[ 35.009983] audit: type=1800 audit(1549704534.730:27): pid=7443 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 35.031106] audit: type=1800 audit(1549704534.730:28): pid=7443 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 35.855166] audit: type=1800 audit(1549704535.630:29): pid=7443 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 35.873814] audit: type=1800 audit(1549704535.630:30): pid=7443 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.239' (ECDSA) to the list of known hosts. 2019/02/09 09:29:03 fuzzer started 2019/02/09 09:29:06 dialing manager at 10.128.0.26:33241 2019/02/09 09:29:06 syscalls: 1 2019/02/09 09:29:06 code coverage: enabled 2019/02/09 09:29:06 comparison tracing: enabled 2019/02/09 09:29:06 extra coverage: extra coverage is not supported by the kernel 2019/02/09 09:29:06 setuid sandbox: enabled 2019/02/09 09:29:06 namespace sandbox: enabled 2019/02/09 09:29:06 Android sandbox: /sys/fs/selinux/policy does not exist 2019/02/09 09:29:06 fault injection: enabled 2019/02/09 09:29:06 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/02/09 09:29:06 net packet injection: enabled 2019/02/09 09:29:06 net device setup: enabled 09:31:56 executing program 0: syzkaller login: [ 216.795669] IPVS: ftp: loaded support on port[0] = 21 09:31:56 executing program 1: [ 216.910130] chnl_net:caif_netlink_parms(): no params data found [ 217.004177] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.012139] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.020950] device bridge_slave_0 entered promiscuous mode [ 217.029308] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.037230] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.044801] device bridge_slave_1 entered promiscuous mode [ 217.059483] IPVS: ftp: loaded support on port[0] = 21 [ 217.086389] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 217.119060] bond0: Enslaving bond_slave_1 as an active interface with an up link 09:31:56 executing program 2: [ 217.142996] team0: Port device team_slave_0 added [ 217.149641] team0: Port device team_slave_1 added [ 217.248092] device hsr_slave_0 entered promiscuous mode [ 217.285655] device hsr_slave_1 entered promiscuous mode 09:31:57 executing program 3: 09:31:57 executing program 4: [ 217.523022] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.529549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.537058] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.543445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.558561] IPVS: ftp: loaded support on port[0] = 21 [ 217.565936] IPVS: ftp: loaded support on port[0] = 21 [ 217.660245] chnl_net:caif_netlink_parms(): no params data found [ 217.733256] IPVS: ftp: loaded support on port[0] = 21 09:31:57 executing program 5: [ 217.758649] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.871843] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.882265] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.889649] device bridge_slave_0 entered promiscuous mode [ 217.897233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.906893] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.913866] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.921477] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 217.947353] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.953719] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.962152] device bridge_slave_1 entered promiscuous mode [ 217.978148] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.991867] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.007128] chnl_net:caif_netlink_parms(): no params data found [ 218.019460] IPVS: ftp: loaded support on port[0] = 21 [ 218.044687] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 218.056303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.064771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.072668] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.079089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.086070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.093822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.101496] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.107852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.114793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.122469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.181435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.193372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.202548] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.230074] team0: Port device team_slave_0 added [ 218.249340] team0: Port device team_slave_1 added [ 218.254893] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.262847] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.270483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.278366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.286611] chnl_net:caif_netlink_parms(): no params data found [ 218.312328] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.320629] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.331067] device bridge_slave_0 entered promiscuous mode [ 218.340198] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.348797] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.358313] device bridge_slave_1 entered promiscuous mode [ 218.380061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.388834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.416588] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.425271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.458907] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 218.517204] device hsr_slave_0 entered promiscuous mode [ 218.575453] device hsr_slave_1 entered promiscuous mode [ 218.651277] chnl_net:caif_netlink_parms(): no params data found [ 218.660833] team0: Port device team_slave_0 added [ 218.677716] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.684141] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.691473] device bridge_slave_0 entered promiscuous mode [ 218.700896] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.708083] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.717393] device bridge_slave_1 entered promiscuous mode [ 218.739908] team0: Port device team_slave_1 added [ 218.797201] device hsr_slave_0 entered promiscuous mode [ 218.854624] device hsr_slave_1 entered promiscuous mode [ 218.931189] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.937859] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.946234] device bridge_slave_0 entered promiscuous mode [ 218.953675] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.972352] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.981242] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.987994] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.995476] device bridge_slave_1 entered promiscuous mode [ 219.002340] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.029695] team0: Port device team_slave_0 added [ 219.040305] team0: Port device team_slave_1 added [ 219.056246] chnl_net:caif_netlink_parms(): no params data found [ 219.088997] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.147263] device hsr_slave_0 entered promiscuous mode [ 219.184796] device hsr_slave_1 entered promiscuous mode [ 219.252466] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.279063] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.304884] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.311290] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.329124] device bridge_slave_0 entered promiscuous mode [ 219.342290] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.349003] bridge0: port 2(bridge_slave_1) entered disabled state 09:31:59 executing program 0: [ 219.357741] device bridge_slave_1 entered promiscuous mode 09:31:59 executing program 0: [ 219.411263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.418751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.428627] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.435687] team0: Port device team_slave_0 added [ 219.457436] 8021q: adding VLAN 0 to HW filter on device bond0 09:31:59 executing program 0: [ 219.485539] team0: Port device team_slave_1 added [ 219.491240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.506224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.523505] bridge0: port 1(bridge_slave_0) entered blocking state 09:31:59 executing program 0: [ 219.529918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.549941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.558553] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.566843] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.573199] bridge0: port 2(bridge_slave_1) entered forwarding state 09:31:59 executing program 0: [ 219.591336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.599353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.608562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.618690] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.633175] bond0: Enslaving bond_slave_1 as an active interface with an up link 09:31:59 executing program 0: 09:31:59 executing program 0: [ 219.685381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.693270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.711386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.733170] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.743273] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.757263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.764916] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.782882] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 219.795015] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 219.811774] team0: Port device team_slave_0 added [ 219.818455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.826329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.834664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.842061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.907398] device hsr_slave_0 entered promiscuous mode [ 219.974942] device hsr_slave_1 entered promiscuous mode [ 