[info] Using makefile-style concurrent boot in runlevel 2. [ 42.073781][ T26] audit: type=1800 audit(1574092282.277:21): pid=7494 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 42.123997][ T26] audit: type=1800 audit(1574092282.277:22): pid=7494 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.37' (ECDSA) to the list of known hosts. 2019/11/18 15:51:33 fuzzer started 2019/11/18 15:51:34 dialing manager at 10.128.0.105:33487 2019/11/18 15:51:35 syscalls: 2566 2019/11/18 15:51:35 code coverage: enabled 2019/11/18 15:51:35 comparison tracing: enabled 2019/11/18 15:51:35 extra coverage: extra coverage is not supported by the kernel 2019/11/18 15:51:35 setuid sandbox: enabled 2019/11/18 15:51:35 namespace sandbox: enabled 2019/11/18 15:51:35 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/18 15:51:35 fault injection: enabled 2019/11/18 15:51:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/18 15:51:35 net packet injection: enabled 2019/11/18 15:51:35 net device setup: enabled 2019/11/18 15:51:35 concurrency sanitizer: enabled 2019/11/18 15:51:35 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 66.707122][ T7663] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/18 15:51:53 adding functions to KCSAN blacklist: 'pcpu_alloc' 'relay_switch_subbuf' 'vm_area_dup' 'blk_mq_run_hw_queue' 'tcp_add_backlog' 'ext4_mb_good_group' 'd_alloc_parallel' 'filemap_map_pages' 'tick_sched_do_timer' 'do_signal_stop' 'install_new_memslots' 'rcu_gp_fqs_loop' 'ktime_get_real_seconds' 'xas_find_marked' 'ext4_da_write_end' 'kvm_mmu_notifier_invalidate_range_end' 'find_next_bit' 'do_nanosleep' 'audit_log_start' 'p9_poll_workfn' '__find_get_block' 'flush_workqueue' 'queue_access_lock' 'shmem_file_read_iter' 'balance_dirty_pages' 'snd_seq_prioq_cell_out' '__skb_try_recv_from_queue' 'taskstats_exit' 'pid_update_inode' 'atime_needs_update' 'xas_clear_mark' 'inode_sync_complete' 'do_dentry_open' 'inode_permission' 'complete_signal' '__mark_inode_dirty' 'shmem_getpage_gfp' 'fsnotify' 'evict' 'delete_from_page_cache_batch' 'process_srcu' 'snd_seq_check_queue' 'echo_char' 'list_lru_count_one' 'wbt_done' 'dd_has_work' 'lookup_fast' 'ktime_get_seconds' 'do_exit' 'ext4_free_inodes_count' 'fprop_fraction_percpu' '__dentry_kill' '__cgroup_account_cputime' '__dev_queue_xmit' 'd_delete' 'p9_client_rpc' 'generic_write_end' 'timer_clear_idle' 'blk_stat_add' 'lruvec_lru_size' '__delete_from_page_cache' 'netlink_overrun' 'generic_update_time' 'bio_chain' 'rcu_gp_fqs_check_wake' 'tick_do_update_jiffies64' 'add_timer' 'yama_ptracer_del' 'shmem_add_to_page_cache' 'ip_tunnel_xmit' '__add_to_page_cache_locked' 'ondemand_readahead' '__perf_event_overflow' 'poll_schedule_timeout' 'find_group_orlov' 'commit_echoes' 'snd_ctl_notify' '__ext4_new_inode' 'blk_mq_get_request' '__snd_rawmidi_transmit_ack' 'blk_mq_sched_dispatch_requests' 'copy_process' 'generic_fillattr' 'do_syslog' 'get_signal' 'ext4_has_free_clusters' 'pipe_poll' 'blk_mq_dispatch_rq_list' 'add_timer_on' '__writeback_single_inode' 'iput' 'icmp_global_allow' '__process_echoes' 'generic_file_read_iter' 'virtqueue_enable_cb_delayed' 'writeback_sb_inodes' 'mod_timer' 'n_tty_receive_buf_common' 'mem_cgroup_select_victim_node' 'ext4_nonda_switch' 'mm_update_next_owner' 'ext4_mark_iloc_dirty' 'sit_tunnel_xmit' 'snd_rawmidi_kernel_write1' 'tomoyo_supervisor' 'tick_nohz_idle_stop_tick' 'page_counter_try_charge' 'find_get_pages_range_tag' 'kauditd_thread' 'pipe_wait' 'run_timer_softirq' 'wbt_issue' 'inet_send_prepare' 'sctp_assoc_migrate' 'ext4_writepages' '__hrtimer_run_queues' 'ep_poll' 'ext4_free_inode' 'futex_wait_queue_me' 'ext4_setattr' 15:55:57 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_bridge\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="1a000000000000000100010004000000000000000000000000000000000000000000000000000000010001"]}) write$evdev(r0, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000080)=""/117) 15:55:57 executing program 1: epoll_create1(0x0) r0 = socket$inet(0x2, 0x3, 0x2) getsockopt(r0, 0x0, 0xd0, 0x0, 0x0) [ 317.107009][ T7667] IPVS: ftp: loaded support on port[0] = 21 [ 317.236730][ T7667] chnl_net:caif_netlink_parms(): no params data found [ 317.277610][ T7667] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.288043][ T7667] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.301430][ T7667] device bridge_slave_0 entered promiscuous mode [ 317.308875][ T7667] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.316607][ T7667] bridge0: port 2(bridge_slave_1) entered disabled state 15:55:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGMRU(r0, 0x4008b100, &(0x7f0000000040)) [ 317.324443][ T7667] device bridge_slave_1 entered promiscuous mode [ 317.341029][ T7670] IPVS: ftp: loaded support on port[0] = 21 [ 317.363057][ T7667] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 317.385361][ T7667] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 317.443645][ T7667] team0: Port device team_slave_0 added [ 317.450344][ T7667] team0: Port device team_slave_1 added 15:55:57 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0xdf89, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfb]}) sendmmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 317.573992][ T7667] device hsr_slave_0 entered promiscuous mode [ 317.611922][ T7667] device hsr_slave_1 entered promiscuous mode [ 317.755703][ T7675] IPVS: ftp: loaded support on port[0] = 21 [ 317.772033][ T7667] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.774665][ T7673] IPVS: ftp: loaded support on port[0] = 21 [ 317.779123][ T7667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.792541][ T7667] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.799651][ T7667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.909417][ T7670] chnl_net:caif_netlink_parms(): no params data found [ 318.003742][ T7670] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.010977][ T7670] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.029763][ T7670] device bridge_slave_0 entered promiscuous mode 15:55:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x26e1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x10, 0x400000003, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001f40)={&(0x7f0000001d80)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001e80)=[{0x0}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="100000dd69849c4cbe84a273aec5f293ad25774b55d1069323f658290dfa66c3a13e735a64e273244879f53507cf3ff8085771d08aa9b190244be4a6b1ed76559b84813c08000000e0414c889c2d1142721044ae6aa8db111bc4f0e26ca08c8ec9eef8fc50f6b61997d153ff3c0e7f37eb3ee1d6da3296d3ba17de450194b5380ad69510c3e5e714a100645ea7128a93705d170cd72f8b8226df0c2e31489e9e4d397fd7c547e0141628d2300613f4cc50d57e6f991235fe7f8c75da7e8c2a2a92bfed55166fe6e82f705d8d5082c4a91985269357c9c5538ecdc1416cba2480ef60f50f7bc3446228c46ab10e96ea"], 0x10}, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x632d45e3b76ead5b) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r3}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) [ 318.112656][ T7670] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.119736][ T7670] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.153342][ T7670] device bridge_slave_1 entered promiscuous mode [ 318.215710][ T7667] 8021q: adding VLAN 0 to HW filter on device bond0 [ 318.262930][ T2843] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.272116][ T2843] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.307064][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 