""/102378, 0x18fea}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000034580)=[{&(0x7f0000019480)=""/102376, 0x18fe8}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00536) shutdown(r2, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) shutdown(r3, 0x0) 13:41:19 executing program 1: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)=""/102378, 0x18fea}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000034580)=[{&(0x7f0000019480)=""/102376, 0x18fe8}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00511) shutdown(r2, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) shutdown(r3, 0x0) [ 254.744493][ T8939] BPF: [ 254.744493][ T8939] 13:41:19 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x4, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x80000002, 0x4}, 0x40) 13:41:19 executing program 4: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x18f80, 0x0) utimes(0x0, &(0x7f0000000080)={{0x2}}) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r3, r2) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x24, &(0x7f0000000000), 0xfe6a) [ 254.830035][ T8950] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 254.850658][ T8950] BPF: 13:41:19 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 254.872350][ T8950] BPF:Member exceeds struct_size [ 254.879369][ T8950] BPF: [ 254.879369][ T8950] 13:41:19 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 254.951026][ T8965] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 254.969484][ T8965] BPF: [ 254.972457][ T8965] BPF:Member exceeds struct_size [ 254.977539][ T8965] BPF: [ 254.977539][ T8965] 13:41:19 executing program 3: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)=""/102378, 0x18fea}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000034580)=[{&(0x7f0000019480)=""/102376, 0x18fe8}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00536) shutdown(r2, 0x0) shutdown(r3, 0x0) 13:41:19 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000003c0)="15", 0x1}], 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) dup2(r1, r0) 13:41:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/104, 0x68}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000600)=[{&(0x7f0000000540)=""/143, 0x8f}, {0x0}, {0x0}, {0x0}], 0x4) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f0000000000)=[{&(0x7f0000000200)=""/221, 0xdd}], 0x1) recvfrom$inet(r6, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00515) shutdown(r5, 0x0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r7, &(0x7f00000001c0)={0x10, 0x2}, 0x10) shutdown(r6, 0x0) shutdown(r4, 0x0) [ 255.051568][ T8980] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 255.064639][ T8980] BPF: [ 255.067975][ T8980] BPF:Member exceeds struct_size [ 255.075885][ T8980] BPF: [ 255.075885][ T8980] 13:41:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/104, 0x68}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000600)=[{&(0x7f0000000540)=""/143, 0x8f}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f0000000000)=[{&(0x7f0000000200)=""/221, 0xdd}], 0x1) recvfrom$inet(r6, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00515) shutdown(r5, 0x0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r7, &(0x7f00000001c0)={0x10, 0x2}, 0x10) shutdown(r6, 0x0) shutdown(r4, 0x0) 13:41:19 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 255.163934][ T8991] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 255.178796][ T8991] BPF: [ 255.185093][ T8991] BPF:Member exceeds struct_size [ 255.203102][ T8991] BPF: [ 255.203102][ T8991] [ 255.282981][ T9004] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 255.297719][ T9004] BPF: [ 255.301192][ T9004] BPF:Member exceeds struct_size [ 255.306494][ T9004] BPF: [ 255.306494][ T9004] 13:41:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000016c0)=ANY=[@ANYRES32=0x0], &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000040)={r3}, 0x8) 13:41:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/104, 0x68}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000600)=[{&(0x7f0000000540)=""/143, 0x8f}, {0x0}, {0x0}, {0x0}], 0x4) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f0000000000)=[{&(0x7f0000000200)=""/221, 0xdd}, {0x0}], 0x2) recvfrom$inet(r6, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00515) shutdown(r5, 0x0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r7, &(0x7f00000001c0)={0x10, 0x2}, 0x10) shutdown(r6, 0x0) shutdown(r4, 0x0) 13:41:20 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:20 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 255.885362][ T9033] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 255.906517][ T9033] BPF: [ 255.913919][ T9033] BPF:Member exceeds struct_size [ 255.930528][ T9033] BPF: [ 255.930528][ T9033] 13:41:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/104, 0x68}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000600)=[{&(0x7f0000000540)=""/143, 