220.017617] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.028299] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.035665] team0: Port device team_slave_1 added [ 220.040762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.065227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.072085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.084187] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.109304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.117392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.125609] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.131952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.139089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.147327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.155245] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.161592] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.168772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.175815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.195890] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.217022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.232112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.242661] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.249070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.269291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.277554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.285308] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.291665] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.346173] device hsr_slave_0 entered promiscuous mode [ 220.394645] device hsr_slave_1 entered promiscuous mode [ 220.446246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.454057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 220.463939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.471876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.479555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.487561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 220.495470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.503050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.510659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.518304] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.541234] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.548407] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.556149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.563728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.571422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 220.579020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.588324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.597907] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 220.608583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.621191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.629306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.636901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 220.645254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.652631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.660749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.671622] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.689514] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.705116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.711987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.719371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.728408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.736881] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.743210] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.758105] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.772195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.798087] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.810854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.820059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.827853] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.834187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.841649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.849625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:32:00 executing program 1: 09:32:00 executing program 0: [ 220.867680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.879240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.895891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.910237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.924235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 220.937780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.956948] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.986386] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.998472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 221.011568] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 09:32:00 executing program 3: [ 221.033020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 221.048566] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.062508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.080255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.121327] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 221.133719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.150672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.159133] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.165499] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.173481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.181357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.188973] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.195345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.202108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.211466] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.218520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.250989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.259525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.271207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.279659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.287567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.295249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.302539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 221.310095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.319274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 221.327295] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 09:32:01 executing program 4: [ 221.360227] 8021q: adding VLAN 0 to HW filter on device batadv0 09:32:01 executing program 5: 09:32:01 executing program 2: 09:32:01 executing program 0: 09:32:01 executing program 1: 09:32:01 executing program 3: 09:32:01 executing program 4: 09:32:01 executing program 2: 09:32:01 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) connect(r0, &(0x7f00000001c0)=@in={0x2, 0x0, @local}, 0x80) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0xc201, 0x0) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x30000) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:setfiles_exec_t:s0\x00', 0x25, 0x1) 09:32:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000280)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x6a, 0xa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000000)=""/195}, 0x48) r0 = shmget$private(0x0, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) 09:32:01 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trist\xe3cpsgrVid:De', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000240)=r1) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x18, 0x18, {0x1, @bearer=@l2={'ib', 0x3a, 'team_slave_0\x00'}}}}, ["", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) openat$md(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/md0\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000001c0), &(0x7f0000000200)=0x4) bind$alg(r3, &(0x7f000016b000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0000000e6000200000001000400", 0x20) 09:32:01 executing program 5: socketpair$unix(0x1, 0x80000000000005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x100, 0xffffffffffefffff}, {0x6, 0x0, 0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101082, 0x0) r3 = semget$private(0x0, 0x8, 0x184) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000240)={r4, 0xf2, "099651157f97346bac2bcf5a066d965bfc22275fcf01107c09abee4cd23f414e230debc2490753ff949db75022f1bf1dbf6e1da10af2e5dcfc023c2baab29b290a5cb1089458b1b063fee3191e1f849ec72739167466715c9518eed905d728dcfaac03311d7f57f003620fe4b5151ee700c9392762ca95774936b7075bcb43557c52a85fdbdd5fcf8bcce44513c6e20cf2d5dac790c37ad85730e86ccd1e93d204e93b4d01738e1bafda5f70ad90d633b457775607ab4917c171d66b5454b52bccbbe78bf03bf589fc70451e84f41eeb0c62bf4c5fb0d5ffd51748ed48b2f5a735b3608a5376540b915e0b05f8cc27e61637"}, &(0x7f0000000180)=0xfa) semctl$GETNCNT(r3, 0x2, 0xe, &(0x7f0000000140)=""/60) fallocate(r1, 0x20, 0x8, 0xffffffffffff0e15) 09:32:01 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x200000) syz_open_dev$amidi(&(0x7f0000009100)='/dev/amidi#\x00', 0x9, 0x400) sendmmsg(r0, &(0x7f000000a6c0)=[{{&(0x7f0000007000)=@in, 0x80, 0x0}}, {{&(0x7f0000008880)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4}, [@default, @null, @null, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x80, &(0x7f0000008980)=[{0x0}], 0x1}}, {{&(0x7f0000009140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @multicast2}, 0x0, 0x3, 0x2}}, 0x80, 0x0}}], 0x3, 0x4080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "140c657b771cd2b11e112b3c71d81438"}, 0x11, 0x2) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @link_local}, 0x10) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42c02) socket$kcm(0x29, 0x5, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) 09:32:01 executing program 2: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x1000, 0x50002) r0 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x80000000, 0x0, "af5d22ff34172dea13e977ede5b07358febda7af5e8f9d501dcdffbea8eac97a"}) 09:32:01 