318.377490][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 318.403682][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 318.459028][ T7667] 8021q: adding VLAN 0 to HW filter on device team0 [ 318.473514][ T7670] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 318.520121][ T7705] IPVS: ftp: loaded support on port[0] = 21 [ 318.522873][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 318.552330][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 318.582969][ T7671] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.590038][ T7671] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.623239][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 318.652323][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 318.682963][ T7671] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.690036][ T7671] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.732313][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 318.763808][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 318.797721][ T7670] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 318.819880][ T7673] chnl_net:caif_netlink_parms(): no params data found [ 318.835516][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 318.863353][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 318.896578][ T7675] chnl_net:caif_netlink_parms(): no params data found [ 318.910840][ T7667] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 318.952382][ T7667] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 318.999875][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 319.009513][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 319.043299][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 319.073136][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 319.088493][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 319.113197][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 319.135735][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 15:55:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x161) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0), 0x161) socket$kcm(0x2, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) socket$kcm(0xa, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 319.191864][ T7667] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 319.199077][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 319.208355][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 319.231995][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 319.275909][ T7670] team0: Port device team_slave_0 added [ 319.281587][ T7673] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.298822][ T7673] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.315371][ T7673] device bridge_slave_0 entered promiscuous mode [ 319.336007][ T7670] team0: Port device team_slave_1 added [ 319.347976][ T7673] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.361801][ T7673] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.378248][ T7673] device bridge_slave_1 entered promiscuous mode [ 319.399044][ T7675] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.412846][ T7675] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.420458][ T7675] device bridge_slave_0 entered promiscuous mode [ 319.455670][ T7675] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.459774][ T7720] IPVS: ftp: loaded support on port[0] = 21 [ 319.471767][ T7675] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.479746][ T7675] device bridge_slave_1 entered promiscuous mode [ 319.492625][ T7673] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 319.543712][ T7670] device hsr_slave_0 entered promiscuous mode [ 319.602164][ T7670] device hsr_slave_1 entered promiscuous mode [ 319.651713][ T7670] debugfs: Directory 'hsr0' with parent '/' already present! [ 319.692546][ T7673] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 319.717903][ T7673] team0: Port device team_slave_0 added [ 319.754703][ T7705] chnl_net:caif_netlink_parms(): no params data found [ 319.769977][ T7675] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 319.781110][ T7673] team0: Port device team_slave_1 added [ 319.845727][ T7675] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 319.940471][ T7675] team0: Port device team_slave_0 added [ 319.986356][ T7673] device hsr_slave_0 entered promiscuous mode 15:56:00 executing program 0: [ 320.051924][ T7673] device hsr_slave_1 entered promiscuous mode [ 320.072348][ T7673] debugfs: Directory 'hsr0' with parent '/' already present! [ 320.111815][ T7705] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.118887][ T7705] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.152394][ T7705] device bridge_slave_0 entered promiscuous mode [ 320.186539][ T7675] team0: Port device team_slave_1 added [ 320.223438][ T7705] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.230727][ T7705] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.255210][ T7705] device bridge_slave_1 entered promiscuous mode [ 320.293065][ T7670] 8021q: adding VLAN 0 to HW filter on device bond0 15:56:00 executing program 0: [ 320.395089][ T7675] device hsr_slave_0 entered promiscuous mode [ 320.447084][ T7675] device hsr_slave_1 entered promiscuous mode [ 320.541736][ T7675] debugfs: Directory 'hsr0' with parent '/' already present! [ 320.557754][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 320.565971][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.603496][ T7670] 8021q: adding VLAN 0 to HW filter on device team0 [ 320.636538][ T7705] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 320.674831][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 320.702610][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 15:56:00 executing program 0: [ 320.754604][ T2843] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.761818][ T2843] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.867514][ T2843] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 320.965791][ T7705] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 320.991840][ T7720] chnl_net:caif_netlink_parms(): no params data found 15:56:01 executing program 0: [ 321.134794][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 321.158762][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 321.254506][ T7701] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.261670][ T7701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.372263][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 321.381247][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 15:56:01 executing program 0: [ 321.495462][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 321.562357][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 321.634489][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 321.678391][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 321.756571][ T7705] team0: Port device team_slave_0 added 15:56:02 executing program 0: [ 321.809000][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 321.830452][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 321.961567][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.038248][ T7670] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 15:56:02 executing program 0: [ 322.125013][ T7670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 322.275785][ T7705] team0: Port device team_slave_1 added [ 322.285009][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 