[info] Using makefile-style concurrent boot in runlevel 2. [ 47.300551][ T27] audit: type=1800 audit(1578450787.089:21): pid=7808 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 47.336050][ T27] audit: type=1800 audit(1578450787.089:22): pid=7808 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.30' (ECDSA) to the list of known hosts. 2020/01/08 02:33:20 fuzzer started 2020/01/08 02:33:21 dialing manager at 10.128.0.105:46717 2020/01/08 02:33:21 syscalls: 2808 2020/01/08 02:33:21 code coverage: enabled 2020/01/08 02:33:21 comparison tracing: enabled 2020/01/08 02:33:21 extra coverage: enabled 2020/01/08 02:33:21 setuid sandbox: enabled 2020/01/08 02:33:21 namespace sandbox: enabled 2020/01/08 02:33:21 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/08 02:33:21 fault injection: enabled 2020/01/08 02:33:21 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/08 02:33:21 net packet injection: enabled 2020/01/08 02:33:21 net device setup: enabled 2020/01/08 02:33:21 concurrency sanitizer: enabled 2020/01/08 02:33:21 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 64.785008][ T7973] KCSAN: could not find function: 'poll_schedule_timeout' 2020/01/08 02:33:32 adding functions to KCSAN blacklist: 'ktime_get_ts64' 'virtqueue_disable_cb' 'evict' 'iput' 'tomoyo_supervisor' 'shmem_add_to_page_cache' 'ext4_free_inodes_count' '__do_page_cache_readahead' 'copy_process' 'sbitmap_queue_clear' 'generic_permission' 'ext4_sync_file' '__ext4_new_inode' 'ep_poll' 'do_nanosleep' 'tick_sched_do_timer' 'poll_schedule_timeout' '__snd_rawmidi_transmit_ack' 'fasync_remove_entry' 'audit_log_start' 'run_timer_softirq' 'kauditd_thread' 'ktime_get_real_seconds' 'pid_update_inode' 'pcpu_alloc' 'ext4_mb_good_group' 'echo_char' 'find_get_pages_range_tag' 'can_send' 'vm_area_dup' 'mm_update_next_owner' 'blk_mq_get_request' 'blk_mq_sched_dispatch_requests' 'do_syslog' 'inode_sync_complete' '__add_to_page_cache_locked' 'rcu_gp_fqs_loop' '__mark_inode_dirty' 'futex_wait_queue_me' 'iomap_dio_bio_actor' 'find_next_bit' 'sit_tunnel_xmit' 'timer_clear_idle' 'ext4_nonda_switch' 'blk_mq_dispatch_rq_list' 'taskstats_exit' 'rcu_gp_fqs_check_wake' 'schedule_hrtimeout_range_clock' 'dd_has_work' 'ext4_has_free_clusters' 'add_timer' 'blk_mq_run_hw_queue' 'unix_release_sock' 'generic_write_end' 'xas_clear_mark' 'do_exit' 'ext4_free_inode' 'tick_nohz_idle_stop_tick' 'n_tty_receive_buf_common' 'xas_find_marked' 'tick_nohz_next_event' 'tick_do_update_jiffies64' 'ext4_mark_iloc_dirty' 'wbt_done' 'mod_timer' 'generic_fillattr' '__perf_event_overflow' '__hrtimer_run_queues' 02:36:13 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000001600)=""/4096, 0x1c80}], 0x1}, 0x40012100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x2}, &(0x7f0000000280)=0x14) pipe(&(0x7f0000000380)) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, 0x0) syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x80, 0x141042) syz_open_procfs(0xffffffffffffffff, 0x0) 02:36:14 executing program 1: getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, 0x0, 0x0) truncate(0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x14) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x14) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x14) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x14) unlink(&(0x7f0000000040)='./file0\x00') write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x3ff) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8), 0x0) [ 234.332286][ T7977] IPVS: ftp: loaded support on port[0] = 21 [ 234.451532][ T7977] chnl_net:caif_netlink_parms(): no params data found [ 234.522552][ T7977] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.529864][ T7977] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.538181][ T7977] device bridge_slave_0 entered promiscuous mode [ 234.545668][ T7977] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.552847][ T7977] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.561318][ T7977] device bridge_slave_1 entered promiscuous mode 02:36:14 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='tracefs\x00', 0x0, &(0x7f00000002c0)='}\xa8\x17\xd6\xfdgBV\x90`F\xeb\xf5\xe2\x03\x81\x02=\xffca\xb2\xca\xddr\xab\xc9[\x14!\xf2\xd4D+2\xfd\xf8n\xeb\xdaY\xb0r\xc4\x94\xb8\xa14\x827%L\xae\x04\x11\xc2h\n\x12\xeb\xe1v@zR\xe1\x1af\xc0\x8f\x13\xa0\x9f{uL\xce[;g\xc7\xd76\xd4\xa0\x1c') [ 234.578603][ T7980] IPVS: ftp: loaded support on port[0] = 21 [ 234.590430][ T7977] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.601412][ T7977] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.654249][ T7977] team0: Port device team_slave_0 added [ 234.678207][ T7977] team0: Port device team_slave_1 added [ 234.747956][ T7977] device hsr_slave_0 entered promiscuous mode [ 234.786002][ T7977] device hsr_slave_1 entered promiscuous mode 02:36:14 executing program 3: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890c, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) [ 234.859800][ T7983] IPVS: ftp: loaded support on port[0] = 21 [ 234.985702][ T7980] chnl_net:caif_netlink_parms(): no params data found [ 235.053260][ T7977] netdevsim netdevsim0 netdevsim0: renamed from eth0 02:36:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) [ 235.141289][ T7977] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 235.197480][ T7980] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.201926][ T7986] IPVS: ftp: loaded support on port[0] = 21 [ 235.204574][ T7980] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.205223][ T7980] device bridge_slave_0 entered promiscuous mode [ 235.246687][ T7983] chnl_net:caif_netlink_parms(): no params data found [ 235.255220][ T7980] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.275670][ T7980] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.283386][ T7980] device bridge_slave_1 entered promiscuous mode [ 235.306001][ T7977] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 235.362783][ T7977] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 235.448639][ T7980] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.473742][ T7989] IPVS: ftp: loaded support on port[0] = 21 [ 235.482253][ T7977] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.489440][ T7977] bridge0: port 2(bridge_slave_1) entered forwarding state 02:36:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r0, 0x5437, 0x0) [ 235.496739][ T7977] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.503763][ T7977] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.519046][ T7980] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 235.538830][ T7981] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.546831][ T7981] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.585250][ T7983] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.592678][ T7983] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.602452][ T7983] device bridge_slave_0 entered promiscuous mode [ 235.611687][ T7983] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.618850][ T7983] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.626616][ T7983] device bridge_slave_1 entered promiscuous mode [ 235.639758][ T7980] team0: Port device team_slave_0 added [ 235.646419][ T7980] team0: Port device team_slave_1 added [ 235.678747][ T7993] IPVS: ftp: loaded support on port[0] = 21 [ 235.703053][ T7983] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.715275][ T7983] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 235.797504][ T7980] device hsr_slave_0 entered promiscuous mode [ 235.846225][ T7980] device hsr_slave_1 entered promiscuous mode [ 235.895710][ T7980] debugfs: Directory 'hsr0' with parent '/' already present! [ 235.935695][ T7983] team0: Port device team_slave_0 added [ 235.943958][ T7983] team0: Port device team_slave_1 added [ 236.017535][ T7983] device