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000042ff8)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r1, 0x400, 0x0) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000080)) rt_sigprocmask(0x0, &(0x7f0000da1000)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000061000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) truncate(&(0x7f0000000040)='./file0\x00', 0x0) truncate(&(0x7f0000373000)='./file0\x00', 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000000)={0x5, 0x9, 0x1, 0xfffffffffffffffe, 0x5}) close(r0) ioctl(0xffffffffffffffff, 0x0, 0x0) [ 221.762272] hrtimer: interrupt took 44378 ns 09:32:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000000080)=@ll, 0x80, &(0x7f0000000680)}}, {{&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/113, 0x7ffff000}], 0x1, &(0x7f0000000300)=""/73, 0xfffffe71}}], 0x2, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000600)={'filter\x00', 0x7, 0x4, 0x460, 0x120, 0x120, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000100), {[{{@uncond, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x80, 0x6, 0x120000000000000, 0x3}}}, {{@arp={@multicast2, @multicast2, 0xffffffff, 0x0, @empty, {[0x0, 0xff]}, @empty, {[0x0, 0x0, 0x0, 0x0, 0xff, 0xff]}, 0x2, 0x1ff00000000, 0x8, 0x3, 0x0, 0x400, 'ip6gretap0\x00', 'team_slave_1\x00', {0xff}, {0xff}, 0x0, 0x200}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @broadcast, @dev={0xac, 0x14, 0x14, 0x1d}, 0xf}}}, {{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x41b6}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4b0) 09:32:01 executing program 3: chroot(&(0x7f0000000080)='./file0\x00') r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000cfd000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x3, 0x0) socket$unix(0x1, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000440), &(0x7f0000000480)=0x4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) getpeername$llc(r0, &(0x7f0000000200)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000240)=0x10) timer_create(0x0, 0x0, &(0x7f00000001c0)) timer_create(0x0, 0x0, &(0x7f0000000640)) timer_create(0x0, 0x0, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f00000002c0)="5e58fd1427c2c0632fe89e8807f0a9a80576e0e739f297a6169162b5554fdb9781867db2cd086990714591ed969885996a8d97ed38b035898861ce76d702f0329858504bb2407feca09c6f1729be57c3ff7380b805446a02916837d06b5e491a985da54349f321c2794a9fa1ed9c792b93c1fc554bf5621f43ee9d4935f457b52abdf59ff2d60b9b5930baa433bd1e90ed7c4d9e1c2a37a8fe5e1d7924005132d5d75c8310d9f0812ce8e685c302c3", 0xaf) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000001b40)={0x1, 0x0, {0x0, 0x0, 0x301f, 0x0, 0xc, 0x6, 0x0, 0x6}}) timer_create(0x4, &(0x7f0000000140)={0x0, 0x29, 0x0, @thr={0x0, 0x0}}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000180)={'gretap0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) get_thread_area(&(0x7f0000001b00)={0x2, 0x20001000, 0x2400, 0x8, 0x7ff, 0x1, 0x1, 0x7, 0x4, 0xffffffffffff7fff}) getpgid(0x0) symlinkat(&(0x7f0000000380)='./file0\x00', r0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000500)={0x5, 0x1}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) setpgid(0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000019c0)={@initdev, @broadcast, 0x0}, &(0x7f0000001a00)=0xc) setsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f0000000400)=0x9, 0x4) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001a40)={@dev={0xfe, 0x80, [], 0xf}, 0x52, r2}) 09:32:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x0, 0x0, @local, 0x1}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0xfffffffffffffffc, 0x9, 0x0, 0x7a1, 0x20]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x0, 0x7]}, 0x5c) writev(r0, &(0x7f00007af000)=[{&(0x7f0000000200)="480000001400190220ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x80) ioctl$TCXONC(r2, 0x540a, 0x6) setsockopt$inet6_dccp_buf(r2, 0x21, 0x2, &(0x7f0000000040)="158d2dc0d8de3772731249ee3deaacdfe132cb477d2697dcf5c1c1280df6e3b918b2b721f7", 0x25) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000280)=""/4096) sendto$llc(r2, &(0x7f0000000100)="df0aaad169373396501eee3ac681ce33b8ac81e213ba71c0ee2d48de292998117e4e726d6cbe238fc6d04a2ad6d4198f49985f3ab2574f5e11afcb93bca89a9f07d714e25d5a481a1413d53bc69303d1b9dd82d6176d673cdd0c053c576298e3fddc097ba09bb80bcb210facf4527bb1d2d5ac4f51f83de6bfbde010", 0x7c, 0x0, &(0x7f00000001c0)={0x1a, 0x33b, 0x1307, 0x8, 0x3, 0x8001, @remote}, 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x8, 0x401, 0x3ff}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000014c0)=ANY=[@ANYRES32=r3, @ANYBLOB="ac0000006546ba5f591c588d64ea47cabbf1542c09d4f8db7ae17a9062c088318a373c7deb3657faeaea3257b76c39be5377085aee5275ad000447ab2c385f0052a689450d0566ebfb34c5393f726be1063b92934f524a9e6a9e2b4b10edb2080cfd0e259a0130310955dfc3dad121eb4b4b4dc3f8c2e20a15623d4e1dd50e09ffc2e2eb0a7402da7b4e6e9626ca81e241ebf8009e1274c64445d1114d61345dcf5db3b6d2227769399549ac598deca7b6403e75ea1b68dc00"], &(0x7f0000001480)=0xb4) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000001380)={&(0x7f0000001280)=""/206, 0x16000, 0x1800}, 0x18) 09:32:01 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trist\xe3cpsgrVid:De', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000240)=r1) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x18, 0x18, {0x1, @bearer=@l2={'ib', 0x3a, 'team_slave_0\x00'}}}}, ["", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) openat$md(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/md0\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000001c0), &(0x7f0000000200)=0x4) bind$alg(r3, &(0x7f000016b000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0000000e6000200000001000400", 0x20) 09:32:01 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x200000) syz_open_dev$amidi(&(0x7f0000009100)='/dev/amidi#\x00', 0x9, 0x400) sendmmsg(r0, &(0x7f000000a6c0)=[{{&(0x7f0000007000)=@in, 0x80, 0x0}}, {{&(0x7f0000008880)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4}, [@default, @null, @null, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x80, &(0x7f0000008980)=[{0x0}], 0x1}}, {{&(0x7f0000009140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @multicast2}, 0x0, 0x3, 0x2}}, 0x80, 0x0}}], 0x3, 0x4080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "140c657b771cd2b11e112b3c71d81438"}, 0x11, 0x2) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @link_local}, 0x10) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42c02) socket$kcm(0x29, 0x5, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) 09:32:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x0, 0x0, @local, 0x1}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0xfffffffffffffffc, 0x9, 0x0, 0x7a1, 0x20]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x0, 0x7]}, 0x5c) writev(r0, &(0x7f00007af000)=[{&(0x7f0000000200)="480000001400190220ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x80) ioctl$TCXONC(r2, 0x540a, 0x6) setsockopt$inet6_dccp_buf(r2, 0x21, 0x2, &(0x7f0000000040)="158d2dc0d8de3772731249ee3deaacdfe132cb477d2697dcf5c1c1280df6e3b918b2b721f7", 0x25) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000280)=""/4096) sendto$llc(r2, &(0x7f0000000100)="df0aaad169373396501eee3ac681ce33b8ac81e213ba71c0ee2d48de292998117e4e726d6cbe238fc6d04a2ad6d4198f49985f3ab2574f5e11afcb93bca89a9f07d714e25d5a481a1413d53bc69303d1b9dd82d6176d673cdd0c053c576298e3fddc097ba09bb80bcb210facf4527bb1d2d5ac4f51f83de6bfbde010", 0x7c, 0x0, &(0x7f00000001c0)={0x1a, 0x33b, 0x1307, 0x8, 0x3, 0x8001, @remote}, 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x8, 0x401, 0x3ff}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000014c0)=ANY=[@ANYRES32=r3, @ANYBLOB="ac0000006546ba5f591c588d64ea47cabbf1542c09d4f8db7ae17a9062c088318a373c7deb3657faeaea3257b76c39be5377085aee5275ad000447ab2c385f0052a689450d0566ebfb34c5393f726be1063b92934f524a9e6a9e2b4b10edb2080cfd0e259a0130310955dfc3dad121eb4b4b4dc3f8c2e20a15623d4e1dd50e09ffc2e2eb0a7402da7b4e6e9626ca81e241ebf8009e1274c64445d1114d61345dcf5db3b6d2227769399549ac598deca7b6403e75ea1b68dc00"], &(0x7f0000001480)=0xb4) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000001380)={&(0x7f0000001280)=""/206, 0x16000, 0x1800}, 0x18) 09:32:02 executing program 0: socket$kcm(0xa, 0x2, 0x73) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000000)=""/60) getrandom(&(0x7f0000000200)=""/103, 0x67, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) flistxattr(0xffffffffffffffff, &(0x7f0000000100)=""/223, 0xdf) 09:32:02 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000440)=ANY=[@ANYBLOB]) r1 = perf_event_open(&(0x7f0000000180)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@sha1={0x1, "b25f21eb46bfa3c08adccab4fb3f2c0547e4d8cb"}, 0x15, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 09:32:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000022c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x9d) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) ioprio_set$pid(0x2, r2, 0x3) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x101000, 0x0) socket$caif_stream(0x25, 0x1, 0x2) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000240)=""/235, 0xeb}, {&(0x7f0000000340)=""/206, 0xce}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/64, 0x40}], 0x4, &(0x7f0000002300)=""/4096, 0x1000}, 0x100) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000180)=0x0) sched_setscheduler(r4, 0x0, &(0x7f0000000040)=0x95d) 09:32:02 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x2040) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x8a53}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000080)={0x5, r1}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x7fffffff, 0x3f, 0x7, 0x4, 0xffffffffffffff9c, 0x800}, 0x2c) dup3(r2, 0xffffffffffffffff, 0x0) 09:32:02 executing program 3: chroot(&(0x7f0000000080)='./file0\x00') r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000cfd000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x3, 0x0) socket$unix(0x1, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000440), &(0x7f0000000480)=0x4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) getpeername$llc(r0, &(0x7f0000000200)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000240)=0x10) timer_create(0x0, 