322.316442][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.389726][ T7670] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 322.458264][ T7720] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.522059][ T7720] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.530293][ T7720] device bridge_slave_0 entered promiscuous mode [ 322.633403][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 322.640803][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 322.709174][ T7720] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.720514][ T7720] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.763773][ T7720] device bridge_slave_1 entered promiscuous mode [ 322.797781][ T7673] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.856921][ T7705] device hsr_slave_0 entered promiscuous mode [ 322.932059][ T7705] device hsr_slave_1 entered promiscuous mode [ 322.961723][ T7705] debugfs: Directory 'hsr0' with parent '/' already present! [ 322.986272][ T7673] 8021q: adding VLAN 0 to HW filter on device team0 [ 323.036277][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 323.062375][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 323.196093][ T7720] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 323.264827][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 323.286942][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 323.375004][ T7722] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.382217][ T7722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.432320][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 323.441349][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 323.502209][ T7722] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.509372][ T7722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.602209][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 323.647469][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 323.732985][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 323.783811][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 323.836152][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 323.885206][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 323.919759][ T7673] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 323.961706][ T7673] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 324.016204][ T7720] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 324.067463][ T7675] 8021q: adding VLAN 0 to HW filter on device bond0 [ 324.125311][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 324.142536][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 324.151217][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 324.202356][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 324.211469][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 15:56:04 executing program 1: epoll_create1(0x0) r0 = socket$inet(0x2, 0x3, 0x2) getsockopt(r0, 0x0, 0xd0, 0x0, 0x0) [ 324.282505][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 324.355667][ T7675] 8021q: adding VLAN 0 to HW filter on device team0 [ 324.391499][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 324.402385][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 324.421891][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 324.429495][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 324.482128][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 324.495063][ T7673] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 324.537388][ T7720] team0: Port device team_slave_0 added [ 324.581254][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 324.601516][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 324.652149][ T7810] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.659397][ T7810] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.695043][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 324.725704][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 324.765052][ T7810] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.773200][ T7810] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.792814][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 324.821974][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 324.830831][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 324.882300][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 324.902506][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 324.911061][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 324.952699][ T7720] team0: Port device team_slave_1 added [ 324.963609][ T7675] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 324.992636][ T7675] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 325.052389][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 325.085739][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 325.105481][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 325.132247][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 325.165321][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 325.197311][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 325.246571][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 325.317402][ T7720] device hsr_slave_0 entered promiscuous mode [ 325.372002][ T7720] device hsr_slave_1 entered promiscuous mode [ 325.401699][ T7720] debugfs: Directory 'hsr0' with parent '/' already present! [ 325.411369][ T7675] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 325.421889][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 325.429426][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 325.469672][ T7705] 8021q: adding VLAN 0 to HW filter on device bond0 [ 325.515214][ T7705] 8021q: adding VLAN 0 to HW filter on device team0 [ 325.525703][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 325.536413][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 325.609719][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 325.622431][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 325.630977][ T2618] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.638111][ T2618] bridge0: port 1(bridge_slave_0) entered forwarding state 15:56:05 executing program 2: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) memfd_create(&(0x7f0000000540)='\x00', 0x17) r0 = inotify_init() inotify_rm_watch(r0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000300)) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x7f, 0x1}, 0x7) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x8) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000200)=0xc) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0xd) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r6 = open(&(0x7f0000000440)='./bus\x00', 0x100, 0x0) ftruncate(r3, 0x800fe) sendfile(r5, r6, 0x0, 0x8000fffffffe) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8080c802}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) [ 325.685615][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 325.709853][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 325.734676][ T2618] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.741773][ T2618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.791381][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 325.819509][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 325.846273][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 325.851886][ T7917] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 325.873655][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 325.907331][ T7705] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 