hsr_slave_0 entered promiscuous mode [ 236.076226][ T7983] device hsr_slave_1 entered promiscuous mode [ 236.125796][ T7983] debugfs: Directory 'hsr0' with parent '/' already present! [ 236.135757][ T7986] chnl_net:caif_netlink_parms(): no params data found [ 236.162574][ T7977] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.231439][ T7993] chnl_net:caif_netlink_parms(): no params data found [ 236.245969][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.254222][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.269885][ T7989] chnl_net:caif_netlink_parms(): no params data found [ 236.299867][ T7986] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.307372][ T7986] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.315004][ T7986] device bridge_slave_0 entered promiscuous mode [ 236.324830][ T7986] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.332004][ T7986] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.339772][ T7986] device bridge_slave_1 entered promiscuous mode [ 236.350663][ T7977] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.378500][ T7986] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 236.391120][ T7980] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 236.458668][ T7980] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 236.501061][ T7986] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 236.520576][ T7993] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.528262][ T7993] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.536261][ T7993] device bridge_slave_0 entered promiscuous mode [ 236.544008][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.552816][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.561492][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.568643][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.576940][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.585692][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.594051][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.601093][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.609232][ T7980] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 236.662358][ T7980] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 236.728554][ T7986] team0: Port device team_slave_0 added [ 236.735556][ T7986] team0: Port device team_slave_1 added [ 236.741332][ T7993] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.748520][ T7993] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.757372][ T7993] device bridge_slave_1 entered promiscuous mode [ 236.775768][ T7993] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 236.809089][ T7983] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 236.849126][ T7993] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 236.859195][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 236.877167][ T7989] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.884219][ T7989] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.892233][ T7989] device bridge_slave_0 entered promiscuous mode [ 236.899967][ T7983] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 236.952807][ T7983] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 237.008374][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.017285][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.025891][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.034485][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.043135][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.051934][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.117830][ T7986] device hsr_slave_0 entered promiscuous mode [ 237.166228][ T7986] device hsr_slave_1 entered promiscuous mode [ 237.225793][ T7986] debugfs: Directory 'hsr0' with parent '/' already present! [ 237.236460][ T7989] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.243516][ T7989] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.251711][ T7989] device bridge_slave_1 entered promiscuous mode [ 237.271798][ T7983] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 237.318507][ T7989] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.330295][ T7989] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 237.340548][ T7993] team0: Port device team_slave_0 added [ 237.350084][ T7993] team0: Port device team_slave_1 added [ 237.358473][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.367454][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.433607][ T7989] team0: Port device team_slave_0 added [ 237.440350][ T7989] team0: Port device team_slave_1 added [ 237.448680][ T7977] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 237.459642][ T7977] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 237.468416][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.477072][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.528164][ T7993] device hsr_slave_0 entered promiscuous mode [ 237.565971][ T7993] device hsr_slave_1 entered promiscuous mode [ 237.615751][ T7993] debugfs: Directory 'hsr0' with parent '/' already present! [ 237.626372][ T7986] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 237.688177][ T7986] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 237.727966][ T7986] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 237.767763][ T7986] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 237.837530][ T7980] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.897554][ T7989] device hsr_slave_0 entered promiscuous mode [ 237.956106][ T7989] device hsr_slave_1 entered promiscuous mode [ 237.995730][ T7989] debugfs: Directory 'hsr0' with parent '/' already present! [ 238.004556][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 238.011931][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 238.027620][ T7977] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 238.036555][ T7980] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.052935][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.060859][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.093704][ T7983] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.101138][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.109898][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.118367][ T2411] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.125372][ T2411] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.133411][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.142018][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.150491][ T2411] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.157529][ T2411] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.165577][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.200661][ T7977] device veth0_vlan entered promiscuous mode [ 238.209275][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.222582][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.232138][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.240899][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.249515][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 238.258427][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 238.267187][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 238.275476][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.284320][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.292544][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.300990][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.324323][ T7983] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.333570][ T7977] device veth1_vlan entered promiscuous mode [ 238.340498][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 