0x8f}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000440)=""/208, 0xd0}, {&(0x7f00000000c0)=""/119}, {&(0x7f0000000180)=""/55}, {&(0x7f0000000400)=""/46}], 0x37) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f0000000000)=[{&(0x7f0000000200)=""/221, 0xdd}], 0x1) recvfrom$inet(r6, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00515) shutdown(r5, 0x0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r7, &(0x7f00000001c0)={0x10, 0x2}, 0x10) shutdown(r6, 0x0) shutdown(r4, 0x0) 13:41:20 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x100) 13:41:20 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f0000000040), 0x7) 13:41:20 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 256.023272][ T9047] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 256.044098][ T9047] BPF: [ 256.052886][ T9047] BPF:Member exceeds struct_size [ 256.064810][ T9047] BPF: [ 256.064810][ T9047] 13:41:20 executing program 4: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)=""/102378, 0x18fea}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000034580)=[{&(0x7f0000019480)=""/102376, 0x18fe8}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00536) shutdown(r2, 0x0) shutdown(r3, 0x0) [ 256.160059][ T9059] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 256.190480][ T9059] BPF: [ 256.201140][ T9059] BPF:Member exceeds struct_size 13:41:20 executing program 5: r0 = socket$inet_sctp(0x2, 0x4000000000000005, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f0000000000)={r3}, 0x8) 13:41:20 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 256.220737][ T9059] BPF: [ 256.220737][ T9059] 13:41:21 executing program 3: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)=""/102378, 0x18fea}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000034580)=[{&(0x7f0000019480)=""/102376, 0x18fe8}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00536) shutdown(r2, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) shutdown(r3, 0x0) 13:41:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 256.371168][ T9082] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 256.379885][ T9082] BPF: [ 256.386040][ T9082] BPF:Member exceeds struct_size [ 256.396751][ T9082] BPF: [ 256.396751][ T9082] [ 256.521514][ T9099] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 256.530609][ T9099] BPF: [ 256.533584][ T9099] BPF:Member exceeds struct_size [ 256.540742][ T9099] BPF: [ 256.540742][ T9099] 13:41:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/204, 0xcc}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000000580)=[{&(0x7f0000000040)=""/33, 0x21}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xbfa8, 0x0, 0x0, 0x800e0053e) shutdown(r1, 0x0) r3 = socket(0x2, 0x5, 0x0) recvfrom$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 13:41:21 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@init={0x14}], 0x14}, 0x0) 13:41:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0xf, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) dup2(r1, r0) 13:41:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/104, 0x68}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000200)=""/221, 0xdd}], 0x1) recvfrom$inet(r3, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00515) shutdown(r2, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r4, &(0x7f00000001c0)={0x10, 0x2}, 0x10) shutdown(r3, 0x0) [ 256.915786][ T9111] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 256.938890][ T9111] BPF: [ 256.941706][ T9111] BPF:Member exceeds struct_size [ 256.946652][ T9111] BPF: [ 256.946652][ T9111] 13:41:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x4000000000000005, 0x84) connect(r0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 13:41:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 257.121102][ T9127] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 257.135225][ T9127] BPF: [ 257.143035][ T9127] BPF:Member exceeds struct_size [ 257.148396][ T9127] BPF: [ 257.148396][ T9127] 13:41:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/212, 0xd4}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000009c0)=""/180, 0xb4}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x615, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) shutdown(0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x712, 0x0) flock(r3, 0x40000003) shutdown(r2, 0x0) 13:41:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000040), 0x4) 13:41:21 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:22 executing program 3: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)=""/102378, 0x18fea}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000034580)=[{&(0x7f0000019480)=""/102376, 0x18fe8}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00536) shutdown(r2, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) shutdown(r3, 0x0) 13:41:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) [ 257.294645][ T9137] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 