325.944396][ T7705] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 325.981689][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 325.981707][ T26] audit: type=1804 audit(1574092566.177:31): pid=7918 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir828768892/syzkaller.JJgcnO/1/bus" dev="sda1" ino=16530 res=1 [ 325.995122][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 326.048899][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 326.075630][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 326.108688][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 326.116899][ T26] audit: type=1804 audit(1574092566.287:32): pid=7918 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir828768892/syzkaller.JJgcnO/1/bus" dev="sda1" ino=16530 res=1 [ 326.137135][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 326.151575][ C1] hrtimer: interrupt took 33354 ns [ 326.183804][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 326.215784][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 326.247477][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 326.338236][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 326.367124][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 326.422407][ T7921] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 326.438665][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 326.473767][ T7705] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 326.484146][ T7720] 8021q: adding VLAN 0 to HW filter on device bond0 [ 326.535982][ T7720] 8021q: adding VLAN 0 to HW filter on device team0 [ 326.579990][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 326.591234][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 15:56:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000140)={0x1f, 0x5}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 326.657406][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 326.709229][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.758746][ T7686] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.765854][ T7686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.801097][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 326.839895][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 326.883457][ T7686] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.890577][ T7686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.959107][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 326.986436][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 327.023043][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 327.031577][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 327.082696][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 327.091286][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 327.137059][ T7720] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 327.151931][ T7720] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 327.185441][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 327.194382][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 327.235205][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 327.255201][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 327.282393][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 327.312200][ T7810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 327.339857][ T7720] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 327.370513][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 327.385079][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 327.404946][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 15:56:07 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40485404, &(0x7f0000000180)) [ 327.681689][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 327.687479][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:56:08 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000440)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x3, 0x1, &(0x7f0000000140)) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x2b, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00#\x7f\x80P=r\xc4\x17I~\x85\xadq\xd6\xde@\xb3\xd5\x9f2R\xa3Z\xd3\x9b\xbd\xa1\xa3/\xc0\x91J\x01!8#\x04\x0f\xc3\xb7\x95\xdc\xaa\x91\xfb\xa1]PVH\xaa\x19\x04\x80\x94\'\xc7\fL\xac\xcf:\x92N\x94\xde\x87\xc4\x9b\x87\xd2\xcc{X\xedVr\xecP\xf9&^I\x9f}3U?\x1a\r\x9d', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000004c0), 0x12) 15:56:08 executing program 1: epoll_create1(0x0) r0 = socket$inet(0x2, 0x3, 0x2) getsockopt(r0, 0x0, 0xd0, 0x0, 0x0) 15:56:08 executing program 0: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0xffffff6c) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x11, r0, 0x0) write$cgroup_type(r0, 0x0, 0x0) 15:56:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0xa89) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) dup3(r0, r1, 0x0) r2 = syz_open_pts(r0, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TCFLSH(r3, 0x540a, 0x0) 15:56:08 executing program 3: syz_genetlink_get_family_id$tipc2(0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x15) 15:56:08 executing program 4: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8901, &(0x7f0000000480)) 15:56:08 executing program 1: epoll_create1(0x0) r0 = socket$inet(0x2, 0x3, 0x2) getsockopt(r0, 0x0, 0xd0, 0x0, 0x0) 15:56:08 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x0, 0x1}}) 15:56:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x5e22, 0x0, @empty}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000100)="580000001500add427323b472545b45602117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200b1a74d", 0x58}], 0x1) 15:56:08 executing program 3: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) sendto$inet(r0, &(0x7f0000000100)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfffffe65, 0x80, 0x0, 0x22) 15:56:08 executing program 1: epoll_create1(0x0) getsockopt(0xffffffffffffffff, 0x0, 0xd0, 0x0, 0x0) 15:56:08 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pipe2(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB], 0x3}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000180)={0x73622a85, 0x0, 0x2}) 15:56:08 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000280), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x1f000000) 15:56:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:56:08 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 15:56:08 executing program 1: epoll_create1(0x0) getsockopt(0xffffffffffffffff, 0x0, 0xd0, 0x0, 0x0) 15:56:08 executing program 2: socket$kcm(0x11, 0xa, 0x300) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:56:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) socket$kcm(0x2, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:56:08 executing program 4: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="2300000022008152915a655267030000002ff96e27bf28b285fe3903a44a6017edcaa3", 0x23}], 0x1}, 0x0) 15:56:09 executing program 1: epoll_create1(0x0) getsockopt(0xffffffffffffffff, 0x0, 0xd0, 0x0, 0x0) 15:56:09 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="d59e49ecefedf29f150f48fa7ec5cab66b559969cd332a5eeff075656d6b7d21bf145e62166c6b31cfef16b080776ad79c7e8683ac61d859a63668db03b6806e1b26df4787c75fc0388de8c24377fd0d27caaedcf99ac180589e30852a223409cd667fe84aa5720e63", @ANYBLOB="27fb1299e4fd3329137c495a519f5cbbc5b9c6fab5f3220449d80a91b48bf3b2ed"], 0x0, 0x8a}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 328.908644][ T8054] ptrace attach