0x0, &(0x7f00000001c0)) timer_create(0x0, 0x0, &(0x7f0000000640)) timer_create(0x0, 0x0, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f00000002c0)="5e58fd1427c2c0632fe89e8807f0a9a80576e0e739f297a6169162b5554fdb9781867db2cd086990714591ed969885996a8d97ed38b035898861ce76d702f0329858504bb2407feca09c6f1729be57c3ff7380b805446a02916837d06b5e491a985da54349f321c2794a9fa1ed9c792b93c1fc554bf5621f43ee9d4935f457b52abdf59ff2d60b9b5930baa433bd1e90ed7c4d9e1c2a37a8fe5e1d7924005132d5d75c8310d9f0812ce8e685c302c3", 0xaf) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000001b40)={0x1, 0x0, {0x0, 0x0, 0x301f, 0x0, 0xc, 0x6, 0x0, 0x6}}) timer_create(0x4, &(0x7f0000000140)={0x0, 0x29, 0x0, @thr={0x0, 0x0}}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000180)={'gretap0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) get_thread_area(&(0x7f0000001b00)={0x2, 0x20001000, 0x2400, 0x8, 0x7ff, 0x1, 0x1, 0x7, 0x4, 0xffffffffffff7fff}) getpgid(0x0) symlinkat(&(0x7f0000000380)='./file0\x00', r0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000500)={0x5, 0x1}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) setpgid(0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000019c0)={@initdev, @broadcast, 0x0}, &(0x7f0000001a00)=0xc) setsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f0000000400)=0x9, 0x4) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001a40)={@dev={0xfe, 0x80, [], 0xf}, 0x52, r2}) [ 222.690523] audit: type=1804 audit(1549704722.460:31): pid=7728 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir413915237/syzkaller.if9vDV/4/file0" dev="sda1" ino=16547 res=1 09:32:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000100)={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x3, 0x8, 0xffffffffffffffe0, 0x6, r1}, &(0x7f00000001c0)=0x10) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) r2 = creat(&(0x7f0000000400)='./file0\x00', 0x0) io_setup(0x3, &(0x7f0000000280)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x2) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2711}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r4 = getuid() ioprio_get$uid(0x3, r4) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f00000002c0)=""/155) r5 = getegid() chown(&(0x7f0000000000)='./file0\x00', 0x0, r5) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000180)={0x0, 0x1}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='1.7.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030303030302c72713fae45766ea883d630303030303030303030342c73713d3078303030303030303033663030303030302c73713d30783030300a3030303030303030303030302c72713d30783030303030303030303030000000000000000061636b6673726f6f743d2f6578650000c10000000000e9ff0700000000"]) fcntl$getown(r3, 0x9) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x930b}) syz_open_pts(0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000640)) 09:32:02 executing program 2: chroot(&(0x7f0000000080)='./file0\x00') r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000cfd000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x3, 0x0) socket$unix(0x1, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000440), &(0x7f0000000480)=0x4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) getpeername$llc(r0, &(0x7f0000000200)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000240)=0x10) timer_create(0x0, 0x0, &(0x7f00000001c0)) timer_create(0x0, 0x0, &(0x7f0000000640)) timer_create(0x0, 0x0, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f00000002c0)="5e58fd1427c2c0632fe89e8807f0a9a80576e0e739f297a6169162b5554fdb9781867db2cd086990714591ed969885996a8d97ed38b035898861ce76d702f0329858504bb2407feca09c6f1729be57c3ff7380b805446a02916837d06b5e491a985da54349f321c2794a9fa1ed9c792b93c1fc554bf5621f43ee9d4935f457b52abdf59ff2d60b9b5930baa433bd1e90ed7c4d9e1c2a37a8fe5e1d7924005132d5d75c8310d9f0812ce8e685c302c3", 0xaf) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000001b40)={0x1, 0x0, {0x0, 0x0, 0x301f, 0x0, 0xc, 0x6, 0x0, 0x6}}) timer_create(0x4, &(0x7f0000000140)={0x0, 0x29, 0x0, @thr={0x0, 0x0}}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000180)={'gretap0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) get_thread_area(&(0x7f0000001b00)={0x2, 0x20001000, 0x2400, 0x8, 0x7ff, 0x1, 0x1, 0x7, 0x4, 0xffffffffffff7fff}) getpgid(0x0) symlinkat(&(0x7f0000000380)='./file0\x00', r0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000500)={0x5, 0x1}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) setpgid(0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000019c0)={@initdev, @broadcast, 0x0}, &(0x7f0000001a00)=0xc) setsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f0000000400)=0x9, 0x4) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001a40)={@dev={0xfe, 0x80, [], 0xf}, 0x52, r2}) 09:32:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b0", 0xa4b05188b257a82d) clock_adjtime(0x2, &(0x7f0000000280)={0x5, 0x800, 0x80000001, 0x16d, 0xffffffffffffb92c, 0x7fff, 0x7, 0x0, 0x9, 0x80000001, 0x10001, 0x81, 0x5, 0xfff, 0x6, 0x3, 0x3, 0x9, 0x8, 0x1, 0x1ff, 0x156000000000, 0x40, 0x8, 0x3fffffffc0000, 0xaf57}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x200000, 0x0) sendto$x25(r2, &(0x7f0000000140)="adc0814608f3455a2cb1e545b3b37f49a4df29b2b638177d2fda412a49fa7b86058b9bc077b671ab671b21cfed0921fc8be3593199b892a7487d56ee5dfe1d0ce8eefdfac5ab041dc8aea345ec9f72e61ed8c8559ab7b7da4fd31642311a5b9b7c50dd7d8896fd59a29be590acbc8294eb89b53279f6b0b5e9ea38385a27b5b17a70b6a532dc5177ddbe6f49f0a59ce891de94406cc908b54815cbc1cb672f742cac2cea096b138961b135916449a3668df45e45d5a9f3a095ef9b449adc9fa66d52e91a51e3b763d37a2d73dad85fb704f50ef3d45980ef793c", 0xda, 0x0, &(0x7f0000000240)={0x9, @remote={[], 0x0}}, 0x12) r3 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x60) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x4, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0x10}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 09:32:02 executing program 3: chroot(&(0x7f0000000080)='./file0\x00') r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000cfd000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x3, 0x0) socket$unix(0x1, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000440), &(0x7f0000000480)=0x4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) getpeername$llc(r0, &(0x7f0000000200)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000240)=0x10) timer_create(0x0, 0x0, &(0x7f00000001c0)) timer_create(0x0, 0x0, &(0x7f0000000640)) timer_create(0x0, 0x0, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f00000002c0)="5e58fd1427c2c0632fe89e8807f0a9a80576e0e739f297a6169162b5554fdb9781867db2cd086990714591ed969885996a8d97ed38b035898861ce76d702f0329858504bb2407feca09c6f1729be57c3ff7380b805446a02916837d06b5e491a985da54349f321c2794a9fa1ed9c792b93c1fc554bf5621f43ee9d4935f457b52abdf59ff2d60b9b5930baa433bd1e90ed7c4d9e1c2a37a8fe5e1d7924005132d5d75c8310d9f0812ce8e685c302c3", 0xaf) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000001b40)={0x1, 0x0, {0x0, 0x0, 0x301f, 0x0, 0xc, 0x6, 0x0, 0x6}}) timer_create(0x4, &(0x7f0000000140)={0x0, 0x29, 0x0, @thr={0x0, 0x0}}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000180)={'gretap0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) get_thread_area(&(0x7f0000001b00)={0x2, 0x20001000, 0x2400, 0x8, 0x7ff, 0x1, 0x1, 0x7, 0x4, 0xffffffffffff7fff}) getpgid(0x0) symlinkat(&(0x7f0000000380)='./file0\x00', r0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000500)={0x5, 0x1}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) setpgid(0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000019c0)={@initdev, @broadcast, 0x0}, &(0x7f0000001a00)=0xc) setsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f0000000400)=0x9, 0x4) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001a40)={@dev={0xfe, 0x80, [], 0xf}, 0x52, r2}) 09:32:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a6c000000123f3188a0b40db6c16370b7e056ba61c2dc1bcfe332762572ffdc7a715848cc0b17b8f23ed0befb394a966d74217b5925c06e86e40f7f902b4d315b2df69599617c2cd0627cdbf64d4d0f45855b71d778d0aea7e2d57a408f1844c5fcab1d5272ac0e141cf23e8d5c2feb9239986e63fc178dcc4cae8bf55abae4fe75c4742f4074ebaf5a64f3") r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000100)={0x0, 0x1, 0x0, [], &(0x7f0000000040)={0x98f905, 0xfffffffffffffffc, [], @ptr=0x709000}}) 09:32:02 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000440)=ANY=[@ANYBLOB]) r1 = perf_event_open(&(0x7f0000000180)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@sha1={0x1, "b25f21eb46bfa3c08adccab4fb3f2c0547e4d8cb"}, 0x15, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 09:32:02 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x54c, 0x101040) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000480)=0x200, 0x4) 09:32:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x200, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() capget(&(0x7f0000000000)={0x20071026, r2}, &(0x7f0000000400)={0x0, 0x5, 0xffffffffffffff80, 0x401}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f00000006c0)={0x2}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000a40)=ANY=[@ANYBLOB="000728bd700003000000040000003800060008000100070000000400020008000100080000000800010039000000148941c6080000000400020008000100ffffffff0400020020000600080001000300000008000100a4c727d90f60c0ed7f000000040002000800010002000000fc0004002400070008000100030000000800040000000000080001001e00000008000300000100002c000700080004000300000008000300200000000800020000000100080004007f00000008000200080000000c00010073797a310000000014000700080002000600000008000400040000003c00070008000200060000000800040001040000080004000200000008000400050000000800020004000000080002000100000008000100170000004c000700080001001700000008000300080000000800040001000000080003000100000008000200070000000800020001000000080003000900000008000200c9d8000008000300040000002400090008000100ffffffff080001000700000008000200ffffff7f08000100040000001400020004004400080002000400000004000400280007000c00030002000000000000000c000400b6000000000000000c0004000200000000000000d40001002c0004001400010002004e23ac14142600000000000000001400020002004e21ac1414aa000000000000000024000200080002000700000008000200ff7f00000800010010000000080002000700000044000400200001000a004e2200005e5333b0c3adf9741bf4cb5991429f77878b09000000200002000a004e21000000003363a035b455b130952dee49f59e3ddf220e0000100001007564703a73797a32000000002c000200080001001e0000000800040018eb470000f6080004000800000008000300a1040000080001000f0000002800010024000200080001001300000008000100080000000800030006000000080003000600dde051cc84b328ece667825117662ce8dec98b35d315850b451bc87274e1712129fbf24dff25dd52c17274e1ec0763953a0f7083ca4f56ee971a054d98ab3ec177926b8b3fd7628ed565ef0ee200ac3e31f720d7dda516778ed5d42d3078cfc3fd18c5ab362d9d2339cd65e32d2ee5956df23a6975bbacd879f9dbafd02a4fc39cbdd09db95536bd546c181276209857384fcdccb9aef60f6a706a3a82be4e184f76c52a489a5f0f669538d0017defc9627f6c009e724505b80bc72211ea59b2e912d3b635ead7ba5ce95e34a13ab89ad6d903051818f259099575980701e7ef3d4bbf70674df8bfd20b1f84975632"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x1, 