257.325536][ T9137] BPF: [ 257.333376][ T9137] BPF:Member exceeds struct_size [ 257.356601][ T9137] BPF: [ 257.356601][ T9137] 13:41:22 executing program 1: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)=""/102378, 0x18fea}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000034580)=[{&(0x7f0000019480)=""/102376, 0x18fe8}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00511) shutdown(r2, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) shutdown(r3, 0x0) 13:41:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/212, 0xd4}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000080)=""/163, 0xa3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) ppoll(&(0x7f0000000180)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 13:41:22 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:22 executing program 5: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)=""/102378, 0x18fea}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000034580)=[{&(0x7f0000019480)=""/102376, 0x18fe8}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00536) shutdown(r2, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) shutdown(r3, 0x0) [ 257.981514][ T9169] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 257.995012][ T9169] BPF: [ 258.000800][ T9169] BPF:Member exceeds struct_size [ 258.006301][ T9169] BPF: [ 258.006301][ T9169] 13:41:22 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:22 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 258.093735][ T9181] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 258.102257][ T9181] BPF: [ 258.105163][ T9181] BPF:Member exceeds struct_size [ 258.110858][ T9181] BPF: [ 258.110858][ T9181] [ 258.155947][ T9192] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 258.178357][ T9192] BPF: [ 258.192218][ T9192] BPF:Member exceeds struct_size 13:41:22 executing program 4: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)=""/102378, 0x18fea}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000034580)=[{&(0x7f0000019480)=""/102354, 0x18fd2}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x150028b814a5120a) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00536) shutdown(r2, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) shutdown(r3, 0x0) 13:41:22 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 258.205221][ T9192] BPF: [ 258.205221][ T9192] 13:41:23 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 258.240571][ T9198] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 258.248338][ T9198] BPF: [ 258.251282][ T9198] BPF:Member exceeds struct_size [ 258.256394][ T9198] BPF: [ 258.256394][ T9198] 13:41:23 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 258.312023][ T9203] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 258.319409][ T9203] BPF: [ 258.322527][ T9203] BPF:Member exceeds struct_size [ 258.328274][ T9203] BPF: [ 258.328274][ T9203] 13:41:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x8000a100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0x40000000015, 0x5, 0x0) bind$l2tp6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x2}, 0x20) [ 258.399827][ T9211] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 258.408993][ T9211] BPF: [ 258.431586][ T9211] BPF:Member exceeds struct_size [ 258.446953][ T9211] BPF: [ 258.446953][ T9211] 13:41:23 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 258.514044][ T9217] RDS: rds_bind could not find a transport for fe80::bb, load rds_tcp or rds_rdma? [ 258.535749][ T9220] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 258.561459][ T9220] BPF: [ 258.565349][ T9220] BPF:Member exceeds struct_size [ 258.570846][ T9220] BPF: [ 258.570846][ T9220] 13:41:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/212, 0xd4}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000080)=""/163, 0xa3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xb}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 13:41:23 executing program 3: unshare(0x40600) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000180)={0x8, 0x1, 0x0, 0xffffffffffffffff}) r2 = dup(r1) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000100)=0x7) 13:41:23 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 258.905865][ T9233] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 258.913774][ T9233] BPF: [ 258.916787][ T9233] BPF:Member exceeds struct_size [ 258.922342][ T9233] BPF: [ 258.922342][ T9233] 13:41:23 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@init={0x14}, @prinfo={0x14}], 0x28}, 0x0) 13:41:23 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, @in, 0x7fffffff, 0x0, 0x209}, 0x98) 13:41:23 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 259.036458][ T9245] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 259.045311][ T9245] BPF: [ 259.058052][ T9245] BPF:Member exceeds struct_size [ 259.066208][ T9245] BPF: [ 259.066208][ T9245] 13:41:23 executing