of "/root/syz-executor.0"[8053] was attempted by "/root/syz-executor.0"[8054] 15:56:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r1, 0x0) madvise(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x9) 15:56:09 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r3, &(0x7f0000001080)=@un=@abs={0x1}, 0x80) bind(r3, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x2, 0x2, 0x3, {0xa, 0x4e23, 0x2, @loopback, 0x8}}}, 0x80) write(r1, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$cgroup_int(r0, &(0x7f0000000180), 0x396) r4 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0x0, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x14) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x30e}}, 0x1) ioctl$FS_IOC_SETFLAGS(r5, 0x40046602, &(0x7f0000000640)=0x1) r7 = inotify_init() lseek(r7, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r5, 0x4004556a, 0x0) r8 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f0000000080)=0x581, 0x4) sendto$inet6(r8, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) setsockopt$inet6_int(r8, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r8, &(0x7f00000000c0)={0x0, 0xfffffffffffffe14, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r9, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3}) fcntl$dupfd(r9, 0x0, r9) r10 = dup2(0xffffffffffffffff, r9) ioctl$TCSETSW(r10, 0x5403, &(0x7f0000000340)={0x3f, 0x0, 0x0, 0x41, 0x0, 0x1, 0x0, 0x0, 0x8000, 0xbb4, 0x2}) getsockname(r10, &(0x7f00000001c0)=@rc, &(0x7f0000000580)=0xfffffffffffffefb) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f0000000100)=0xffffffff80000001, 0x4) bind$inet(r11, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) connect$inet(r11, &(0x7f00000005c0)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r11, 0x6, 0x16, &(0x7f0000000000), 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0), 0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r12 = open(&(0x7f0000000480)='./bus\x00', 0x101042, 0x1) ftruncate(r12, 0x2007fff) sendfile(r5, r12, 0x0, 0x8000fffffffe) 15:56:09 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt(r0, 0x0, 0xd0, 0x0, 0x0) 15:56:09 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="d59e49ecefedf29f150f48fa7ec5cab66b559969cd332a5eeff075656d6b7d21bf145e62166c6b31cfef16b080776ad7", @ANYBLOB="27fb1299e4fd3329137c495a519f5cbbc5b9c6fab5f3220449d80a91b48bf3b2ed7d"], 0x0, 0x52}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:56:09 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="d59e49ecefedf29f150f48fa7ec5cab66b559969cd332a5eeff075656d6b7d21bf145e62166c6b31cfef16b080776ad79c7e8683ac61", @ANYBLOB="27fb1299e4fd3329137c495a519f5cbbc5b9c6fab5f3220449d80a91b48bf3b2ed"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:56:09 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) read(r0, &(0x7f0000001300)=""/11, 0x8) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(0xffffffffffffffff) dup3(r2, r1, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) gettid() ptrace(0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 15:56:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x11, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x5f5e0ff}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x49c, &(0x7f0000002880)=""/251}, 0x48) [ 329.137213][ T8071] ptrace attach of "/root/syz-executor.2"[8070] was attempted by "/root/syz-executor.2"[8071] 15:56:09 executing program 1: r0 = socket$inet(0x2, 0x0, 0x2) getsockopt(r0, 0x0, 0xd0, 0x0, 0x0) [ 329.179295][ T8078] ptrace attach of "/root/syz-executor.3"[8075] was attempted by "/root/syz-executor.3"[8078] 15:56:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000003000/0x18000)=nil, &(0x7f00000008c0)=[@text16={0x10, &(0x7f0000000080)="0f20e06635000004000f22e0d9ecbaf80c66b83c7aae8766efbafc0c66edbaa00066b80f00000066eff218c70f015ab6f2a72e65640f3066b80500000066b9000000000f01c1660f38813d"}], 0x31e, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:56:09 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) read$alg(r2, 0x0, 0x0) [ 329.259726][ T8082] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:56:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000003300070100000000400000e00200f400ffd38d9b0900010004001d0004000800"], 0x24}}, 0x0) 15:56:09 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x200000, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000280)=ANY=[]) r2 = dup(r1) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r2}) 15:56:09 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40505412, 0x0) [ 329.546386][ T8110] openvswitch: netlink: Message has 1 unknown bytes. [ 329.911680][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 329.917505][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:56:10 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 15:56:10 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000100)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "000001", 0x1, 0x0, 0x0, @empty, @mcast2={0xff, 0x4, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, '\bqV', 0x0, 0x0, 0x0, @mcast1={0x3801, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}}}}, 0x0) [ 330.102923][ T26] audit: type=1800 audit(1574092570.307:33): pid=8076 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16550 res=0 15:56:10 executing program 1: r0 = socket$inet(0x2, 0x0, 0x2) getsockopt(r0, 0x0, 0xd0, 0x0, 0x0) 15:56:10 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071") syz_emit_ethernet(0x66, &(0x7f0000000080)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "000001", 0x30, 0x29, 0x0, @remote, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3801, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @loopback}}}}}}}, 0x0) 15:56:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000004300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 15:56:10 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xfff8, &(0x7f0000000080)={0x0, 0xfffffffffffffe70}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a00000000000000000008003900090035000c000600000019000500de800000000000dc1338d54400009b84132000000083de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) r0 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x30a, 0x0) [ 330.198623][ T8137] IPv6: NLM_F_REPLACE set, but no existing node found! 15:56:10 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpgrp(0x0) ioprio_set$pid(0x1, r4, 0x7fff) recvmmsg(r3, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioprio_get$uid(0x2, 0x0) 15:56:10 executing program 5: write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)) syz_open_procfs(0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, 0x0, 0x0) open(0x0, 0x0, 0x0) memfd_create(&(0x7f00000001c0)='\xb3', 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, 0xffffffffffffffff, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r5 = syz_open_dev$mice(0x0, 0x0, 0x8400) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, &(0x7f0000000100)) ioctl$TIOCGISO7816(r5, 0x80285442, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x8) geteuid() r6 = shmget(0x3, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_SET(r6, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0x0, 0x0, 0xee01, 0x80, 0x8}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x200}) getresuid(&(0x7f0000000200), &(0x7f0000002840), &(0x7f0000002880)) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f000096d000/0x4000)=nil, 0x4000, 0x2000005, 0x10, r7, 0x0) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vga_arbiter\x00', 