0x0) ioctl$IMHOLD_L1(r5, 0x80044948, &(0x7f0000000100)=0x7e) write$ppp(r5, &(0x7f0000000880)="6f8e68b232d0718912ed54de3c8ecd30d9d47d42febb041ccbdfba90cf7a9bd5e7bbfcd5a51fd148358c86454354d84f2a2e6d1f05e3727a449d03fbf82380754de2d6f285a083192352d8c82eeedbb8049f4c7a96281e8cf09da3059d06c1a62a8539fae169f6577782193e88f9baae61d740161aac40a997e03301ee1b13d4b15babc03a26d416aeeb3d6b01015e37a36cb07273bfc4cb3414c5034f3fb7fd67211a0e79b3a4d06d11ba7a4fe47d63d41c90a010aee5f8", 0xb8) ioctl$LOOP_GET_STATUS64(r5, 0x4c05, &(0x7f0000000280)) listen(r4, 0x20000000) r6 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$invalidate(0x15, r6) fcntl$setpipe(r4, 0x407, 0x7) r7 = syz_open_dev$sndpcmc(&(0x7f0000000740)='/dev/snd/pcmC#D#c\x00', 0x9, 0x1) ioctl$VIDIOC_G_PARM(r7, 0xc0cc5615, &(0x7f0000000780)={0xc, @raw_data="a7d1a0dcb5c3535c29d3e9124ba04677b8281ad5f57da5107c690fb395cb9f2e0580a382026cda4bf2ef987e7d9e6aa62cfaa9137eae189c99094a99e026517239fd9cbb009035fdc37ecaf952d7ec6f9d567e2b2e8d1e5827135dbe41da15f8d15bf6ea8b6d313197b79e3eb0473ce7a66fc8773aa57ce4f81b572ffaa5afb08caa8f6ca7bcd4cae0df293c10e14b8372526cc07c8655a1d648d7183d85075fa40617441e894c7830e91bf73186d5772c2ecef1acd4c7d43cb2a35623f136a632910a65a15e2c68"}) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) r9 = socket$inet6(0xa, 0x6, 0x0) r10 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000003c0)) sendmsg$TIPC_NL_MON_GET(r8, &(0x7f0000000a00)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x20080}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="080029bd7000fddbdf25120000001c000900080002000300000008000100040000000800010006000000100004000c00010073797a3000000000"], 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x40) lchown(&(0x7f0000000200)='./file0\x00', r10, 0x0) connect$inet6(r9, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4(r4, 0x0, &(0x7f0000000000), 0x0) 09:32:03 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40100, 0x0) write$UHID_DESTROY(r2, &(0x7f0000000140), 0x4) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r3) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000200)=ANY=[]) write$vnet(r0, &(0x7f00000004c0)={0x1, {0x0, 0x0, 0x0, 0x3, 0x2}}, 0x68) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r3}) 09:32:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3f, 0x2000) sendmsg$kcm(r1, &(0x7f0000000900)={&(0x7f0000000040)=@nfc={0x27, 0x1, 0x0, 0x1}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="b92ac1f58f687715c8d60eb45195e5d87a58fcaf76ca0610ab359098eda2b57993cd5e28a3e7cc7ad3a3cc8e62188f012f3bfb5890f3c4a7a14e7afe4f5dd394b82e2ae6153c55f71cc1f5bb03bb15112ce46c17fa931dd7def6e37cb8dd30be2757a70804cbeb5be5a1606bcae87cceb7a8f85ed7f64bdf", 0x78}, {&(0x7f0000000240)="98d8a4c57eb25e6bf9322ac2c626c32099554b8ab6a3444af0eabb93ee75abd1aaddbeebc86bbb45491b90b8af480798fb65b66b56ad932a95f9576923087c2bb8430ab558d003a1bf3a75e0f19a84be13dabbaedddce071b0bf10f6ff672d1f5dc14b22d4c728927437dac2cd", 0x6d}, {&(0x7f0000000140)="3c1f250ef66b3ab2e262f6f4a76181487b989757ee728375bf865ffd92a8fbbdc8aec8155d4c15ab88f880d3396849c57f67c69fa15e84", 0x37}, {&(0x7f00000002c0)="2b16b29be15a579cc804c88933e60c510aa72bb2f2ee98417f1870d0ec68d220293cda82b4add3bce52e8ccde54fcb513a7347bf9a2181c2362271806ada6163da0d2f95a7093d3c2a2a4a34cf429cb1c1f389ac31d36c54", 0x58}, {&(0x7f0000000340)="4cd23c74c1c0ba4b01a8536735aa6bd968397b509c25de06bc5b145987af575df7c80c377096a2d4ba42d9d26b7c08dc754d3f9deff20deabb26f814d6052d1f44a797b7a7178b7730aa55f6d522d6dfbabe61a2f663625754ad69dc5cc39d348e7e17ba03c8ac69440760eb0a1c414841d4747009bcf55b575da7f0f871198ed4d888f61de8c2f95d280a73ed42ee7f1fbf8f49bc515bef0fecf9bf55d5012445e6befee1992745de7bdefdd602eb8da218dbcf5a6063b2186de8978db195ea5b7ac25e645bdf28425850ea841707f3d22b38a3de95167cd9e9c1", 0xdb}, {&(0x7f0000000440)="5de8b78fdade34c9503b1ecd4e7316a70f9cc97d1a512c69eab964263ff7e0f1a3bd1793f8e5837d3bc72c79c03585e4fb33", 0x32}, {&(0x7f0000000480)}, {&(0x7f00000004c0)="685c9a7ca6a3c5083f23079220908cf11cfbc7b11617159cc0834164df07ca8d6e80cb9ebe92b09b3b30331c564468db4ef38b1b92c3fc53d3e5c83d056faef2f7d2a29e432e9a9ba0883e25b893cdb82a891b7547bf27e77a4179d86e017696b6221516b23da9f5e4ac04871d8f01c26b3e62f0580da663c7c722fe6e814d870ccb7689e04d", 0x86}], 0x8, &(0x7f0000000600)=[{0xe0, 0x114, 0x1f, "ffd47a04b3dd04b6967e0ed8998e72fed9a048f9d6b2b5358c13a91c2e670f4faa07bc9ca701250d5d2555590241aa8bd3e981dc067a7748ebbe03db28bf7797b16f45618faafe6317d35f0803b885e34db639b6486e20e378727d431c869abf7ddbc0e4ba2df1fea04aef2ba9eeba1b1102b59d54cc207f194cf6a460eb11474f6288f4950c09575e71cb0039dc95e833d94e370d41ee1cc543e2d7bc0327d5dcfabcdae6700076b907055c64fa245e88e7bd002f1fb805b1c72f693ef87af60578d8067408c1b97654b9abbee6"}, {0x20, 0x13a, 0x9, "de98186b7064eee81dbab2d259fa4324"}, {0x40, 0x118, 0x1, "12d4830c6ebab61699d8fe3c75cb7fb6705583557ce463752d21f597a3ddab5b981739415b1b719a46bb41de96d2e9"}, {0xa8, 0x84, 0x3, "cf9f7886c5b73fa279d62a7cd9ad037b0d18526069b5ffc12c705b26390791a7105ecb38ab715606454685d490bc61f96d864de13464e023b82443eb87fcb2d3d3e0f534f483570a8c56cf15a7b35d05a6cf53ec460a06961abc9127f85823f7e20d2039d4d2c49c94e6dc4c9be435933a1b3c57aae45b49805ed3d7be096ef2accc91212966ccbcec5f98fe04f95b3c8541239073e5"}, {0xe8, 0x10c, 0x4, "194d97c5d8742099cb81182a7c9be24a0346d6a68698fb47e56b2f0286d5e98eda6b0698360e238198b8f6e2057650878de7cf013842f71e0083e6ba4b497329650991aaa1dab9fa1a5111ddc17b3478302e57ab100deb9cd2431259b21aca1ce730fcdd57f4491093d9a136459fa4b9a7593bddda761dc5e606409d4c7a482f500219e3c8e94a037e65c72fdee6b8d1514553543f07aa45d10bf823898b273b70d10615bfe00e04291c8fd7f921140f5cef014805849e8a13a63457f42305d8b25ea910fe781af388732136086fe31727d3"}], 0x2d0}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000000200)={0x0, 0x48, &(0x7f00000001c0)={&(0x7f0000000480)={0x20, 0x3, 0x1, 0x1, 0x0, 0x0, {0x2}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0xfffffffffffffffd) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) 09:32:03 executing program 3: mknod$loop(&(0x7f0000000000)='./file1\x00', 0x6001, 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x80, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000040)={0xff49, 0x80000000000, 0x2, 0xff}) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000180)=""/169) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000000c0)={0xf, {0x6cdb, 0x8, 0x7}}) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000140)=0x40000000800) open(&(0x7f0000000100)='./file1\x00', 0x101000, 0x140) [ 223.318490] capability: warning: `syz-executor.0' uses deprecated v2 capabilities in a way that may be insecure 09:32:03 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x54c, 0x101040) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000480)=0x200, 0x4) 09:32:03 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) writev(r1, &(0x7f0000000080), 0x1a6) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2b, 0xfffffffffffffff7, 0x1fffe) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x800) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r3, &(0x7f0000000040)="e870d4a9f73facb524ebab0dc66904fa00679aa9571ed0d320d9d709287fe365be3342e24f8337bb77aca8ea4bae621d301eb6e9c2c14ed480a56b19c1949f3a7a1a2181d61f0429df22ef754bd413c157b143e42636aa18fcc038", 0x5b, 0x20004010, &(0x7f0000000140), 0x10) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r6, r7, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f00000002c0)="c4e3b50b234166b8d7008ed80f019b48beb5cd8fe810ec0feb440f20c0350a000000440f22c0b9800000c00f3235010000000f30c4e3d97ee0050f618100000000260f234bb94a0800000f32", 0x4c}], 0x1, 0x0, &(0x7f00000003c0)=[@dstype0={0x6, 0xb}], 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0xfffffffffffffffe, 0x201) memfd_create(&(0x7f0000000c40)='bridge0\x00', 0x0) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000006c0), 0xc, &(0x7f0000000540)={&(0x7f0000000740)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a00)='IPVS\x00') setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40), 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200)="0a9d0b9d6cdcd76cddcf0ddc3d0b2bd8ab9533f96c57231588f00621fe4631abb3eb4a43b5", 0x25) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x3ffffffb) 09:32:03 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() socketpair(0x1d, 0x0, 0x0, &(0x7f0000000000)) wait4(0x0, 0x0, 0x0, 0x0) 09:32:03 executing program 3: mknod$loop(&(0x7f0000000000)='./file1\x00', 0x6001, 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x80, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000040)={0xff49, 0x80000000000, 0x2, 0xff}) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000180)=""/169) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000000c0)={0xf, {0x6cdb, 0x8, 0x7}}) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000140)=0x40000000800) open(&(0x7f0000000100)='./file1\x00', 0x101000, 0x140) [ 223.504706] protocol 88fb is buggy, dev hsr_slave_0 [ 223.510284] protocol 88fb is buggy, dev hsr_slave_1 09:32:03 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x54c, 0x101040) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000480)=0x200, 0x4) [ 223.722107] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.732556] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.736559] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 223.746314] can: request_module (can-proto-0) failed. 