238.348872][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.357683][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.366245][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.374545][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.382701][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.390609][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.400336][ T7980] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 238.411494][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 238.447137][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.455884][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.464089][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.472716][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.481248][ T7990] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.488297][ T7990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.496056][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.504463][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.512888][ T7990] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.519953][ T7990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.528532][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.537877][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.574835][ T7986] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.588231][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 238.596604][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.605531][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.614087][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.623608][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.632404][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.641255][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.649661][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.658068][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.666428][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.674585][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 238.682336][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 238.689884][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.711173][ T7980] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 238.718925][ T7993] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 238.788030][ T7993] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 238.839303][ T7983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 238.848964][ T7989] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 238.917656][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 238.928513][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 238.938527][ T7993] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 238.992815][ T7989] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 239.037461][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.044874][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.053441][ T7993] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 239.111713][ T7983] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.126323][ T7989] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 239.147657][ T7989] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 239.187809][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 239.199723][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.208599][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.216738][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 239.230620][ T7980] device veth0_vlan entered promiscuous mode [ 239.241791][ T7986] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.255277][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.263328][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.291628][ T7980] device veth1_vlan entered promiscuous mode [ 239.299440][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 239.307663][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 239.317391][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.326177][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.334854][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.343476][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.350602][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.358929][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.367453][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.375899][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.382944][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.390912][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.408511][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.417620][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.442770][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 239.450884][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.459845][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.468728][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 239.490358][ T7983] device veth0_vlan entered promiscuous mode [ 239.500467][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 239.510782][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.519402][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.528232][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.538234][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.545981][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 239.576142][ T7983] device veth1_vlan entered promiscuous mode [ 239.601545][ T7986] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 239.620914][ T7986] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 239.640606][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 02:36:19 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r0, 0x5605, 0x0) [ 239.652161][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.676688][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.685229][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.705501][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.715062][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 239.727785][ T7989] 8021q: adding VLAN 0 to HW filter on device bond0 02:36:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400fbc700"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f300"/96], 0x74}}, 0x0) [ 239.773804][ T7986] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.798425][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 239.826550][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.837926][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.850555][ T7993] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.878346][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.899380][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 02:36:19 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x0, 0x0) read$eventfd(r3, 0x0, 0x0) 02:36:19 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000001600)=""/4096, 0x1c80}], 0x1}, 0x40012100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x2}, &(0x7f0000000280)=0x14) pipe(&(0x7f0000000380)) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, 0x0) syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x80, 0x141042) syz_open_procfs(0xffffffffffffffff, 0x0) [ 239.926115][ T7993] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.939871][ T7989] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.955590][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.973565][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.998692][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 240.012199][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.048363][ T7986] device veth0_vlan entered promiscuous mode [ 240.072100][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 240.085062][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 02:36:19 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f000000000000"], &(0x7f0000004600)=""/192, 0x36, 0xc0, 0x8}, 0x20) [ 240.106748][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.115227][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.124950][ T7990] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.132033][ T7990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.140657][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.162988][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.176950][ T7990] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.184099][ T7990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.206665][ T8034] BPF:Section overlap found 02:36:20 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f000000000000"], &(0x7f0000004600)=""/192, 0x36, 0xc0, 0x8}, 0x20) [ 240.208087][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.220110][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.223137][ T8035] BPF:Section overlap found [ 240.229175][ T7990] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.239820][ T7990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.248927][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.270373][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.274254][ T8039] BPF:Section overlap found [ 240.287827][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.306198][ T7990] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.313266][ T7990] bridge0: port 2(bridge_slave_1) entered forwarding state 02:36:20 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f000000000000"], &(0x7f0000004600)=""/192, 0x36, 0xc0, 0x8}, 0x20) [ 240.321445][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.330372][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.340106][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.358532][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 02:36:20 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f000000000000"], &(0x7f0000004600)=""/192, 0x36, 0xc0, 0x8}, 0x20) [ 240.383322][ T7986] device veth1_vlan entered promiscuous mode [ 240.390587][ T8043] BPF:Section overlap found [ 240.399267][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.408899][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 02:36:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) [ 240.436466][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 240.452683][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.461524][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.469519][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.478174][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.487272][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.488073][ T8046] BPF:Section overlap found [ 240.496266][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.508857][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.520226][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.529056][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.541563][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.551929][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.564042][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.574732][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.601808][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.610232][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.621511][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.630176][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.638685][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.654160][ T7993] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.672289][ T7989] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 240.690055][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.703394][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 240.713037][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.736039][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.743485][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.759509][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.807969][ T7989] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.824356][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.837490][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.844811][ T27] kauditd_printk_skb: 8 callbacks suppressed [ 240.844904][ T27] audit: type=1800 audit(1578450980.629:31): pid=8063 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16529 res=0 [ 240.892247][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready 02:36:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x14, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x49f) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) [ 240.918882][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.953466][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 240.965285][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.981398][ T7993] device veth0_vlan entered promiscuous mode [ 241.011547][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.030494][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.054168][ T8074] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 241.067702][ T7993] device veth1_vlan entered promiscuous mode [ 241.078817][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 241.087254][ T8074] FAT-fs (loop3): Filesystem has been set read-only [ 241.094436][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.102891][ T8074] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 970769) [ 241.124386][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 241.135951][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.147099][ T7989] device veth0_vlan entered promiscuous mode [ 241.155139][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.162989][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.206506][ T7989] device veth1_vlan entered promiscuous mode 02:36:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) 02:36:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f000000000000"], &(0x7f0000004600)=""/192, 0x36, 0xc0, 0x8}, 0x20) 02:36:21 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000003c0)={0x9, 0x1, "03"}, 0x0) 02:36:21 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cuse\x00', 0x2842, 0x0) io_setup(0x1, &(0x7f0000000040)=0x0) io_submit(r1, 0x200000000000004d, &(0x7f0000002600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xffffff81}]) 02:36:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x14, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x49f) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) 02:36:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x14, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x49f) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) [ 241.506439][ T8100] BPF:Section overlap found [ 241.556278][ T8099] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 241.565390][ T8099] FAT-fs (loop5): Filesystem has been set read-only [ 241.572612][ T8099] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 970769) 02:36:21 executing program 5: request_key(&(0x7f0000000980)='dns_resolver\x00', &(0x7f0000000840)={'syz', 0x3}, 0x0, 0x0) 02:36:21 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) wait4(r1, 0x0, 0x0, 0x0) 02:36:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f000000000000"], &(0x7f0000004600)=""/192, 0x36, 0xc0, 0x8}, 0x20) 02:36:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount$9p_xen(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=xen,'}) [ 241.719704][ T8097] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 241.752848][ T8097] FAT-fs (loop3): Filesystem has been set read-only [ 241.764140][ T8097] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 970769) 02:36:21 executing program 4: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$team(0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000500)=""/77, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8696071") socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0xf8, 