0x420000, 0x0) ioctl$BLKDISCARD(r8, 0x1277, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000050c0)={0x0, r4, 0x0, 0x5, &(0x7f0000005080)='stat\x00'}, 0x30) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vga_arbiter\x00', 0x420000, 0x0) syz_open_dev$midi(&(0x7f0000005140)='/dev/midi#\x00', 0x200, 0x8000) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)) syz_open_dev$adsp(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:56:10 executing program 1: r0 = socket$inet(0x2, 0x0, 0x2) getsockopt(r0, 0x0, 0xd0, 0x0, 0x0) 15:56:10 executing program 3: write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x10004000000002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r5, 0xae80, 0x0) 15:56:10 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000040)=[{0x28}, {0x80000006}]}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000002c0)=0x400000005) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$TCFLSH(r2, 0x540a, 0x2) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000440)=[@in={0x2, 0x4e21, @local}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}], 0x50) sendto$inet(r5, &(0x7f0000fa3fff), 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x70, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000040)) ioctl$TIOCPKT(r6, 0x5420, &(0x7f00000002c0)=0x400000005) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) ioctl$TIOCPKT(r7, 0x5420, &(0x7f00000002c0)=0xa89) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) dup3(r7, r8, 0x0) r9 = dup3(0xffffffffffffffff, r7, 0x0) ioctl$TCFLSH(r9, 0x540a, 0x2) ioctl$IOC_PR_REGISTER(r9, 0x401870c8, &(0x7f0000000240)={0x0, 0x48738d86, 0x1}) 15:56:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='ramfs\x00\x9b\x95\x84\x10D\xfb\x9b\x81R#\x10O\xd3\xb4\xe8\xa3\x1f\x00\r\xf6\xd9\xbbt\x95f\x9e\x02\x06\xf946\\{(\xc8\xa7s\xd2>\x81\x88l\x0e\xc5%\x99\x00\x02\x9d\x85\xfc\xa9\\\x99:\xe4\x9c\xf9z>w\xe7\xa9\xa8=\xe9o\x9f\xfbKE\xd7\x9a\x1b\xf8\x86@\x8e\xe6\x9em\x89\xab\x19\xea1\x8e\xa1\xb5\xd7\xc6\xc62\x05\xc7\xe5\xd2m\xeczV\x1d\x84\xcd\xc0\xdf', 0x0, 0x0) chdir(&(0x7f00000004c0)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) 15:56:10 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt(r0, 0x0, 0xd0, 0x0, 0x0) [ 330.645077][ T8159] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 15:56:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x4, &(0x7f0000000040), 0x4) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f0000000000)) [ 330.791694][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 330.797558][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:56:11 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt(r0, 0x0, 0xd0, 0x0, 0x0) 15:56:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000640)=""/209, 0x1000}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x7d1, 0x0, 0x8, 0xfb], 0x11000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 15:56:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 15:56:11 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt(r0, 0x0, 0xd0, 0x0, 0x0) 15:56:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_rr_get_interval(0x0, &(0x7f0000000140)) 15:56:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x4, &(0x7f0000000040), 0x4) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f0000000000)) 15:56:11 executing program 1: socket$inet(0x2, 0x3, 0x2) getsockopt(0xffffffffffffffff, 0x0, 0xd0, 0x0, 0x0) 15:56:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='ramfs\x00\x9b\x95\x84\x10D\xfb\x9b\x81R#\x10O\xd3\xb4\xe8\xa3\x1f\x00\r\xf6\xd9\xbbt\x95f\x9e\x02\x06\xf946\\{(\xc8\xa7s\xd2>\x81\x88l\x0e\xc5%\x99\x00\x02\x9d\x85\xfc\xa9\\\x99:\xe4\x9c\xf9z>w\xe7\xa9\xa8=\xe9o\x9f\xfbKE\xd7\x9a\x1b\xf8\x86@\x8e\xe6\x9em\x89\xab\x19\xea1\x8e\xa1\xb5\xd7\xc6\xc62\x05\xc7\xe5\xd2m\xeczV\x1d\x84\xcd\xc0\xdf', 0x0, 0x0) chdir(&(0x7f00000004c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000100)='./file0\x00', 0x2) syz_open_dev$sndctrl(0x0, 0x0, 0x0) 15:56:11 executing program 0: r0 = gettid() r1 = socket$inet(0x2b, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040), 0x4) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="01e202df45f1f8eddb8ee3440f00104c99f10cc6297fa1b9b3853c78451263e8301d8124c8d61cca9cb09d2bb01847"], 0x1ac) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000008c0)=@broute={'broute\x00', 0x20, 0x0, 0x8e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000800], 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000001c0000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"/142]}, 0x106) ptrace$setopts(0x4206, r0, 0x0, 0x0) 15:56:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000640)=""/209, 0x1000}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x7d1, 0x0, 0x8, 0xfb], 0x11000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 15:56:11 executing program 1: socket$inet(0x2, 0x3, 0x2) getsockopt(0xffffffffffffffff, 0x0, 0xd0, 0x0, 0x0) 15:56:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffa0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000005c0)={[0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5c]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000080)={0x0, 0x7f}, 0x8) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:56:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x4, &(0x7f0000000040), 0x4) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f0000000000)) 15:56:11 executing program 2: r0 = gettid() r1 = socket$inet(0x2b, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040), 0x4) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="01e202df45f1f8eddb8ee3440f00104c99f10cc6297fa1b9b3853c78451263e8301d8124c8d61cca9cb09d2bb01847"], 0x1ac) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000008c0)=@broute={'broute\x00', 0x20, 0x0, 0x8c, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000800], 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000001c0000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"/140]}, 0x104) ptrace$setopts(0x4206, r0, 0x0, 0x0) 15:56:12 executing program 4: 15:56:12 executing program 1: socket$inet(0x2, 0x3, 0x2) getsockopt(0xffffffffffffffff, 0x0, 0xd0, 0x0, 0x0) 15:56:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x4, &(0x7f0000000040), 0x4) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f0000000000)) 15:56:12 executing program 3: 15:56:12 executing program 0: 15:56:12 executing program 4: 15:56:12 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt(r0, 0x0, 0x0, 0x0, 0x0) 15:56:12 executing program 0: 15:56:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:12 executing program 3: 15:56:12 executing program 0: 15:56:15 executing program 2: 15:56:15 executing program 4: 15:56:15 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt(r0, 0x0, 0x0, 0x0, 0x0) 15:56:15 executing program 0: 15:56:15 executing program 3: 15:56:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:15 executing program 0: 15:56:15 executing program 3: 15:56:15 executing program 4: 15:56:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:15 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt(r0, 0x0, 0x0, 0x0, 0x0) 15:56:15 executing program 2: 15:56:15 executing program 0: 15:56:15 executing program 3: 15:56:15 executing program 4: 15:56:15 executing program 1: 15:56:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:15 executing program 2: 15:56:15 executing program 0: 15:56:15 executing program 4: 15:56:15 executing program 3: 15:56:15 executing program 