09:32:03 executing program 3: mknod$loop(&(0x7f0000000000)='./file1\x00', 0x6001, 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x80, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000040)={0xff49, 0x80000000000, 0x2, 0xff}) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000180)=""/169) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000000c0)={0xf, {0x6cdb, 0x8, 0x7}}) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000140)=0x40000000800) open(&(0x7f0000000100)='./file1\x00', 0x101000, 0x140) [ 223.801027] can: request_module (can-proto-0) failed. 09:32:03 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000400)='/dev/dsp#\x00', 0x0, 0x1) ioctl$int_in(r1, 0x5452, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000500)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000700)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4010100}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x38, r3, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x22}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xe400}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x80) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x3) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000300)='./file0\x00', 0x3f, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000340)="0b43b3", 0x3, 0xfffffffffffffffb}], 0x80000, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x1a9) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000200)) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000000)) r5 = semget$private(0x0, 0x0, 0x6ac) semctl$GETZCNT(r5, 0x7, 0xf, &(0x7f0000000100)=""/36) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r4, 0x0, 0xa, &(0x7f0000000080)='user\x1fem1!\x00'}, 0x30) syz_open_procfs(r6, &(0x7f0000000140)='net/coftnet\x98\r.\x1bt\x00') socket$inet(0x2, 0x0, 0x0) r7 = dup(r1) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r8, 0x6, 0x1d, &(0x7f0000000040)={0xc50, 0x2, 0xffff, 0x2, 0x6fc}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80045400, &(0x7f0000000000)) [ 223.824478] protocol 88fb is buggy, dev hsr_slave_0 [ 223.829604] protocol 88fb is buggy, dev hsr_slave_1 09:32:03 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x4}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x54c, 0x101040) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000480)=0x200, 0x4) 09:32:03 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x5404, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x4000, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x400, 0x0) write$P9_RLERROR(r4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x288) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x14, &(0x7f0000000280)={@mcast1}, &(0x7f00000002c0)=0x14) mkdir(&(0x7f0000000340)='./file1\x00', 0x11) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000300)=0x800010004a, 0x4) r5 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@ax25, &(0x7f00000005c0)=0x80, 0x880000) write$P9_RREADDIR(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x143) socket$inet6_udplite(0xa, 0x2, 0x88) r6 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) socket(0x40000000216, 0x3, 0x1) setsockopt$packet_tx_ring(r5, 0x107, 0xd, 0x0, 0x2c3) geteuid() syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000440)=[{&(0x7f0000000040)="8f", 0x1}], 0x1, 0x0) unshare(0x20400) splice(r7, 0x0, r9, 0x0, 0x7ff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x10000000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$llc(r6, &(0x7f0000000380)={0x1a, 0x1, 0x5, 0x5, 0xc93, 0x8, @link_local}, 0x10) sendmmsg(r6, &(0x7f0000001380), 0x3fffff1, 0x40) [ 224.384868] protocol 88fb is buggy, dev hsr_slave_0 [ 224.390573] protocol 88fb is buggy, dev hsr_slave_1 [ 225.105025] protocol 88fb is buggy, dev hsr_slave_0 [ 225.110738] protocol 88fb is buggy, dev hsr_slave_1 [ 225.184332] protocol 88fb is buggy, dev hsr_slave_0 [ 225.189441] protocol 88fb is buggy, dev hsr_slave_1 [ 228.544524] net_ratelimit: 18 callbacks suppressed [ 228.544533] protocol 88fb is buggy, dev hsr_slave_0 [ 228.554570] protocol 88fb is buggy, dev hsr_slave_1 [ 229.264364] protocol 88fb is buggy, dev hsr_slave_0 [ 229.269466] protocol 88fb is buggy, dev hsr_slave_1 [ 229.344359] protocol 88fb is buggy, dev hsr_slave_0 [ 229.349450] protocol 88fb is buggy, dev hsr_slave_1 [ 229.424335] protocol 88fb is buggy, dev hsr_slave_0 [ 229.429415] protocol 88fb is buggy, dev hsr_slave_1 [ 229.744342] protocol 88fb is buggy, dev hsr_slave_0 [ 229.749458] protocol 88fb is buggy, dev hsr_slave_1 [ 233.584336] net_ratelimit: 20 callbacks suppressed [ 233.584344] protocol 88fb is buggy, dev hsr_slave_0 [ 233.594407] protocol 88fb is buggy, dev hsr_slave_1 [ 233.904328] protocol 88fb is buggy, dev hsr_slave_0 [ 233.909429] protocol 88fb is buggy, dev hsr_slave_1 [ 234.224335] protocol 88fb is buggy, dev hsr_slave_0 [ 234.229424] protocol 88fb is buggy, dev hsr_slave_1 [ 234.784362] protocol 88fb is buggy, dev hsr_slave_0 [ 234.789464] protocol 88fb is buggy, dev hsr_slave_1 [ 235.504372] protocol 88fb is buggy, dev hsr_slave_0 [ 235.509461] protocol 88fb is buggy, dev hsr_slave_1 [ 238.944372] net_ratelimit: 20 callbacks suppressed [ 238.944380] protocol 88fb is buggy, dev hsr_slave_0 [ 238.954440] protocol 88fb is buggy, dev hsr_slave_1 [ 239.664354] protocol 88fb is buggy, dev hsr_slave_0 [ 239.669446] protocol 88fb is buggy, dev hsr_slave_1 [ 239.744329] protocol 88fb is buggy, dev hsr_slave_0 [ 239.749415] protocol 88fb is buggy, dev hsr_slave_1 [ 239.824329] protocol 88fb is buggy, dev hsr_slave_0 [ 239.829409] protocol 88fb is buggy, dev hsr_slave_1 [ 240.144329] protocol 88fb is buggy, dev hsr_slave_0 [ 240.149428] protocol 88fb is buggy, dev hsr_slave_1 [ 243.984322] net_ratelimit: 20 callbacks suppressed [ 243.984331] protocol 88fb is buggy, dev hsr_slave_0 [ 243.994385] protocol 88fb is buggy, dev hsr_slave_1 [ 244.304339] protocol 88fb is buggy, dev hsr_slave_0 [ 244.309439] protocol 88fb is buggy, dev hsr_slave_1 [ 244.624329] protocol 88fb is buggy, dev hsr_slave_0 [ 244.629507] protocol 88fb is buggy, dev hsr_slave_1 [ 245.184349] protocol 88fb is buggy, dev hsr_slave_0 [ 245.189439] protocol 88fb is buggy, dev hsr_slave_1 [ 245.904340] protocol 88fb is buggy, dev hsr_slave_0 [ 245.909432] protocol 88fb is buggy, dev hsr_slave_1 [ 249.344356] net_ratelimit: 20 callbacks suppressed [ 249.344364] protocol 88fb is buggy, dev hsr_slave_0 [ 249.354412] protocol 88fb is buggy, dev hsr_slave_1 [ 250.064351] protocol 88fb is buggy, dev hsr_slave_0 [ 250.069448] protocol 88fb is buggy, dev hsr_slave_1 [ 250.144333] protocol 88fb is buggy, dev hsr_slave_0 [ 250.149429] protocol 88fb is buggy, dev hsr_slave_1 [ 250.224351] protocol 88fb is buggy, dev hsr_slave_0 [ 250.229443] protocol 88fb is buggy, dev hsr_slave_1 [ 250.544354] protocol 88fb is buggy, dev hsr_slave_0 [ 250.549472] protocol 88fb is buggy, dev hsr_slave_1 [ 254.384317] net_ratelimit: 20 callbacks suppressed [ 254.384326] protocol 88fb is buggy, dev hsr_slave_0 [ 254.394379] protocol 88fb is buggy, dev hsr_slave_1 [ 254.704348] protocol 88fb is buggy, dev hsr_slave_0 [ 254.709454] protocol 88fb is buggy, dev hsr_slave_1 [ 255.024333] protocol 88fb is buggy, dev hsr_slave_0 [ 255.029512] protocol 88fb is buggy, dev hsr_slave_1 [ 255.584377] protocol 88fb is buggy, dev hsr_slave_0 [ 255.589487] protocol 88fb is buggy, dev hsr_slave_1 [ 256.304348] protocol 88fb is buggy, dev hsr_slave_0 [ 256.309449] protocol 88fb is buggy, dev hsr_slave_1 [ 259.744377] net_ratelimit: 20 callbacks suppressed [ 259.744385] protocol 88fb is buggy, dev hsr_slave_0 [ 259.754509] protocol 88fb is buggy, dev hsr_slave_1 [ 260.464352] protocol 88fb is buggy, dev hsr_slave_0 [ 260.469447] protocol 88fb is buggy, dev hsr_slave_1 [ 260.544352] protocol 88fb is buggy, dev hsr_slave_0 [ 260.549441] protocol 88fb is buggy, dev hsr_slave_1 [ 260.624336] protocol 88fb is buggy, dev hsr_slave_0 [ 260.629423] protocol 88fb is buggy, dev hsr_slave_1 [ 260.944361] protocol 88fb is buggy, dev hsr_slave_0 [ 260.949457] protocol 88fb is buggy, dev hsr_slave_1 [ 264.784337] net_ratelimit: 20 callbacks suppressed [ 264.784345] protocol 88fb is buggy, dev hsr_slave_0 [ 264.794395] protocol 88fb is buggy, dev hsr_slave_1 [ 265.104364] protocol 88fb is buggy, dev hsr_slave_0 [ 265.109463] protocol 88fb is buggy, dev hsr_slave_1 [ 265.424340] protocol 88fb is buggy, dev hsr_slave_0 [ 265.429543] protocol 88fb is buggy, dev hsr_slave_1 [ 265.984375] protocol 88fb is buggy, dev hsr_slave_0 [ 265.989570] protocol 88fb is buggy, dev hsr_slave_1 [ 266.704375] protocol 88fb is buggy, dev hsr_slave_0 [ 266.709469] protocol 88fb is buggy, dev hsr_slave_1 [ 270.144414] net_ratelimit: 20 callbacks suppressed [ 270.144422] protocol 88fb is buggy, dev hsr_slave_0 [ 270.154483] protocol 88fb is buggy, dev hsr_slave_1 [ 270.864364] protocol 88fb is buggy, dev hsr_slave_0 [ 270.869457] protocol 88fb is buggy, dev hsr_slave_1 [ 270.944332] protocol 88fb is buggy, dev hsr_slave_0 [ 270.949423] protocol 88fb is buggy, dev hsr_slave_1 [ 271.024328] protocol 88fb is buggy, dev hsr_slave_0 [ 271.029406] protocol 88fb is buggy, dev hsr_slave_1 [ 271.344332] protocol 88fb is buggy, dev hsr_slave_0 [ 271.349436] protocol 88fb is buggy, dev hsr_slave_1 [ 275.184324] net_ratelimit: 20 callbacks suppressed [ 275.184332] protocol 88fb is buggy, dev hsr_slave_0 [ 275.194380] protocol 88fb is buggy, dev hsr_slave_1 [ 275.504369] protocol 88fb is buggy, dev hsr_slave_0 [ 275.509589] protocol 88fb is buggy, dev hsr_slave_1 [ 275.824339] protocol 88fb is buggy, dev hsr_slave_0 [ 275.829435] protocol 88fb is buggy, dev hsr_slave_1 [ 276.384354] protocol 88fb is buggy, dev hsr_slave_0 [ 276.389455] protocol 88fb is buggy, dev hsr_slave_1 [ 277.104360] protocol 88fb is buggy, dev hsr_slave_0 [ 277.109466] protocol 88fb is buggy, dev hsr_slave_1 [ 280.544381] net_ratelimit: 20 callbacks suppressed [ 