program 4: 13:41:23 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, &(0x7f0000000480)="a3", 0x1, 0x0, &(0x7f0000000140)=@in={0x10, 0x2}, 0x10) 13:41:23 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:23 executing program 0: 13:41:23 executing program 5: 13:41:24 executing program 0: [ 259.343338][ T9266] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 259.367713][ T9266] BPF: [ 259.375206][ T9266] BPF:Member exceeds struct_size [ 259.402877][ T9266] BPF: [ 259.402877][ T9266] 13:41:24 executing program 1: 13:41:24 executing program 5: 13:41:24 executing program 4: 13:41:24 executing program 3: 13:41:24 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:24 executing program 0: 13:41:24 executing program 3: 13:41:24 executing program 5: 13:41:24 executing program 4: 13:41:24 executing program 0: [ 259.965714][ T9287] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 259.994216][ T9287] BPF: [ 260.003041][ T9287] BPF:Member exceeds struct_size 13:41:24 executing program 1: [ 260.024766][ T9287] BPF: [ 260.024766][ T9287] 13:41:24 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 13:41:24 executing program 3: 13:41:24 executing program 5: 13:41:24 executing program 4: 13:41:24 executing program 0: 13:41:24 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 13:41:24 executing program 1: 13:41:24 executing program 3: 13:41:24 executing program 4: 13:41:24 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 13:41:25 executing program 5: 13:41:25 executing program 0: 13:41:25 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000004600)=""/200, 0x0, 0xc8, 0x8}, 0x20) 13:41:25 executing program 3: 13:41:25 executing program 1: 13:41:25 executing program 4: 13:41:25 executing program 5: 13:41:25 executing program 0: 13:41:25 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000004600)=""/200, 0x0, 0xc8, 0x8}, 0x20) [ 260.461946][ T9318] BPF:hdr_len not found 13:41:25 executing program 3: 13:41:25 executing program 4: 13:41:25 executing program 1: 13:41:25 executing program 5: 13:41:25 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000004600)=""/200, 0x0, 0xc8, 0x8}, 0x20) 13:41:25 executing program 0: [ 260.590079][ T9327] BPF:hdr_len not found 13:41:25 executing program 5: 13:41:25 executing program 1: 13:41:25 executing program 3: 13:41:25 executing program 4: 13:41:25 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000004600)=""/200, 0x32, 0xc8, 0x8}, 0x20) [ 260.707494][ T9333] BPF:hdr_len not found 13:41:25 executing program 0: 13:41:25 executing program 5: 13:41:25 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000004600)=""/200, 0x32, 0xc8, 0x8}, 0x20) 13:41:25 executing program 1: 13:41:25 executing program 3: 13:41:25 executing program 4: 13:41:25 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f0000004600)=""/200, 0x32, 0xc8, 0x8}, 0x20) 13:41:25 executing program 5: 13:41:25 executing program 3: 13:41:25 executing program 1: 13:41:25 executing program 0: 13:41:25 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0x10}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x7}]}, 0x2c}}, 0x0) 13:41:25 executing program 1: 13:41:25 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x6c, 0x2, 0x6, 0x9, 0x0, 0xf, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8}}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_NETMASK={0x5}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x6c}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x450142, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0xffff}, 0x16, 0x1) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000100)="aedac7c6d2e063d39d374b926577f3b9170d8b6cfa114eea3bb21281817555926ce291164df5a79b8e25aa6c91aa0863ebb5fdb25c9b8c49f18df1b331137e261cb78364a23f4572a86fc8a82e781e99c193f0231c912f91aec0e48a21562fd8fafc72c6df39621800355524fffa3a7baba3be30bed0a4ebc2e9530b23b4d2ffe57a0d513ab4e6c770c455e449988b3f3433c69fb16b7c22a147a6cc10ec8912c32f629e689136c53f73052e09bfdf9a1b", 0xb1) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000200)=""/122) chroot(&(0x7f0000000280)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000340)) r2 = socket$netlink(0x10, 0x3, 0x4) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0xd4, r3, 0x50b3d16341709a3f, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0x5, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x105}}}]}, 0xd4}}, 0x0) sendmsg$NFT_MSG_GETGEN(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x10, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x1}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000}, 0x40080) 13:41:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0xd4, r1, 0x50b3d16341709a3f, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0x5, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x105}}}]}, 0xd4}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) dup(r2) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 13:41:25 