0xf8, 0xf8, 0x0, 0xf8, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@dev, @local, [], [], 'team_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) [ 241.856909][ T8119] BPF:Section overlap found [ 241.892655][ T8123] 9pnet: Could not find request transport: xen 02:36:21 executing program 5: request_key(&(0x7f0000000980)='dns_resolver\x00', &(0x7f0000000840)={'syz', 0x3}, 0x0, 0x0) 02:36:21 executing program 3: mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000140)='./bus\x00', &(0x7f0000000040)='cifs\x00', 0x0, &(0x7f0000000000)='\x14\x18\xc8\xd48\x03\x9du\x05\xb6:\xd8\x06\x88\'}A\x04\xe0B=\xc0\x1a') 02:36:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) chdir(&(0x7f0000000040)='./file0\x00') 02:36:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f000000000000"], &(0x7f0000004600)=""/192, 0x36, 0xc0, 0x8}, 0x20) 02:36:21 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0xc040563e, &(0x7f00000000c0)) [ 241.996013][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 242.004323][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 02:36:21 executing program 4: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@dir_umask={'dir_umask'}}]}) 02:36:22 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000001900)=ANY=[@ANYBLOB="020000000100eb800000000002", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r1], 0x6, 0x1) r3 = gettid() waitid(0x83b895581628fca4, r3, &(0x7f0000000040), 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27) syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r2, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e23, 0x10001, @mcast2}, r5}}, 0x38) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0xfffffff8, @mcast1}, r5}}, 0x30) [ 242.183407][ T8144] BPF:Section overlap found 02:36:22 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000240)=0x54) 02:36:22 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f000000000000"], &(0x7f0000004600)=""/192, 0x36, 0xc0, 0x8}, 0x20) [ 242.267326][ T8149] hfs: can't find a HFS filesystem on dev loop4 02:36:22 executing program 3: clone(0x78426900, 0x0, 0x0, 0x0, 0x0) [ 242.388866][ T8149] hfs: can't find a HFS filesystem on dev loop4 02:36:22 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x78426900, 0x0, 0x0, 0x0, 0x0) [ 242.475180][ T8165] BPF:Section overlap found [ 242.482528][ T8167] IPVS: ftp: loaded support on port[0] = 21 02:36:22 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000700)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556e, 0x715000) 02:36:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) r1 = dup(0xffffffffffffffff) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r1}) 02:36:22 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f000000000000"], &(0x7f0000004600)=""/192, 0x36, 0xc0, 0x8}, 0x20) [ 242.654361][ T8175] IPVS: ftp: loaded support on port[0] = 21 [ 242.782338][ T8187] BPF:Section overlap found 02:36:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) chdir(&(0x7f0000000040)='./file0\x00') 02:36:22 executing program 3: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r1 = socket(0x40000000015, 0x5, 0x0) close(r1) 02:36:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r0, 0x560a, &(0x7f0000000040)) 02:36:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x129f0817) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 02:36:22 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f000000000000"], &(0x7f0000004600)=""/192, 0x36, 0xc0, 0x8}, 0x20) [ 243.042562][ T8203] BPF:Section overlap found 02:36:22 executing program 0: mkdir(0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) 02:36:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xd) read(r0, 0x0, 0x600) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 02:36:22 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 02:36:22 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001f4, 0x0) 02:36:23 executing program 3: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8696071") getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, 0x0, 0x0) 02:36:23 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 02:36:23 executing program 0: r0 = socket$inet(0x2, 0x4040000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000002c0)=0x7ff, 0x4) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendto(r0, &(0x7f00000022c0)="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", 0x800, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) socket$inet6_sctp(0xa, 0x0, 0x84) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xffc}], 0x1}, 0x0) 02:36:23 executing program 1: add_key(&(0x7f0000000180)='rxrpc\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsgid(r1) 02:36:23 executing program 3: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r1, 0x0, 0xd89, 0x8000) write$binfmt_script(r1, &(0x7f0000000700)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="c6292bdfe740aba82d39d236ab243347a178fb1fb08609f55c860b7274ce37fba681b500d0c814f800b8011a484e65b37e866369e0751b310c2e4c24e0ef4ea10fc52917933e5d43882ddc9958ed93b665d9e45871f7687d63f44d4d868a2bf9e07a4bbe73665b0a0fe52f521c2b6241c75c103043263620a87d6440942d8d8e6c926f97a05d8fe5a761f815f8bff0425985fc1e405eba43b4b1850f976e4f1c37b661fce5d4d9fde8598aac734c0afdd143c93f740100008000000000e00e9a4e9715922738e89de8f4aa62fe469b2298752d9eb870004e5079ef"], 0xfc7c) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)=0x84008) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='~'], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fallocate(r0, 0x8, 0x0, 0x8000) 02:36:23 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 02:36:23 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x4000) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000003180)) 02:36:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xd) read(r0, 0x0, 0x600) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 02:36:23 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_SET_ONE_REG(r1, 0x8010743f, 0x0) 02:36:23 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000004600)=""/192, 0x0, 0xc0, 0x8}, 0x20) 02:36:23 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000004600)=""/192, 0x0, 0xc0, 0x8}, 0x20) 02:36:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) ftruncate(r3, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 244.057386][ T8282] BPF:hdr_len not found 02:36:23 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@creator={'creator', 0x3d, ',\a\x00'}}]}) 02:36:23 executing program 3: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r1, 0x0, 0xd89, 0x8000) write$binfmt_script(r1, &(0x7f0000000700)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="c6292bdfe740aba82d39d236ab243347a178fb1fb08609f55c860b7274ce37fba681b500d0c814f800b8011a484e65b37e866369e0751b310c2e4c24e0ef4ea10fc52917933e5d43882ddc9958ed93b665d9e45871f7687d63f44d4d868a2bf9e07a4bbe73665b0a0fe52f521c2b6241c75c103043263620a87d6440942d8d8e6c926f97a05d8fe5a761f815f8bff0425985fc1e405eba43b4b1850f976e4f1c37b661fce5d4d9fde8598aac734c0afdd143c93f740100008000000000e00e9a4e9715922738e89de8f4aa62fe469b2298752d9eb870004e5079ef"], 0xfc7c) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)=0x84008) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='~'], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fallocate(r0, 0x8, 0x0, 0x8000) 02:36:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000240)=""/52, &(0x7f0000000280)=0x34) 02:36:24 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x4000) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000003180)) [ 244.252416][ T8295] hfsplus: unable to parse mount options [ 244.306839][ T8299] BPF:hdr_len not found [ 244.370065][ T8308] IPVS: length: 52 != 24 [ 244.379151][ T8295] hfsplus: unable to parse mount options [ 244.429581][ C0] hrtimer: interrupt took 