280.544388] protocol 88fb is buggy, dev hsr_slave_0 [ 280.554447] protocol 88fb is buggy, dev hsr_slave_1 [ 281.264362] protocol 88fb is buggy, dev hsr_slave_0 [ 281.269458] protocol 88fb is buggy, dev hsr_slave_1 [ 281.344338] protocol 88fb is buggy, dev hsr_slave_0 [ 281.349426] protocol 88fb is buggy, dev hsr_slave_1 [ 281.424333] protocol 88fb is buggy, dev hsr_slave_0 [ 281.429412] protocol 88fb is buggy, dev hsr_slave_1 [ 281.744328] protocol 88fb is buggy, dev hsr_slave_0 [ 281.749439] protocol 88fb is buggy, dev hsr_slave_1 [ 285.584336] net_ratelimit: 20 callbacks suppressed [ 285.584343] protocol 88fb is buggy, dev hsr_slave_0 [ 285.594427] protocol 88fb is buggy, dev hsr_slave_1 [ 285.904331] protocol 88fb is buggy, dev hsr_slave_0 [ 285.909450] protocol 88fb is buggy, dev hsr_slave_1 [ 286.224330] protocol 88fb is buggy, dev hsr_slave_0 [ 286.229469] protocol 88fb is buggy, dev hsr_slave_1 [ 286.784795] protocol 88fb is buggy, dev hsr_slave_0 [ 286.789880] protocol 88fb is buggy, dev hsr_slave_1 [ 287.504360] protocol 88fb is buggy, dev hsr_slave_0 [ 287.509453] protocol 88fb is buggy, dev hsr_slave_1 [ 290.944355] net_ratelimit: 20 callbacks suppressed [ 290.944363] protocol 88fb is buggy, dev hsr_slave_0 [ 290.954410] protocol 88fb is buggy, dev hsr_slave_1 [ 291.664344] protocol 88fb is buggy, dev hsr_slave_0 [ 291.669441] protocol 88fb is buggy, dev hsr_slave_1 [ 291.744346] protocol 88fb is buggy, dev hsr_slave_0 [ 291.749432] protocol 88fb is buggy, dev hsr_slave_1 [ 291.824333] protocol 88fb is buggy, dev hsr_slave_0 [ 291.829409] protocol 88fb is buggy, dev hsr_slave_1 [ 292.144334] protocol 88fb is buggy, dev hsr_slave_0 [ 292.149436] protocol 88fb is buggy, dev hsr_slave_1 [ 295.984322] net_ratelimit: 20 callbacks suppressed [ 295.984330] protocol 88fb is buggy, dev hsr_slave_0 [ 295.994401] protocol 88fb is buggy, dev hsr_slave_1 [ 296.304359] protocol 88fb is buggy, dev hsr_slave_0 [ 296.309454] protocol 88fb is buggy, dev hsr_slave_1 [ 296.624327] protocol 88fb is buggy, dev hsr_slave_0 [ 296.629418] protocol 88fb is buggy, dev hsr_slave_1 [ 297.184370] protocol 88fb is buggy, dev hsr_slave_0 [ 297.189459] protocol 88fb is buggy, dev hsr_slave_1 [ 297.904353] protocol 88fb is buggy, dev hsr_slave_0 [ 297.909465] protocol 88fb is buggy, dev hsr_slave_1 [ 301.344369] net_ratelimit: 20 callbacks suppressed [ 301.344376] protocol 88fb is buggy, dev hsr_slave_0 [ 301.354431] protocol 88fb is buggy, dev hsr_slave_1 [ 302.064369] protocol 88fb is buggy, dev hsr_slave_0 [ 302.069462] protocol 88fb is buggy, dev hsr_slave_1 [ 302.144334] protocol 88fb is buggy, dev hsr_slave_0 [ 302.149415] protocol 88fb is buggy, dev hsr_slave_1 [ 302.224328] protocol 88fb is buggy, dev hsr_slave_0 [ 302.229411] protocol 88fb is buggy, dev hsr_slave_1 [ 302.544335] protocol 88fb is buggy, dev hsr_slave_0 [ 302.549430] protocol 88fb is buggy, dev hsr_slave_1 [ 306.384328] net_ratelimit: 20 callbacks suppressed [ 306.384336] protocol 88fb is buggy, dev hsr_slave_0 [ 306.394405] protocol 88fb is buggy, dev hsr_slave_1 [ 306.704343] protocol 88fb is buggy, dev hsr_slave_0 [ 306.709443] protocol 88fb is buggy, dev hsr_slave_1 [ 307.024368] protocol 88fb is buggy, dev hsr_slave_0 [ 307.029484] protocol 88fb is buggy, dev hsr_slave_1 [ 307.584375] protocol 88fb is buggy, dev hsr_slave_0 [ 307.589473] protocol 88fb is buggy, dev hsr_slave_1 [ 308.304358] protocol 88fb is buggy, dev hsr_slave_0 [ 308.309456] protocol 88fb is buggy, dev hsr_slave_1 [ 311.754453] net_ratelimit: 20 callbacks suppressed [ 311.754462] protocol 88fb is buggy, dev hsr_slave_0 [ 311.764554] protocol 88fb is buggy, dev hsr_slave_1 [ 312.464354] protocol 88fb is buggy, dev hsr_slave_0 [ 312.469447] protocol 88fb is buggy, dev hsr_slave_1 [ 312.544350] protocol 88fb is buggy, dev hsr_slave_0 [ 312.549439] protocol 88fb is buggy, dev hsr_slave_1 [ 312.624327] protocol 88fb is buggy, dev hsr_slave_0 [ 312.629408] protocol 88fb is buggy, dev hsr_slave_1 [ 312.944341] protocol 88fb is buggy, dev hsr_slave_0 [ 312.949432] protocol 88fb is buggy, dev hsr_slave_1 [ 316.784336] net_ratelimit: 20 callbacks suppressed [ 316.784343] protocol 88fb is buggy, dev hsr_slave_0 [ 316.794402] protocol 88fb is buggy, dev hsr_slave_1 [ 317.104344] protocol 88fb is buggy, dev hsr_slave_0 [ 317.109449] protocol 88fb is buggy, dev hsr_slave_1 [ 317.424343] protocol 88fb is buggy, dev hsr_slave_0 [ 317.429437] protocol 88fb is buggy, dev hsr_slave_1 [ 317.984363] protocol 88fb is buggy, dev hsr_slave_0 [ 317.989458] protocol 88fb is buggy, dev hsr_slave_1 [ 318.704380] protocol 88fb is buggy, dev hsr_slave_0 [ 318.709478] protocol 88fb is buggy, dev hsr_slave_1 [ 322.144358] net_ratelimit: 20 callbacks suppressed [ 322.144366] protocol 88fb is buggy, dev hsr_slave_0 [ 322.154438] protocol 88fb is buggy, dev hsr_slave_1 [ 322.864366] protocol 88fb is buggy, dev hsr_slave_0 [ 322.869462] protocol 88fb is buggy, dev hsr_slave_1 [ 322.944330] protocol 88fb is buggy, dev hsr_slave_0 [ 322.949416] protocol 88fb is buggy, dev hsr_slave_1 [ 323.024341] protocol 88fb is buggy, dev hsr_slave_0 [ 323.029418] protocol 88fb is buggy, dev hsr_slave_1 [ 323.344330] protocol 88fb is buggy, dev hsr_slave_0 [ 323.349433] protocol 88fb is buggy, dev hsr_slave_1 [ 327.184331] net_ratelimit: 20 callbacks suppressed [ 327.184339] protocol 88fb is buggy, dev hsr_slave_0 [ 327.194416] protocol 88fb is buggy, dev hsr_slave_1 [ 327.504343] protocol 88fb is buggy, dev hsr_slave_0 [ 327.509438] protocol 88fb is buggy, dev hsr_slave_1 [ 327.824344] protocol 88fb is buggy, dev hsr_slave_0 [ 327.829443] protocol 88fb is buggy, dev hsr_slave_1 [ 328.384384] protocol 88fb is buggy, dev hsr_slave_0 [ 328.389484] protocol 88fb is buggy, dev hsr_slave_1 [ 329.104346] protocol 88fb is buggy, dev hsr_slave_0 [ 329.109459] protocol 88fb is buggy, dev hsr_slave_1 [ 332.544356] net_ratelimit: 20 callbacks suppressed [ 332.544365] protocol 88fb is buggy, dev hsr_slave_0 [ 332.554417] protocol 88fb is buggy, dev hsr_slave_1 [ 333.264351] protocol 88fb is buggy, dev hsr_slave_0 [ 333.269447] protocol 88fb is buggy, dev hsr_slave_1 [ 333.344342] protocol 88fb is buggy, dev hsr_slave_0 [ 333.349429] protocol 88fb is buggy, dev hsr_slave_1 [ 333.424328] protocol 88fb is buggy, dev hsr_slave_0 [ 333.429408] protocol 88fb is buggy, dev hsr_slave_1 [ 333.744329] protocol 88fb is buggy, dev hsr_slave_0 [ 333.749425] protocol 88fb is buggy, dev hsr_slave_1 [ 337.584332] net_ratelimit: 20 callbacks suppressed [ 337.584340] protocol 88fb is buggy, dev hsr_slave_0 [ 337.594420] protocol 88fb is buggy, dev hsr_slave_1 [ 337.904330] protocol 88fb is buggy, dev hsr_slave_0 [ 337.909439] protocol 88fb is buggy, dev hsr_slave_1 [ 338.224343] protocol 88fb is buggy, dev hsr_slave_0 [ 338.229520] protocol 88fb is buggy, dev hsr_slave_1 [ 338.784362] protocol 88fb is buggy, dev hsr_slave_0 [ 338.789461] protocol 88fb is buggy, dev hsr_slave_1 [ 339.504359] protocol 88fb is buggy, dev hsr_slave_0 [ 339.509456] protocol 88fb is buggy, dev hsr_slave_1 [ 342.944363] net_ratelimit: 20 callbacks suppressed [ 342.944371] protocol 88fb is buggy, dev hsr_slave_0 [ 342.954436] protocol 88fb is buggy, dev hsr_slave_1 [ 343.664358] protocol 88fb is buggy, dev hsr_slave_0 [ 343.669454] protocol 88fb is buggy, dev hsr_slave_1 [ 343.744356] protocol 88fb is buggy, dev hsr_slave_0 [ 343.749593] protocol 88fb is buggy, dev hsr_slave_1 [ 343.824328] protocol 88fb is buggy, dev hsr_slave_0 [ 343.829431] protocol 88fb is buggy, dev hsr_slave_1 [ 344.144338] protocol 88fb is buggy, dev hsr_slave_0 [ 344.149447] protocol 88fb is buggy, dev hsr_slave_1 [ 347.984332] net_ratelimit: 20 callbacks suppressed [ 347.984340] protocol 88fb is buggy, dev hsr_slave_0 [ 347.994401] protocol 88fb is buggy, dev hsr_slave_1 [ 348.304346] protocol 88fb is buggy, dev hsr_slave_0 [ 348.309438] protocol 88fb is buggy, dev hsr_slave_1 [ 348.624357] protocol 88fb is buggy, dev hsr_slave_0 [ 348.629450] protocol 88fb is buggy, dev hsr_slave_1 [ 349.184361] protocol 88fb is buggy, dev hsr_slave_0 [ 349.189462] protocol 88fb is buggy, dev hsr_slave_1 [ 349.904348] protocol 88fb is buggy, dev hsr_slave_0 [ 349.909452] protocol 88fb is buggy, dev hsr_slave_1 [ 353.344375] net_ratelimit: 20 callbacks suppressed [ 353.344383] protocol 88fb is buggy, dev hsr_slave_0 [ 353.354434] protocol 88fb is buggy, dev hsr_slave_1 [ 354.064353] protocol 88fb is buggy, dev hsr_slave_0 [ 354.069472] protocol 88fb is buggy, dev hsr_slave_1 [ 354.144335] protocol 88fb is buggy, dev hsr_slave_0 [ 354.149429] protocol 88fb is buggy, dev hsr_slave_1 [ 354.224332] protocol 88fb is buggy, dev hsr_slave_0 [ 354.229503] protocol 88fb is buggy, dev hsr_slave_1 [ 354.544360] protocol 88fb is buggy, dev hsr_slave_0 [ 354.549573] protocol 88fb is buggy, dev hsr_slave_1 [ 358.384321] net_ratelimit: 20 callbacks suppressed [ 358.384330] protocol 88fb is buggy, dev hsr_slave_0 [ 358.394365] protocol 88fb is buggy, dev hsr_slave_1 [ 358.704348] protocol 88fb is buggy, dev hsr_slave_0 [ 358.709439] protocol 88fb is buggy, dev hsr_slave_1 [ 359.024332] protocol 88fb is buggy, dev hsr_slave_0 [ 359.029444] protocol 88fb is buggy, dev hsr_slave_1 [ 359.584387] protocol 88fb is buggy, dev hsr_slave_0 [ 359.589482] protocol 88fb is buggy, dev hsr_slave_1 [ 360.304367] protocol 88fb is buggy, dev hsr_slave_0 [ 360.309479] protocol 88fb is buggy, dev hsr_slave_1 [ 363.744366] net_ratelimit: 20 callbacks suppressed [ 363.744374] protocol 88fb is buggy, dev hsr_slave_0 [ 363.754401] protocol 88fb is buggy, dev hsr_slave_1 [ 364.464362] protocol 88fb is buggy, dev hsr_slave_0 [ 364.469462] protocol 88fb is buggy, dev hsr_slave_1 [ 364.544351] protocol 88fb is buggy, dev hsr_slave_0 [ 364.549450] protocol 88fb is buggy, dev hsr_slave_1 [ 364.624336] protocol 88fb is buggy, dev hsr_slave_0 [ 364.629420] protocol 88fb is buggy, dev hsr_slave_1 [ 364.944334] protocol 88fb is buggy, dev hsr_slave_0 [ 364.949435] protocol 88fb is buggy, dev hsr_slave_1 [ 368.784336] net_ratelimit: 20 callbacks suppressed [ 368.784344] protocol 88fb is buggy, dev hsr_slave_0 [ 