1: 15:56:15 executing program 0: 15:56:15 executing program 2: 15:56:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:15 executing program 3: 15:56:16 executing program 1: 15:56:16 executing program 0: 15:56:16 executing program 4: 15:56:16 executing program 1: 15:56:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:16 executing program 3: 15:56:16 executing program 4: 15:56:16 executing program 2: 15:56:16 executing program 0: 15:56:16 executing program 1: 15:56:16 executing program 3: 15:56:16 executing program 1: 15:56:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:16 executing program 2: 15:56:16 executing program 0: 15:56:16 executing program 4: 15:56:16 executing program 1: 15:56:16 executing program 3: 15:56:16 executing program 2: 15:56:16 executing program 4: 15:56:16 executing program 0: 15:56:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = socket$can_raw(0x1d, 0x3, 0x1) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, 0xffffffffffffffff, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:17 executing program 1: 15:56:17 executing program 4: 15:56:17 executing program 0: 15:56:17 executing program 2: 15:56:17 executing program 3: 15:56:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = socket$can_raw(0x1d, 0x3, 0x1) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, 0xffffffffffffffff, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:17 executing program 2: 15:56:17 executing program 4: 15:56:17 executing program 3: 15:56:17 executing program 1: 15:56:17 executing program 0: 15:56:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = socket$can_raw(0x1d, 0x3, 0x1) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, 0xffffffffffffffff, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:17 executing program 4: 15:56:17 executing program 2: 15:56:17 executing program 1: 15:56:17 executing program 3: 15:56:17 executing program 0: 15:56:17 executing program 2: 15:56:17 executing program 4: 15:56:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:17 executing program 3: 15:56:17 executing program 0: 15:56:17 executing program 1: 15:56:18 executing program 4: 15:56:18 executing program 2: 15:56:18 executing program 3: 15:56:18 executing program 0: 15:56:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:18 executing program 1: 15:56:18 executing program 4: 15:56:18 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='.+lgroup/\r\x85\xdc\xb0|\x03>@H\x03%\xde\x00\x04\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000400), 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'batadv0\x00'}}, 0x80, 0x0}, 0x5000040) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r1, &(0x7f0000000440)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x3, 0x1, &(0x7f0000000140)) gettid() perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0xccd, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4z\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080)=0x900000000000000, 0x297ef) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r4, &(0x7f0000000080)=0x900000000000000, 0x297ef) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000080)=0x900000000000000, 0x297ef) r6 = openat$cgroup(r2, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) openat$cgroup(r7, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580), 0x0) socket$kcm(0x2b, 0x0, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00#\x7f\x80P=r\xc4\x17I~\x85\xadq\xd6\xde@\xb3\xd5\x9f2R\xa3Z\xd3\x9b\xbd\xa1\xa3/\xc0\x91J\x01!8#\x04\x0f\xc3\xb7\x95\xdc\xaa\x91\xfb\xa1]PVH\xaa\x19\x04\x80\x94\'\xc7\fL\xac\xcf:\x92N\x94\xde\x87\xc4\x9b\x87\xd2\xcc{X\xedVr\xecP\xf9&^I\x9f}3U?\x1a\r\x9d', 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f00000004c0), 0x12) 15:56:18 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) 15:56:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff018}, {0x6}]}) 15:56:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8912, &(0x7f0000000480)) 15:56:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:18 executing program 4: 15:56:18 executing program 2: 15:56:18 executing program 1: 15:56:18 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002a000080", 0x14}], 0x1}, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000004c0), 0x4) 15:56:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff01c}, {0x6}]}) 15:56:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 15:56:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002a000080", 0x14}], 0x1}, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 15:56:19 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0x2001006f) 15:56:19 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:19 executing program 4: write(0xffffffffffffffff, &(0x7f00000001c0), 0xffffffffffffff68) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e70e) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x4000080) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000040)={0xf, 0x0, 0xe, 0x0, 0x0, 0x7, 0x1}) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/exec\x00', 0x2, 0x0) r0 = open(0x0, 0x1c6506, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0xffffffffffffffff, &(0x7f0000000300)='./bus\x00', 0x400) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000940)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYPTR, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=r0]]) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sched_setparam(0x0, &(0x7f0000000500)) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000100)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@broadcast, @in=@multicast1}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x4) fcntl$setstatus(r2, 0x4, 0x6100) write$FUSE_INIT(r0, &(0x7f00000003c0)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x50) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) write$cgroup_type(r3, 0x0, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0xc, &(0x7f0000000000)=0x2ece, 0x4) setsockopt$inet_opts(r4, 0x0, 0xd, &(0x7f0000000080)='6', 0x1) recvmsg(r4, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x40002102) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r4, 0x40106614, &(0x7f0000000100)) [ 338.934761][ T8501] skbuff: bad partial csum: csum=65535/8 headroom=64 headlen=9 15:56:19 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000480)) bind(r3, &(0x7f0000001080)=@un=@abs={0x1}, 0x80) bind(r3, &(0x7f00000002c0)=@llc={0x1a, 0x101, 0x10, 0x9, 0x8, 0x7, @dev={[], 0x1a}}, 0x80) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0x0, &(0x7f0000000180)) r5 = dup(r4) r6 = socket(0x10, 0x2, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='mountstats\x00') sendfile(r6, r7, 0x0, 0x80000008000000b) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x74) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000340)=0x46b) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a80)=ANY=[@ANYBLOB="021380fa72b8dbc862dd50392f32178060083f35f2edd768be6256126c23020000000002000000df25080012000000120000000000000000050000000900000001ac010000000000000000000000000000aaee7bb5500756498881d17f3c3adcc11a9b3924f84f460e633decddfd98b1d95994976feb6ccaf30090a3a4735bfb5997a5a29e0100516a5d095d838105d027076d5113937b562b67f9df6190751d5514636e59c184f8233dbea6534c51c40dfe69906ac3de9b8cdef2ba983fff3d9cfe60dda1a3a704a68071848830ccd9646e308ad52888ab9b5128ff71feed2e80ce14c0f7c86aaa403f8e95123b31f180bba28c28ed68044669ce9b7818626ebe2bc0824c5b098e9b92b32a35619b49135765dce3ce1506000000f161fae5eea2c4b6d667732ecbe6116cc2677af8e8cfd150138988542d01c2e921c55883440d3941b24b161fd224b71468af19c1ccc2e45b3e91a2e1c34c654829f20000000000000000ae1ff96310aabeb94eb96d633a467500"], 