26177 ns 02:36:24 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000004600)=""/192, 0x0, 0xc0, 0x8}, 0x20) 02:36:24 executing program 1: 02:36:24 executing program 5: 02:36:24 executing program 3: [ 244.602868][ T8320] BPF:hdr_len not found 02:36:24 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[], &(0x7f0000004600)=""/192, 0x0, 0xc0, 0x8}, 0x20) 02:36:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) ftruncate(r3, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 02:36:24 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x4000) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000003180)) 02:36:24 executing program 1: 02:36:24 executing program 3: [ 244.837132][ T8331] BPF:hdr_len not found 02:36:24 executing program 5: 02:36:24 executing program 1: 02:36:24 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[], &(0x7f0000004600)=""/192, 0x0, 0xc0, 0x8}, 0x20) 02:36:24 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x4000) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000003180)) 02:36:24 executing program 3: 02:36:24 executing program 5: 02:36:25 executing program 1: 02:36:25 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[], &(0x7f0000004600)=""/192, 0x0, 0xc0, 0x8}, 0x20) [ 245.227943][ T8354] BPF:hdr_len not found [ 245.432801][ T8364] BPF:hdr_len not found 02:36:25 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000004600)=""/192, 0x0, 0xc0, 0x8}, 0x20) 02:36:25 executing program 0: 02:36:25 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x4000) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) 02:36:25 executing program 5: 02:36:25 executing program 1: 02:36:25 executing program 3: 02:36:25 executing program 5: 02:36:25 executing program 3: [ 245.605101][ T8376] BPF:hdr_len not found 02:36:25 executing program 1: 02:36:25 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000004600)=""/192, 0x0, 0xc0, 0x8}, 0x20) 02:36:25 executing program 0: 02:36:25 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x4000) 02:36:25 executing program 3: 02:36:25 executing program 5: [ 245.866619][ T8389] BPF:hdr_len not found 02:36:25 executing program 1: 02:36:25 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000004600)=""/192, 0x0, 0xc0, 0x8}, 0x20) 02:36:25 executing program 0: 02:36:25 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x4000) 02:36:25 executing program 3: 02:36:25 executing program 1: 02:36:25 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000"], &(0x7f0000004600)=""/192, 0x1b, 0xc0, 0x8}, 0x20) [ 246.151415][ T8404] BPF:hdr_len not found 02:36:26 executing program 5: 02:36:26 executing program 3: 02:36:26 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000"], &(0x7f0000004600)=""/192, 0x1b, 0xc0, 0x8}, 0x20) [ 246.315742][ T8416] BPF:Total section length too long 02:36:26 executing program 1: 02:36:26 executing program 0: 02:36:26 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x4000) [ 246.467287][ T8425] BPF:Total section length too long 02:36:26 executing program 5: 02:36:26 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000"], &(0x7f0000004600)=""/192, 0x1b, 0xc0, 0x8}, 0x20) 02:36:26 executing program 3: 02:36:26 executing program 1: 02:36:26 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d000000000100000000"], &(0x7f0000004600)=""/192, 0x29, 0xc0, 0x8}, 0x20) [ 246.637066][ T8436] BPF:Total section length too long 02:36:26 executing program 0: 02:36:26 executing program 4: syz_open_dev$evdev(0x0, 0x3b80, 0x4000) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) [ 246.761800][ T8444] BPF:Total section length too long 02:36:26 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d000000000100000000"], &(0x7f0000004600)=""/192, 0x29, 0xc0, 0x8}, 0x20) 02:36:26 executing program 3: 02:36:26 executing program 1: 02:36:26 executing program 5: [ 246.941811][ T8453] BPF:Total section length too long 02:36:26 executing program 0: 02:36:26 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d000000000100000000"], &(0x7f0000004600)=""/192, 0x29, 0xc0, 0x8}, 0x20) 02:36:26 executing program 4: syz_open_dev$evdev(0x0, 0x3b80, 0x4000) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) 02:36:26 executing program 5: 02:36:26 executing program 3: 02:36:26 executing program 1: [ 247.196331][ T8466] BPF:Total section length too long 02:36:27 executing program 0: 02:36:27 executing program 5: 02:36:27 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f"], &(0x7f0000004600)=""/192, 0x30, 0xc0, 0x8}, 0x20) 02:36:27 executing program 1: 02:36:27 executing program 3: 02:36:27 executing program 0: 02:36:27 executing program 4: syz_open_dev$evdev(0x0, 0x3b80, 0x4000) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) [ 247.554384][ T8489] BPF:Total section length too long 02:36:27 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f"], &(0x7f0000004600)=""/192, 0x30, 0xc0, 0x8}, 0x20) 02:36:27 executing program 5: 02:36:27 executing program 1: 02:36:27 executing program 0: 02:36:27 executing program 3: [ 247.737414][ T8498] BPF:Total section length too long 02:36:27 executing program 5: 02:36:27 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x0, 0x4000) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) 02:36:27 executing program 1: 02:36:27 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f"], &(0x7f0000004600)=""/192, 0x30, 0xc0, 0x8}, 0x20) 02:36:27 executing program 0: 02:36:27 executing program 3: 02:36:27 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f000000"], &(0x7f0000004600)=""/192, 0x33, 0xc0, 0x8}, 0x20) [ 248.052770][ T8517] BPF:Total section length too long 02:36:27 executing program 3: 02:36:27 executing program 1: 02:36:28 executing program 0: 02:36:28 executing program 5: 02:36:28 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x0, 0x4000) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) [ 248.257760][ T8525] BPF:Total section length too long 02:36:28 executing program 3: 02:36:28 executing program 1: 02:36:28 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f000000"], &(0x7f0000004600)=""/192, 0x33, 0xc0, 0x8}, 0x20) 02:36:28 executing program 0: 02:36:28 executing program 5: 02:36:28 executing program 3: 02:36:28 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f000000"], &(0x7f0000004600)=""/192, 0x33, 0xc0, 0x8}, 0x20) 02:36:28 executing program 1: [ 248.601946][ T8544] BPF:Total section length too long 02:36:28 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x0, 0x4000) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) 02:36:28 executing program 0: 02:36:28 executing program 5: [ 248.781599][ T8554] BPF:Total section length too long 02:36:28 executing program 3: 02:36:28 executing program 1: 02:36:28 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f0000000000"], &(0x7f0000004600)=""/192, 0x35, 0xc0, 0x8}, 0x20) 02:36:28 executing program 5: 02:36:28 executing program 0: 02:36:28 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) 02:36:28 executing program 3: 02:36:28 executing program 1: [ 249.163600][ T8576] BPF:Section overlap found 02:36:29 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f0000000000"], &(0x7f0000004600)=""/192, 0x35, 0xc0, 0x8}, 0x20) 02:36:29 executing program 5: 02:36:29 executing program 1: 02:36:29 executing program 0: [ 249.394239][ T8586] BPF:Section overlap found 02:36:29 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) 02:36:29 executing program 3: 02:36:29 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f0000000000"], &(0x7f0000004600)=""/192, 0x35, 0xc0, 0x8}, 0x20) 02:36:29 executing program 5: 02:36:29 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f00000000"], &(0x7f0000004600)=""/192, 0x34, 0xc0, 0x8}, 0x20) [ 249.581547][ T8598] BPF:Section overlap found 02:36:29 executing program 0: 02:36:29 executing program 1: 02:36:29 