368.794406] protocol 88fb is buggy, dev hsr_slave_1 [ 369.104332] protocol 88fb is buggy, dev hsr_slave_0 [ 369.109441] protocol 88fb is buggy, dev hsr_slave_1 [ 369.424343] protocol 88fb is buggy, dev hsr_slave_0 [ 369.429431] protocol 88fb is buggy, dev hsr_slave_1 [ 369.994375] protocol 88fb is buggy, dev hsr_slave_0 [ 369.999474] protocol 88fb is buggy, dev hsr_slave_1 [ 370.704358] protocol 88fb is buggy, dev hsr_slave_0 [ 370.709448] protocol 88fb is buggy, dev hsr_slave_1 [ 374.144358] net_ratelimit: 20 callbacks suppressed [ 374.144366] protocol 88fb is buggy, dev hsr_slave_0 [ 374.154434] protocol 88fb is buggy, dev hsr_slave_1 [ 374.864353] protocol 88fb is buggy, dev hsr_slave_0 [ 374.869451] protocol 88fb is buggy, dev hsr_slave_1 [ 374.944334] protocol 88fb is buggy, dev hsr_slave_0 [ 374.949417] protocol 88fb is buggy, dev hsr_slave_1 [ 375.024340] protocol 88fb is buggy, dev hsr_slave_0 [ 375.029503] protocol 88fb is buggy, dev hsr_slave_1 [ 375.344363] protocol 88fb is buggy, dev hsr_slave_0 [ 375.349468] protocol 88fb is buggy, dev hsr_slave_1 [ 379.184340] net_ratelimit: 20 callbacks suppressed [ 379.184349] protocol 88fb is buggy, dev hsr_slave_0 [ 379.194424] protocol 88fb is buggy, dev hsr_slave_1 [ 379.504334] protocol 88fb is buggy, dev hsr_slave_0 [ 379.509450] protocol 88fb is buggy, dev hsr_slave_1 [ 379.584423] INFO: task syz-executor.4:7804 blocked for more than 140 seconds. [ 379.591847] Not tainted 5.0.0-rc5+ #64 [ 379.604285] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 379.612371] syz-executor.4 D28224 7804 7620 0x00000004 [ 379.634283] Call Trace: [ 379.636979] __schedule+0x817/0x1cc0 [ 379.640701] ? __mutex_lock+0x721/0x1310 [ 379.654301] ? pci_mmcfg_check_reserved+0x170/0x170 [ 379.659352] schedule+0x92/0x180 [ 379.662729] schedule_preempt_disabled+0x13/0x20 [ 379.699297] __mutex_lock+0x726/0x1310 [ 379.703284] ? do_futex+0x178/0x1d50 [ 379.707119] ? vhost_net_stop_vq+0x2d/0x120 [ 379.711485] ? mutex_trylock+0x1e0/0x1e0 [ 379.739302] ? kasan_check_write+0x14/0x20 [ 379.743576] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 379.754421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.759988] ? wait_for_completion+0x440/0x440 [ 379.774308] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 379.779905] mutex_lock_nested+0x16/0x20 [ 379.783976] ? mutex_lock_nested+0x16/0x20 [ 379.804295] vhost_net_stop_vq+0x2d/0x120 [ 379.808475] ? handle_rx_kick+0x50/0x50 [ 379.824294] vhost_net_release+0x5d/0x260 [ 379.824328] protocol 88fb is buggy, dev hsr_slave_0 [ 379.828529] __fput+0x2df/0x8d0 [ 379.833526] protocol 88fb is buggy, dev hsr_slave_1 [ 379.847426] ____fput+0x16/0x20 [ 379.850795] task_work_run+0x14a/0x1c0 [ 379.867654] exit_to_usermode_loop+0x273/0x2c0 [ 379.872355] do_syscall_64+0x52d/0x610 [ 379.894304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.899526] RIP: 0033:0x411d41 [ 379.902728] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 94 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 379.922713] RSP: 002b:00007ffef43a3930 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 379.930792] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000411d41 [ 379.938335] RDX: 0000000000000000 RSI: 0000000000740ad8 RDI: 0000000000000003 [ 379.945968] RBP: 0000000000000000 R08: 0000000000740ad0 R09: 00000000000367eb [ 379.953250] R10: 00007ffef43a3850 R11: 0000000000000293 R12: 0000000000000000 [ 379.974295] R13: 0000000000000001 R14: 0000000000000007 R15: 0000000000000004 [ 379.981699] [ 379.981699] Showing all locks held in the system: [ 379.988470] 1 lock held by khungtaskd/1039: [ 379.992799] #0: 000000006e80b27a (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 380.001770] 1 lock held by rsyslogd/7481: [ 380.006182] #0: 00000000cc3ffaf3 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 380.014119] 2 locks held by getty/7571: [ 380.018384] #0: 00000000156e77d1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 380.034299] #1: 000000000320e350 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 380.043263] 2 locks held by getty/7572: [ 380.056022] #0: 0000000014392f48 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 380.084330] #1: 000000000be86cf4 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 380.093230] 2 locks held by getty/7573: [ 380.115936] #0: 000000001e85bbd4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 380.135940] #1: 000000003d2a9ea0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 380.155943] 2 locks held by getty/7574: [ 380.159927] #0: 000000002ee5e0f7 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 380.204285] #1: 00000000f60ac1bf (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 380.213364] 2 locks held by getty/7575: [ 380.224284] #0: 00000000b11d2299 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 380.232561] #1: 00000000d28ece75 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 380.264305] 2 locks held by getty/7576: [ 380.268303] #0: 00000000638bb153 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 380.284283] #1: 00000000945a81e4 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 380.293183] 2 locks held by getty/7577: [ 380.329294] #0: 00000000df293c00 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 380.337870] #1: 0000000094f40245 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 380.369246] 1 lock held by syz-executor.4/7804: [ 380.373935] #0: 000000008a5899e8 (&vq->mutex){+.+.}, at: vhost_net_stop_vq+0x2d/0x120 [ 380.384378] protocol 88fb is buggy, dev hsr_slave_0 [ 380.389453] protocol 88fb is buggy, dev hsr_slave_1 [ 380.404291] 1 lock held by vhost-7806/7809: [ 380.408637] 1 lock held by vhost-7811/7817: [ 380.412963] [ 380.424281] ============================================= [ 380.424281] [ 380.431458] NMI backtrace for cpu 1 [ 380.435168] CPU: 1 PID: 1039 Comm: khungtaskd Not tainted 5.0.0-rc5+ #64 [ 380.442017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.451372] Call Trace: [ 380.453974] dump_stack+0x172/0x1f0 [ 380.457610] nmi_cpu_backtrace.cold+0x63/0xa4 [ 380.462220] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 380.467174] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 380.472536] arch_trigger_cpumask_backtrace+0x14/0x20 [ 380.477733] watchdog+0x9df/0xee0 [ 380.481240] kthread+0x357/0x430 [ 380.484613] ? reset_hung_task_detector+0x30/0x30 [ 380.489554] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 380.495099] ret_from_fork+0x3a/0x50 [ 380.498971] Sending NMI from CPU 1 to CPUs 0: [ 380.503994] NMI backtrace for cpu 0 [ 380.504000] CPU: 0 PID: 7817 Comm: vhost-7811 Not tainted 5.0.0-rc5+ #64 [ 380.504006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.504010] RIP: 0010:iotlb_access_ok+0x3f0/0x540 [ 380.504019] Code: 85 f6 0f 84 b3 00 00 00 e8 0d c5 32 fc 48 8d 7b 38 48 89 f8 48 c1 e8 03 42 80 3c 38 00 0f 85 f4 00 00 00 4c 03 6b 38 4c 89 e6 <48> 8b 7d c8 4d 89 ee e8 04 c6 32 fc 4d 29 e6 4c 39 65 c8 74 35 e8 [ 380.504023] RSP: 0018:ffff888054997aa8 EFLAGS: 00000246 [ 380.504030] RAX: 1ffff1101225a957 RBX: ffff8880912d4a80 RCX: ffffffff853d1b65 [ 380.504035] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8880912d4ab8 [ 380.504040] RBP: ffff888054997b30 R08: ffff88805498c380 R09: ffffed100a93412f [ 380.504044] R10: ffff888054997b68 R11: ffff8880549a0977 R12: 0000000000000000 [ 380.504049] R13: 0000000000000000 R14: 0000000000000001 R15: dffffc0000000000 [ 380.504054] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 380.504058] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 380.504063] CR2: 00000000010c4000 CR3: 00000000a55ca000 CR4: 00000000001406f0 [ 380.504067] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 380.504072] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 380.504075] Call Trace: [ 380.504078] vq_iotlb_prefetch+0x114/0x230 [ 380.504081] handle_rx+0x149/0x1900 [ 380.504085] ? zap_class+0x460/0x460 [ 380.504088] ? debug_smp_processor_id+0x1c/0x20 [ 380.504091] ? perf_trace_lock+0xeb/0x510 [ 380.504095] ? finish_task_switch+0x146/0x790 [ 380.504098] ? find_held_lock+0x35/0x130 [ 380.504101] ? finish_task_switch+0x146/0x790 [ 380.504105] ? _raw_spin_unlock_irq+0x28/0x90 [ 380.504108] ? finish_task_switch+0x146/0x790 [ 380.504112] ? _raw_spin_unlock_irq+0x28/0x90 [ 380.504115] ? lockdep_hardirqs_on+0x415/0x5d0 [ 380.504143] ? vhost_net_open+0x8e0/0x8e0 [ 380.504147] ? trace_hardirqs_on+0x67/0x230 [ 380.504151] ? __check_heap_object+0xb0/0xb3 [ 380.504154] ? _raw_spin_unlock_irq+0x5e/0x90 [ 380.504157] ? inc_ucount+0x6c0/0x800 [ 380.504161] ? __switch_to_asm+0x34/0x70 [ 380.504164] ? __switch_to_asm+0x40/0x70 [ 380.504167] ? __schedule+0x81f/0x1cc0 [ 380.504171] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 380.504174] handle_rx_net+0x19/0x20 [ 380.504177] vhost_worker+0x2a2/0x4a0 [ 380.504181] ? vhost_flush_work+0x20/0x20 [ 380.504184] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 380.504188] ? __kthread_parkme+0xfb/0x1b0 [ 380.504191] kthread+0x357/0x430 [ 380.504194] ? vhost_flush_work+0x20/0x20 [ 380.504198] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 380.504201] ret_from_fork+0x3a/0x50 [ 380.584294] Kernel panic - not syncing: hung_task: blocked tasks [ 380.764567] CPU: 1 PID: 1039 Comm: khungtaskd Not tainted 5.0.0-rc5+ #64 [ 380.771406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.780763] Call Trace: [ 380.783364] dump_stack+0x172/0x1f0 [ 380.787084] panic+0x2cb/0x65c [ 380.790323] ? __warn_printk+0xf3/0xf3 [ 380.794220] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 380.799168] ? ___preempt_schedule+0x16/0x18 [ 380.803588] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 380.809043] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 380.814495] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 380.819951] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 380.825412] watchdog+0x9f0/0xee0 [ 380.828888] kthread+0x357/0x430 [ 380.832278] ? reset_hung_task_detector+0x30/0x30 [ 380.837147] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 380.842693] ret_from_fork+0x3a/0x50 [ 380.848251] Kernel Offset: disabled [ 380.851890] Rebooting in 86400 seconds..