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000002c0)=ANY=[@ANYBLOB="1201000000000008081d0130400000000001090224000100005000090400010103010000092112000001220100090581030800000000a4dffdb2f1b962fbb1e8ecf922aaf9cf0635fd8f91aa951a94f635a5f767c9f37486a97f90c94a896fed835eecd2e71cf939dc2e761ef97e53bc81d3fe7174eb7e02da7797a7f112e2a5497194ceab71040b016f8040869b3aa04be299c66c8317bf9744766eddb155015469f0eab14e0ca8af75ea353c702ba0c4b62454ec0a3c19cbe8485fa02f035c14f178d648cb5c3c020bee07513453f15043d085b1"], 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0xd4, r2, 0x50b3d16341709a3f, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0x5, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x105}}}]}, 0xd4}}, 0x0) openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x410402, 0x0) r3 = socket$netlink(0x10, 0x3, 0x4) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0xd4, r4, 0x50b3d16341709a3f, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0x5, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x105}}}]}, 0xd4}}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000580)={0x0, 0x22, 0x1, {[@global]}}, 0x0}, 0x0) 13:41:25 executing program 1: [ 261.192752][ T9370] BPF: (anon) type_id=2 bits_offset=0 [ 261.226802][ T9370] BPF: 13:41:25 executing program 0: 13:41:26 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) [ 261.253038][ T9370] BPF:Member exceeds struct_size [ 261.272838][ T9370] BPF: [ 261.272838][ T9370] 13:41:26 executing program 0: 13:41:26 executing program 4: 13:41:26 executing program 1: 13:41:26 executing program 3: [ 261.410197][ T9387] BPF: (anon) type_id=2 bits_offset=0 [ 261.425901][ T9387] BPF: [ 261.442164][ T9387] BPF:Member exceeds struct_size 13:41:26 executing program 0: 13:41:26 executing program 3: [ 261.457039][ T8154] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 261.472460][ T9387] BPF: [ 261.472460][ T9387] 13:41:26 executing program 1: 13:41:26 executing program 4: [ 261.707020][ T8154] usb 6-1: Using ep0 maxpacket: 8 [ 261.850164][ T8154] usb 6-1: config 0 interface 0 altsetting 1 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 261.873030][ T8154] usb 6-1: config 0 interface 0 has no altsetting 0 [ 261.884159][ T8154] usb 6-1: New USB device found, idVendor=1d08, idProduct=3001, bcdDevice= 0.40 [ 261.896772][ T8154] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 261.913700][ T8154] usb 6-1: config 0 descriptor?? [ 262.431015][ T8154] hid-generic 0003:1D08:3001.0001: hidraw0: USB HID v0.12 Device [HID 1d08:3001] on usb-dummy_hcd.5-1/input0 [ 262.624087][ T8154] usb 6-1: USB disconnect, device number 2 [ 263.416686][ T7913] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 263.686659][ T7913] usb 6-1: Using ep0 maxpacket: 8 [ 263.807645][ T7913] usb 6-1: config 0 interface 0 altsetting 1 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 263.818584][ T7913] usb 6-1: config 0 interface 0 has no altsetting 0 [ 263.825203][ T7913] usb 6-1: New USB device found, idVendor=1d08, idProduct=3001, bcdDevice= 0.40 [ 263.835714][ T7913] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 263.848329][ T7913] usb 6-1: config 0 descriptor?? 13:41:28 executing program 5: 13:41:28 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/200, 0x4a, 0xc8, 0x8}, 0x20) 13:41:28 executing program 0: 13:41:28 executing program 3: 13:41:28 executing program 4: 13:41:28 executing program 1: 13:41:29 executing program 1: 13:41:29 executing program 4: [ 264.232337][ T9450] BPF: (anon) type_id=2 bits_offset=0 [ 264.236586][ T7913] usbhid 6-1:0.0: can't add hid device: -71 [ 264.243842][ T7913] usbhid: probe of 6-1:0.0 failed with error -71 [ 264.270732][ T9450] BPF: 13:41:29 executing program 0: 13:41:29 executing program 3: 13:41:29 executing program 5: [ 264.291098][ T9450] BPF:Member exceeds struct_size [ 264.306002][ T7913] usb 6-1: USB disconnect, device number 3 [ 264.338806][ T9450] BPF: [ 264.338806][ T9450] 13:41:29 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x0, 0x0, 0x4, 0x1}]}}, &(0x7f0000004600)=""/200, 0x3e, 0xc8, 0x8}, 0x20) 13:41:29 executing program 0: 13:41:29 executing program 3: 13:41:29 executing program 1: 13:41:29 executing program 4: 13:41:29 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x0, 0x0, 0x4, 0x1}]}}, &(0x7f0000004600)=""/200, 0x3e, 0xc8, 0x8}, 0x20) 13:41:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000140)={0xfff, 0x8984, 0x401, 0x3, 0x9, 0x4}) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000000), &(0x7f0000000100)=0x4) syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x5a002, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000040)="eb2e90", 0x3}], 0x0, &(0x7f0000000080)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socket(0x0, 0x0, 0x0) 13:41:29 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=ANY=[@ANYBLOB="4801000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x148}}, 0x0) 13:41:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0xd4, r2, 