executing program 3: 02:36:29 executing program 5: 02:36:29 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f00000000"], &(0x7f0000004600)=""/192, 0x34, 0xc0, 0x8}, 0x20) [ 249.818262][ T8611] BPF:Section overlap found 02:36:29 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x0) 02:36:29 executing program 1: 02:36:29 executing program 3: 02:36:29 executing program 5: 02:36:29 executing program 0: [ 250.087907][ T8629] BPF:Section overlap found 02:36:29 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f000000"], &(0x7f0000004600)=""/192, 0x33, 0xc0, 0x8}, 0x20) 02:36:30 executing program 5: 02:36:30 executing program 3: 02:36:30 executing program 0: 02:36:30 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x4000) syz_open_dev$evdev(0x0, 0x3b80, 0x0) 02:36:30 executing program 1: [ 250.329493][ T8640] BPF:Total section length too long 02:36:30 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f000000"], &(0x7f0000004600)=""/192, 0x33, 0xc0, 0x8}, 0x20) 02:36:30 executing program 5: 02:36:30 executing program 0: 02:36:30 executing program 3: 02:36:30 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f000000"], &(0x7f0000004600)=""/192, 0x33, 0xc0, 0x8}, 0x20) [ 250.537663][ T8650] BPF:Total section length too long 02:36:30 executing program 1: 02:36:30 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x4000) syz_open_dev$evdev(0x0, 0x3b80, 0x0) 02:36:30 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f00000000"], 0x0, 0x34, 0x0, 0x8}, 0x20) 02:36:30 executing program 3: [ 250.727660][ T8663] BPF:Total section length too long 02:36:30 executing program 5: 02:36:30 executing program 1: 02:36:30 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f00000000"], 0x0, 0x34, 0x0, 0x8}, 0x20) 02:36:30 executing program 0: 02:36:30 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x4000) syz_open_dev$evdev(0x0, 0x3b80, 0x0) 02:36:30 executing program 3: 02:36:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000400)={"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"}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000100)) 02:36:31 executing program 5: bind$alg(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x4) socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1d2) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 02:36:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501886400de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 02:36:31 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f00000000"], 0x0, 0x34, 0x0, 0x8}, 0x20) 02:36:31 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x4000) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x0, 0x0) 02:36:31 executing program 3: [ 251.336749][ T8699] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 02:36:31 executing program 3: [ 251.406197][ T8697] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 251.414922][ T8697] FAT-fs (loop5): Filesystem has been set read-only [ 251.422014][ T8697] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 02:36:31 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f00000000"], &(0x7f0000004600)=""/192, 0x34, 0xc0}, 0x20) 02:36:31 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f00000000"], &(0x7f0000004600)=""/192, 0x34, 0xc0}, 0x20) 02:36:31 executing program 1: 02:36:31 executing program 5: bind$alg(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x4) socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="a7724bdef64346bc14b7b0f781d1d3abf9d1a51c4bfce1e77551a8bd678625f508300200000040847bc2fdffe8cd0800035041291559f2ee3aacfb33c6af9680d512f4d8a5c51817c3ff01a1f61dc71e85445d8f244f6be479ffffffffff8756ea7d486588272169d8b90f1d7106f5776f7894ee47382b8811e658a4c901bbce28f38a9a0eba9b9d6a058c5f5ed199fcf8722be75fa42c080601d48e793d1429196b4d9182f7c40059a074285b251aca195af3b2887cc79d0ced1e50042390a546375c8c1f1744a24583e1f806cd77ba3762013b69ceb7db8b96da88a38c993404753155998e84bb53142ff581e650c08e9f678c6ec93cc083a1a1493814d40800000000000000004bf420b8e8c1c1ee6864030ad290e6d12699d60f2fdd477f0409950e8a44d65111987fb7feab9c2029f5841fc2ab5013bfe08f1992196c79acbc37c55fd7db98851f565e2374b5d8fd0e273061e1f0194368ccb7b6b42fffb713246aacddf55286294a7e3a61879f66f3c8848705b3a6646ae537911db6d4d3893e00004c47aa0a2551b2b2ecb7d892e6fe277f43c8ce25f1d41ad7f58b73911d56be684c831c2f44d899139f52756b9418de29e9e85828f19491a3dda0ffe0eafa84957501260ae2c76ad05733f78450"], 0x1d2) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 02:36:31 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x4000) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x0, 0x0) 02:36:31 executing program 3: bind$alg(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x4) socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1d2) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 02:36:31 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000000b00000004000000000000000200008d0000000001000000000000000000c72f00000000"], &(0x7f0000004600)=""/192, 0x34, 0xc0}, 0x20) 02:36:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501886400de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 02:36:31 executing program 1: [ 252.078338][ T8738] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 252.087060][ T8738] FAT-fs (loop3): Filesystem has been set read-only [ 252.094171][ T8738] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:36:31 executing program 1: [ 252.123374][ T8741] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 252.132225][ T8741] FAT-fs (loop5): Filesystem has been set read-only [ 252.139212][ T8741] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 02:36:32 executing program 2: 02:36:32 executing program 3: 02:36:32 executing program 1: 02:36:32 executing program 4: syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x3b80, 0x4000) syz_open_dev$evdev(&(0x7f0000003140)='/dev/input/event#\x00', 0x0, 0x0) 02:36:32 executing program 5: 02:36:32 executing program 0: 02:36:32 executing program 1: 02:36:32 executing program 2: 02:36:32 executing program 3: 02:36:32 executing program 0: 02:36:32 executing program 4: 02:36:32 executing program 5: 02:36:32 executing program 1: 02:36:32 executing program 2: 02:36:32 executing program 3: 02:36:32 executing program 4: 02:36:32 executing program 5: 02:36:32 executing program 0: 02:36:32 executing program 1: 02:36:32 executing program 3: 02:36:32 executing program 2: 02:36:33 executing program 4: 02:36:33 executing program 5: 02:36:33 executing program 0: 02:36:33 executing program 1: 02:36:33 executing program 3: 02:36:33 executing program 2: 02:36:33 executing program 4: 02:36:33 executing program 5: 02:36:33 executing program 0: 02:36:33 executing program 1: 02:36:33 executing program 3: 02:36:33 executing program 2: 02:36:33 executing program 4: 02:36:33 executing program 5: 02:36:33 executing program 0: 02:36:33 executing program 1: 02:36:33 executing program 4: 02:36:33 executing program 3: 02:36:33 executing program 2: 02:36:33 executing program 5: 02:36:34 executing program 0: 02:36:34 executing program 4: 02:36:34 executing program 1: 02:36:34 executing program 3: 02:36:34 executing program 5: 02:36:34 executing program 2: 02:36:34 executing program 4: 02:36:34 executing program 0: 02:36:34 executing program 1: 02:36:34 executing program 5: 02:36:34 executing program 3: 02:36:34 executing program 4: 02:36:34 executing program 2: 02:36:34 executing program 0: 02:36:34 executing program 1: 02:36:34 executing program 3: 02:36:34 executing program 5: 02:36:34 executing program 0: 02:36:34 executing program 4: 02:36:34 executing program 3: 02:36:35 executing program 1: 02:36:35 executing program 2: 02:36:35 executing program 5: 02:36:35 executing program 0: 02:36:35 executing program 3: 02:36:35 executing program 4: 02:36:35 executing program 1: 02:36:35 executing program 3: 02:36:35 executing