0x45}}, 0x1) ioctl$FS_IOC_SETFLAGS(r5, 0x40046602, &(0x7f0000000640)=0x1) ioctl$UI_SET_SNDBIT(r5, 0x4004556a, 0x0) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockname(r9, &(0x7f0000000540)=@rc, &(0x7f0000000140)=0x80) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000380)=0x83, 0xffffffffffffff8a) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r10 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 15:56:19 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002a000080", 0x14}], 0x1}, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) [ 339.111662][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 339.117455][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:56:19 executing program 0: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008804, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) 15:56:19 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xe380}, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) [ 339.191706][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 339.197590][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:56:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00\x00\x00v\x98\x91bS\xb3\x81\x99\x00', 0x800000000802}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x118) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000001f00bfa30000000000006502000000feffff7aeeeffff8ffefff79a4f0ff00000000b7060000ffffffff2d64050000006504040001ffffffd404000020000000b7050000230000006a0a00fe00002bf28d79e7896c00008500800036000000b7000000000000009500000000000000409f4aa260bcfd0e02fc7e2fe3057c64faa1eb8f20fa036d65af898be22103d4869c18f1cc1a0000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x244}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_OPEN(r5, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0, 0x7}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000280)={r6, 0x0, 0x7ff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ip_vti0\x00', r3}) [ 339.271695][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 339.277502][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 339.289141][ T8522] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:56:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0xb615, 0x6, 0x4}, 0x3c) 15:56:19 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x4, &(0x7f0000000040), 0x4) 15:56:19 executing program 0: r0 = socket$packet(0x11, 0x2000100000000a, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006, 0x0, 0x0, 0x80}]}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55", 0x3f, 0x0, 0x0, 0x0) [ 339.484934][ T8533] BUG: unable to handle page fault for address: 0000000000006028 [ 339.492827][ T8533] #PF: supervisor read access in kernel mode [ 339.499175][ T8533] #PF: error_code(0x0000) - not-present page [ 339.505239][ T8533] PGD 9e936067 P4D 9e936067 PUD 9e9d1067 PMD 0 [ 339.511497][ T8533] Oops: 0000 [#1] PREEMPT SMP [ 339.516285][ T8533] CPU: 1 PID: 8533 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 339.524080][ T8533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.534371][ T8533] RIP: 0010:j1939_priv_get_by_ndev+0x76/0xc0 [ 339.540360][ T8533] Code: 81 fd 18 01 75 42 e8 49 d0 1b fd 48 8d bb f0 04 00 00 e8 ad dd 28 fd 48 8b 9b f0 04 00 00 48 8d bb 28 60 00 00 e8 9a dd 28 fd <4c> 8b a3 28 60 00 00 4d 85 e4 74 12 e8 19 d0 1b fd 49 8d bc 24 20 [ 339.560922][ T8533] RSP: 0018:ffffc90000e03b30 EFLAGS: 00010202 [ 339.566995][ T8533] RAX: 00000000000006ce RBX: 0000000000000000 RCX: ffffffff86040c68 [ 339.574970][ T8533] RDX: 0000000000000000 RSI: ffffffff84285c67 RDI: 0000000000006028 [ 339.582946][ T8533] RBP: ffffc90000e03b48 R08: 0000000000000000 R09: 0000000000006028 [ 339.590980][ T8533] R10: ffffc90000e03b80 R11: 000000000000602f R12: 0000000000000000 [ 339.599061][ T8533] R13: 0000000000000118 R14: ffffffff85c18c20 R15: 0000000000000000 [ 339.607037][ T8533] FS: 0000000001943940(0000) GS:ffff88812bf00000(0000) knlGS:0000000000000000 [ 339.616079][ T8533] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 339.622709][ T8533] CR2: 0000000000006028 CR3: 000000009eb60000 CR4: 00000000001406e0 [ 339.630685][ T8533] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 339.638680][ T8533] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 339.646655][ T8533] Call Trace: [ 339.649960][ T8533] j1939_netdev_notify+0x31/0xc0 [ 339.655031][ T8533] notifier_call_chain+0xd7/0x160 [ 339.660100][ T8533] raw_notifier_call_chain+0x37/0x50 [ 339.665395][ T8533] call_netdevice_notifiers_info+0x48/0xc0 [ 339.671210][ T8533] ? tun_show_group+0xc0/0xc0 [ 339.675896][ T8533] rollback_registered_many+0x723/0xa00 [ 339.681513][ T8533] rollback_registered+0xd2/0x160 [ 339.686692][ T8533] unregister_netdevice_queue+0x199/0x2e0 [ 339.692517][ T8533] __tun_detach+0xa1d/0xab0 [ 339.697147][ T8533] tun_chr_close+0x71/0xb0 [ 339.701602][ T8533] __fput+0x1e1/0x520 [ 339.705662][ T8533] ? tun_chr_ioctl+0x50/0x50 [ 339.710263][ T8533] ____fput+0x1f/0x30 [ 339.714378][ T8533] task_work_run+0xf6/0x130 [ 339.718890][ T8533] exit_to_usermode_loop+0x2b4/0x2c0 [ 339.724189][ T8533] do_syscall_64+0x353/0x370 [ 339.728841][ T8533] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 339.734819][ T8533] RIP: 0033:0x4141d1 [ 339.738760][ T8533] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 339.758350][ T8533] RSP: 002b:00007ffe3a010210 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 339.766770][ T8533] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004141d1 [ 339.774740][ T8533] RDX: 0000001b33620000 RSI: 0000000000000000 RDI: 0000000000000003 [ 339.782711][ T8533] RBP: 0000000000000001 R08: 00000000da3a7586 R09: ffffffffffffffff [ 339.790701][ T8533] R10: 00007ffe3a0102f0 R11: 0000000000000293 R12: 000000000075bf20 [ 339.799457][ T8533] R13: 0000000000052dd3 R14: 0000000000761138 R15: 000000000075bf2c [ 339.807429][ T8533] Modules linked in: [ 339.811325][ T8533] CR2: 0000000000006028 [ 339.815471][ T8533] ---[ end trace c7ee1facd52e137c ]--- [ 339.820991][ T8533] RIP: 0010:j1939_priv_get_by_ndev+0x76/0xc0 [ 339.827042][ T8533] Code: 81 fd 18 01 75 42 e8 49 d0 1b fd 48 8d bb f0 04 00 00 e8 ad dd 28 fd 48 8b 9b f0 04 00 00 48 8d bb 28 60 00 00 e8 9a dd 28 fd <4c> 8b a3 28 60 00 00 4d 85 e4 74 12 e8 19 d0 1b fd 49 8d bc 24 20 [ 339.846905][ T8533] RSP: 0018:ffffc90000e03b30 EFLAGS: 00010202 [ 339.853018][ T8533] RAX: 00000000000006ce RBX: 0000000000000000 RCX: ffffffff86040c68 [ 339.861018][ T8533] RDX: 0000000000000000 RSI: ffffffff84285c67 RDI: 0000000000006028 [ 339.868981][ T8533] RBP: ffffc90000e03b48 R08: 0000000000000000 R09: 0000000000006028 [ 339.877041][ T8533] R10: ffffc90000e03b80 R11: 000000000000602f R12: 0000000000000000 [ 339.885015][ T8533] R13: 0000000000000118 R14: ffffffff85c18c20 R15: 0000000000000000 [ 339.892981][ T8533] FS: 0000000001943940(0000) GS:ffff88812bf00000(0000) knlGS:0000000000000000 [ 339.901967][ T8533] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 339.908581][ T8533] CR2: 0000000000006028 CR3: 000000009eb60000 CR4: 00000000001406e0 [ 339.916552][ T8533] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 339.924588][ T8533] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 339.932566][ T8533] Kernel panic - not syncing: Fatal exception [ 339.940344][ T8533] Kernel Offset: disabled [ 339.944938][ T8533] Rebooting in 86400 seconds..