0x50b3d16341709a3f, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0x5, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x105}}}]}, 0xd4}}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x50, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}]}, 0x50}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000003c0)={'batadv_slave_1\x00', r4}) fsopen(&(0x7f0000000080)='qnx6\x00', 0x1) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000000c0)={0x40, 0x2, 0x3}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r5, &(0x7f00000017c0), 0x3da, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$VIDIOC_DQEVENT(r5, 0x80885659, &(0x7f0000000300)={0x0, @frame_sync}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @empty}}, 0x1f, 0x4830}, &(0x7f0000000000)=0x90) sendmsg$tipc(r0, &(0x7f00000002c0)={&(0x7f00000001c0)=@nameseq={0x1e, 0x2}, 0x10, 0x0}, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) 13:41:29 executing program 1: syz_emit_ethernet(0x86, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x68, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x1b59, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x3, "020408010865390401fcffd1a50f000a6a98f31f08da2f82e70068537d4c6130", "9384bbeb3018ad591b661fe808b21b77", {"694c875dfb1be5d2a0057a62022a1564", "a329d3a73b8268129e5fa4316a5d8c69"}}}}}}}, 0x0) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) 13:41:29 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @restrict={0x0, 0x0, 0x0, 0x6, 0x1}, @struct={0x0, 0x0, 0x0, 0x4, 0x1}]}}, &(0x7f0000004600)=""/200, 0x3e, 0xc8, 0x8}, 0x20) 13:41:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004080a00418e00000004fcff", 0x58}], 0x1) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0xd4, r3, 0x50b3d16341709a3f, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0x5, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x105}}}]}, 0xd4}}, 0x0) close(r2) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000080)=""/158) [ 264.668835][ T9480] INFO: trying to register non-static key. [ 264.674686][ T9480] the code is fine but needs lockdep annotation. [ 264.681121][ T9480] turning off the locking correctness validator. [ 264.687465][ T9480] CPU: 1 PID: 9480 Comm: syz-executor.3 Not tainted 5.8.0-rc5-next-20200716-syzkaller #0 [ 264.697271][ T9480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.707431][ T9480] Call Trace: [ 264.710729][ T9480] dump_stack+0x18f/0x20d [ 264.715070][ T9480] register_lock_class+0x157d/0x1630 [ 264.720443][ T9480] ? lockdep_hardirqs_on+0x6a/0xe0 [ 264.725627][ T9480] ? _raw_spin_unlock_irqrestore+0x9b/0xe0 [ 264.731442][ T9480] ? is_dynamic_key+0x1a0/0x1a0 [ 264.736319][ T9480] ? kasan_save_stack+0x32/0x40 [ 264.741190][ T9480] __lock_acquire+0xfa/0x56e0 [ 264.745876][ T9480] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 264.751781][ T9480] ? __nla_validate_parse+0x2d4/0x21a0 [ 264.757252][ T9480] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 264.763251][ T9480] lock_acquire+0x1f1/0xad0 [ 264.767770][ T9480] ? del_timer_sync+0x75/0x270 [ 264.772552][ T9480] ? lock_release+0x8d0/0x8d0 [ 264.777363][ T9480] ? red_init+0xde/0x2e0 [ 264.781625][ T9480] ? red_init+0x191/0x2e0 [ 264.785967][ T9480] ? red_change+0x1c0/0x1c0 [ 264.790486][ T9480] ? lockdep_hardirqs_off+0x66/0xa0 [ 264.795693][ T9480] del_timer_sync+0xab/0x270 [ 264.800278][ T9480] ? del_timer_sync+0x75/0x270 [ 264.805039][ T9480] red_destroy+0x33/0x70 [ 264.809276][ T9480] ? red_offload.isra.0+0x480/0x480 [ 264.814605][ T9480] qdisc_create+0xcd9/0x12e0 [ 264.819208][ T9480] ? tc_get_qdisc+0xad0/0xad0 [ 264.823882][ T9480] ? __nla_parse+0x3d/0x4a [ 264.828278][ T9480] tc_modify_qdisc+0x4c8/0x1990 [ 264.833159][ T9480] ? rtnetlink_rcv_msg+0x3f9/0xad0 [ 264.838249][ T9480] ? qdisc_create+0x12e0/0x12e0 [ 264.843082][ T9480] ? lock_is_held_type+0xb0/0xe0 [ 264.848019][ T9480] ? qdisc_create+0x12e0/0x12e0 [ 264.852847][ T9480] rtnetlink_rcv_msg+0x44e/0xad0 [ 264.857764][ T9480] ? rtnetlink_put_metrics+0x510/0x510 [ 264.863301][ T9480] ? lock_acquire+0x1f1/0xad0 [ 264.867983][ T9480] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 264.873282][ T9480] netlink_rcv_skb+0x15a/0x430 [ 264.878030][ T9480] ? rtnetlink_put_metrics+0x510/0x510 [ 264.883465][ T9480] ? netlink_ack+0xa10/0xa10 [ 264.888036][ T9480] netlink_unicast+0x533/0x7d0 [ 264.892778][ T9480] ? netlink_attachskb+0x810/0x810 [ 264.897964][ T9480] ? _copy_from_iter_full+0x247/0x890 [ 264.903325][ T9480] ? __phys_addr+0x9a/0x110 [ 264.907806][ T9480] ? __phys_addr_symbol+0x2c/0x70 [ 264.912806][ T9480] ? __check_object_size+0x171/0x3e4 [ 264.918102][ T9480] netlink_sendmsg+0x856/0xd90 [ 264.922861][ T9480] ? netlink_unicast+0x7d0/0x7d0 [ 264.927783][ T9480] ? netlink_unicast+0x7d0/0x7d0 [ 264.932765][ T9480] sock_sendmsg+0xcf/0x120 [ 264.937162][ T9480] ____sys_sendmsg+0x6e8/0x810 [ 264.942098][ T9480] ? kernel_sendmsg+0x50/0x50 [ 264.946763][ T9480] ? do_recvmmsg+0x6d0/0x6d0 [ 264.951333][ T9480] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 264.957376][ T9480] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 264.963332][ T9480] ? __lock_acquire+0xc1e/0x56e0 [ 264.968366][ T9480] ___sys_sendmsg+0xf3/0x170 [ 264.972946][ T9480] ? sendmsg_copy_msghdr+0x160/0x160 [ 264.978219][ T9480] ? __fget_files+0x272/0x400 [ 264.982886][ T9480] ? lock_downgrade+0x820/0x820 [ 264.987730][ T9480] ? find_held_lock+0x2d/0x110 [ 264.992483][ T9480] ? __might_fault+0x11f/0x1d0 [ 264.997236][ T9480] ? __fget_files+0x294/0x400 [ 265.001893][ T9480] ? __fget_light+0xea/0x280 [ 265.006464][ T9480] __sys_sendmsg+0xe5/0x1b0 [ 265.010942][ T9480] ? __sys_sendmsg_sock+0xb0/0xb0 [ 265.015946][ T9480] ? __x64_sys_futex+0x382/0x4e0 [ 265.020860][ T9480] ? do_syscall_64+0x1c/0xe0 [ 265.025439][ T9480] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 265.031399][ T9480] do_syscall_64+0x60/0xe0 [ 265.035800][ T9480] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 265.041667][ T9480] RIP: 0033:0x45c1d9 [ 265.045552][ T9480] Code: Bad RIP value. [ 265.049596][ T9480] RSP: 002b:00007fa2874cfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 265.057999][ T9480] RAX: ffffffffffffffda RBX: 000000000002af40 RCX: 000000000045c1d9 13:41:29 executing program 1: syz_emit_ethernet(0x86, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x68, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x1b59, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x3, "020408010865390401fcffd1a50f000a6a98f31f08da2f82e70068537d4c6130", "9384bbeb3018ad591b661fe808b21b77", {"694c875dfb1be5d2a0057a62022a1564", "a329d3a73b8268129e5fa4316a5d8c69"}}}}}}}, 0x0) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) 13:41:29 executing program 1: syz_emit_ethernet(0x86, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x68, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x1b59, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x3, "020408010865390401fcffd1a50f000a6a98f31f08da2f82e70068537d4c6130", "9384bbeb3018ad591b661fe808b21b77", {"694c875dfb1be5d2a0057a62022a1564", "a329d3a73b8268129e5fa4316a5d8c69"}}}}}}}, 0x0) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) [ 265.065976][ T9480] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 265.073948][ T9480] RBP: 000000000078bf40 R08: 0000000000000000 R09: 0000000000000000 [ 265.081896][ T9480] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078bf0c [ 265.089853][ T9480] R13: 00007ffeb36beb9f R14: 00007fa2874d09c0 R15: 000000000078bf0c [ 265.124750][ T9480] ------------[ cut here ]------------ [ 265.151036][ T9477] FAT-fs (loop5): bogus number of reserved sectors 13:41:29 executing program 1: syz_emit_ethernet(0x86, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x68, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x1b59, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x3, "020408010865390401fcffd1a50f000a6a98f31f08da2f82e70068537d4c6130", "9384bbeb3018ad591b661fe808b21b77", {"694c875dfb1be5d2a0057a62022a1564", "a329d3a73b8268129e5fa4316a5d8c69"}}}}}}}, 0x0) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) [ 265.171071][ T9480] ODEBUG: assert_init not available (active state 0) object type: timer_list hint: 0x0 [ 265.190367][ T9477] FAT-fs (loop5): This looks like a DOS 1.x volume; assuming default BPB values [ 265.205375][ T9480] WARNING: CPU: 0 PID: 9480 at lib/debugobjects.c:485 debug_print_object+0x160/0x250 [ 265.266119][ T9480] Kernel panic - not syncing: panic_on_warn set ... [ 265.272760][ T9480] CPU: 0 PID: 9480 Comm: syz-executor.3 Not tainted 5.8.0-rc5-next-20200716-syzkaller #0 [ 265.282562][ T9480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.292623][ T9480] Call Trace: [ 265.295923][ T9480] dump_stack+0x18f/0x20d [ 265.300262][ T9480] panic+0x2e3/0x75c [ 265.304162][ T9480] ? __warn_printk+0xf3/0xf3 [ 265.308760][ T9480] ? __warn.cold+0x5/0x45 [ 265.313095][ T9480] ? debug_print_object+0x160/0x250 [ 265.318298][ T9480] __warn.cold+0x20/0x45 [ 265.322581][ T9480] ? debug_print_object+0x160/0x250 [ 265.327789][ T9480] report_bug+0x1bd/0x210 [ 265.332123][ T9480] handle_bug+0x38/0x90 [ 265.336274][ T9480] exc_invalid_op+0x13/0x40 [ 265.340864][ T9480] asm_exc_invalid_op+0x12/0x20 [ 265.345726][ T9480] RIP: 0010:debug_print_object+0x160/0x250 [ 265.351530][ T9480] Code: dd e0 f8 93 88 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 bf 00 00 00 48 8b 14 dd e0 f8 93 88 48 c7 c7 40 ee 93 88 e8 32 ee a7 fd <0f> 0b 83 05 b3 c4 1b 07 01 48 83 c4 20 5b 5d 41 5c 41 5d c3 48 89 [ 265.371396][ T9480] RSP: 0018:ffffc900085272e8 EFLAGS: 00010282 [ 265.377568][ T9480] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000000000 [ 265.385757][ T9480] RDX: 0000000000040000 RSI: ffffffff815d8a17 RDI: fffff520010a4e4f [ 265.393747][ T9480] RBP: 0000000000000001 R08: 0000000000000001 R09: ffff8880ae6318e7 [ 265.401899][ T9480] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff89c5edc0 [ 265.409878][ T9480] R13: ffffffff81637e60 R14: ffff88809f0ca2c8 R15: 1ffff920010a4e68 [ 265.417883][ T9480] ? calc_wheel_index+0x220/0x220 [ 265.422926][ T9480] ? vprintk_func+0x97/0x1a6 [ 265.427529][ T9480] ? debug_print_object+0x160/0x250 [ 265.432823][ T9480] debug_object_assert_init+0x1f4/0x2e0 [ 265.438383][ T9480] ? debug_object_init_on_stack+0x20/0x20 [ 265.444119][ T9480] ? trace_hardirqs_on+0x5f/0x220 [ 265.449174][ T9480] try_to_del_timer_sync+0x6d/0x110 [ 265.454382][ T9480] ? del_timer+0x110/0x110 [ 265.458809][ T9480] ? del_timer_sync+0x118/0x270 [ 265.463676][ T9480] del_timer_sync+0x192/0x270 [ 265.468368][ T9480] red_destroy+0x33/0x70 [ 265.472622][ T9480] ? red_offload.isra.0+0x480/0x480 [ 265.477821][ T9480] qdisc_create+0xcd9/0x12e0 [ 265.482424][ T9480] ? tc_get_qdisc+0xad0/0xad0 [ 265.487112][ T9480] ? __nla_parse+0x3d/0x4a [ 265.491541][ T9480] tc_modify_qdisc+0x4c8/0x1990 [ 265.496407][ T9480] ? rtnetlink_rcv_msg+0x3f9/0xad0 [ 265.501533][ T9480] ? qdisc_create+0x12e0/0x12e0 [ 265.506394][ T9480] ? lock_is_held_type+0xb0/0xe0 [ 265.511338][ T9480] ? qdisc_create+0x12e0/0x12e0 [ 265.516198][ T9480] rtnetlink_rcv_msg+0x44e/0xad0 [ 265.521150][ T9480] ? rtnetlink_put_metrics+0x510/0x510 [ 265.526620][ T9480] ? lock_acquire+0x1f1/0xad0 [ 265.531304][ T9480] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 265.536601][ T9480] netlink_rcv_skb+0x15a/0x430 [ 265.541387][ T9480] ? rtnetlink_put_metrics+0x510/0x510 [ 265.546853][ T9480] ? netlink_ack+0xa10/0xa10 [ 265.551462][ T9480] netlink_unicast+0x533/0x7d0 [ 265.556243][ T9480] ? netlink_attachskb+0x810/0x810 [ 265.561368][ T9480] ? _copy_from_iter_full+0x247/0x890 [ 265.566756][ T9480] ? __phys_addr+0x9a/0x110 [ 265.571273][ T9480] ? __phys_addr_symbol+0x2c/0x70 [ 265.576310][ T9480] ? __check_object_size+0x171/0x3e4 [ 265.581610][ T9480] netlink_sendmsg+0x856/0xd90 [ 265.586391][ T9480] ? netlink_unicast+0x7d0/0x7d0 [ 265.591343][ T9480] ? netlink_unicast+0x7d0/0x7d0 [ 265.596291][ T9480] sock_sendmsg+0xcf/0x120 [ 265.600718][ T9480] ____sys_sendmsg+0x6e8/0x810 [ 265.605583][ T9480] ? kernel_sendmsg+0x50/0x50 [ 265.610271][ T9480] ? do_recvmmsg+0x6d0/0x6d0 [ 265.614872][ T9480] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 265.620872][ T9480] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 265.626867][ T9480] ? __lock_acquire+0xc1e/0x56e0 [ 265.631820][ T9480] ___sys_sendmsg+0xf3/0x170 [ 265.636426][ T9480] ? sendmsg_copy_msghdr+0x160/0x160 [ 265.641732][ T9480] ? __fget_files+0x272/0x400 [ 265.646426][ T9480] ? lock_downgrade+0x820/0x820 [ 265.651291][ T9480] ? find_held_lock+0x2d/0x110 [ 265.656069][ T9480] ? __might_fault+0x11f/0x1d0 [ 265.660853][ T9480] ? __fget_files+0x294/0x400 [ 265.665548][ T9480] ? __fget_light+0xea/0x280 [ 265.670251][ T9480] __sys_sendmsg+0xe5/0x1b0 [ 265.674776][ T9480] ? __sys_sendmsg_sock+0xb0/0xb0 [ 265.679822][ T9480] ? __x64_sys_futex+0x382/0x4e0 [ 265.684781][ T9480] ? do_syscall_64+0x1c/0xe0 [ 265.689391][ T9480] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 265.695387][ T9480] do_syscall_64+0x60/0xe0 [ 265.699825][ T9480] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 265.705812][ T9480] RIP: 0033:0x45c1d9 [ 265.709704][ T9480] Code: Bad RIP value. 13:41:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') openat$userio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/userio\x00', 0x80000, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) ioctl$FBIOGET_VSCREENINFO(r0, 0x4600, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f0000001ff0)={0x1d, r3}, 0x10) sendmsg$can_raw(r2, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r4 = dup3(r2, r1, 0x0) sendmsg$can_raw(r4, 0x0, 0x40000) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000000)=0xfffffffffffffff7) syz_emit_ethernet(0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x191) 13:41:30 executing program 1: syz_emit_ethernet(0x86, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x68, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x1b59, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x3, "020408010865390401fcffd1a50f000a6a98f31f08da2f82e70068537d4c6130", "9384bbeb3018ad591b661fe808b21b77", {"694c875dfb1be5d2a0057a62022a1564", "a329d3a73b8268129e5fa4316a5d8c69"}}}}}}}, 0x0) [ 265.713777][ T9480] RSP: 002b:00007fa2874cfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 265.722210][ T9480] RAX: ffffffffffffffda RBX: 000000000002af40 RCX: 000000000045c1d9 [ 265.730438][ T9480] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 265.738428][ T9480] RBP: 000000000078bf40 R08: 0000000000000000 R09: 0000000000000000 [ 265.746409][ T9480] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078bf0c [ 265.754390][ T9480] R13: 00007ffeb36beb9f R14: 00007fa2874d09c0 R15: 000000000078bf0c [ 265.763691][ T9480] Kernel Offset: disabled [ 265.768015][ T9480] Rebooting in 86400 seconds..