program 2: 02:36:35 executing program 0: 02:36:35 executing program 5: 02:36:35 executing program 4: 02:36:35 executing program 1: 02:36:35 executing program 3: 02:36:35 executing program 0: 02:36:35 executing program 5: 02:36:35 executing program 2: 02:36:35 executing program 4: 02:36:35 executing program 1: 02:36:35 executing program 0: 02:36:35 executing program 5: 02:36:36 executing program 3: 02:36:36 executing program 4: 02:36:36 executing program 2: 02:36:36 executing program 1: 02:36:36 executing program 0: 02:36:36 executing program 5: 02:36:36 executing program 3: 02:36:36 executing program 4: 02:36:36 executing program 2: 02:36:36 executing program 1: 02:36:36 executing program 3: 02:36:36 executing program 0: 02:36:36 executing program 5: 02:36:36 executing program 4: 02:36:36 executing program 2: 02:36:36 executing program 0: 02:36:36 executing program 2: 02:36:36 executing program 4: 02:36:36 executing program 1: 02:36:36 executing program 3: 02:36:36 executing program 5: 02:36:37 executing program 0: 02:36:37 executing program 4: 02:36:37 executing program 2: 02:36:37 executing program 3: 02:36:37 executing program 1: 02:36:37 executing program 5: 02:36:37 executing program 0: 02:36:37 executing program 2: 02:36:37 executing program 3: 02:36:37 executing program 4: 02:36:37 executing program 5: 02:36:37 executing program 1: 02:36:37 executing program 4: 02:36:37 executing program 0: 02:36:37 executing program 3: 02:36:37 executing program 2: 02:36:37 executing program 5: 02:36:37 executing program 1: 02:36:37 executing program 2: 02:36:37 executing program 3: 02:36:37 executing program 5: 02:36:37 executing program 4: 02:36:37 executing program 1: 02:36:38 executing program 0: 02:36:38 executing program 5: 02:36:38 executing program 1: 02:36:38 executing program 3: 02:36:38 executing program 0: 02:36:38 executing program 4: 02:36:38 executing program 2: 02:36:38 executing program 1: 02:36:38 executing program 0: 02:36:38 executing program 2: 02:36:38 executing program 4: 02:36:38 executing program 5: 02:36:38 executing program 3: 02:36:38 executing program 4: 02:36:38 executing program 1: 02:36:38 executing program 5: 02:36:38 executing program 2: 02:36:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) dup2(0xffffffffffffffff, 0xffffffffffffffff) 02:36:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = socket(0x11, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 02:36:39 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) mkdir(&(0x7f0000632000)='./file0\x00', 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 02:36:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000002000)={0x1}) fcntl$lock(r0, 0x25, &(0x7f0000000080)) 02:36:39 executing program 1: 02:36:39 executing program 2: 02:36:39 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000100)=0x401, 0x3) 02:36:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2}}, 0x20) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 02:36:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000180)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f8005000000f554000019824db2e4e486872e7300000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000016000006c0349102360100001007f396afb7296ec810edffffffffffffff013ddb73c0f07f20f621b20ab1803cb02963a5300331889871c38d7d5d124a49f729f63f6e4e43b390e31c", 0xb2}], 0x0, 0x0) 02:36:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = socket(0x11, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 02:36:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = socket(0x11, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 02:36:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff}) fcntl$lock(r0, 0x5, &(0x7f0000002000)={0x0, 0x1}) 02:36:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}}}, 0x30) 02:36:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2}}, 0x20) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 02:36:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = socket(0x11, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 259.903145][ T9085] XFS (loop1): device supports 512 byte sectors (not 0) 02:36:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) 02:36:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000180)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f8005000000f554000019824db2e4e486872e7300000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000016000006c0349102360100001007f396afb7296ec810edffffffffffffff013ddb73c0f07f20f621b20ab1803cb02963a5300331889871c38d7d5d124a49f729f63f6e4e43b390e31c", 0xb2}], 0x0, 0x0) [ 260.056045][ T9085] XFS (loop1): device supports 512 byte sectors (not 0) 02:36:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) 02:36:39 executing program 5: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000080)=""/254, 0xfe) 02:36:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000400)={"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"}) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) [ 260.224858][ T9119] cgroup: fork rejected by pids controller in /syz2 02:36:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) 02:36:40 executing program 4: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x5, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) 02:36:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = socket(0x11, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 260.328659][ T9118] XFS (loop1): device supports 512 byte sectors (not 0) 02:36:40 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) 02:36:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x4000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) [ 260.558233][ T9149] x_tables: duplicate underflow at hook 2 02:36:40 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw6\x00') perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x100000003) 02:36:40 executing program 2: inotify_init() openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mISDNtimer\x00', 0x0, 0x0) socket(0x1e, 0x805, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 02:36:40 executing program 5: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000800", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f00000002c0)={r5, @in={{0x2, 0x0, @dev}}}, &(0x7f0000000240)=0x100) 02:36:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = socket(0x11, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 02:36:40 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) [ 260.821243][ T9163] xt_bpf: check failed: parse error [ 260.892966][ T9170] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 02:36:40 executing program 1: r0 = socket(0x11, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") time(&(0x7f00000000c0)) [ 260.995505][ T9181] xt_bpf: check failed: parse error [ 261.001332][ T9170] batman_adv: batadv0: Adding interface: veth3 02:36:40 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) [ 261.030255][ T9170] batman_adv: batadv0: The MTU of interface veth3 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 02:36:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = socket(0x11, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 261.186093][ T9170] batman_adv: batadv0: Not using interface veth3 (retrying later): interface not active [ 261.219271][ T9184] batman_adv: batadv0: Removing interface: veth3 [ 261.240657][ T9196] xt_bpf: check failed: parse error 02:36:41 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) [ 261.273740][ T9170] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 02:36:41 executing program 1: shmctl$SHM_STAT_ANY(0x0, 0xf, &(0x7f0000000040)=""/143) 02:36:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = socket(0x11, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) [ 261.329312][ T9184] batman_adv: batadv0: Adding interface: veth3 [ 261.358335][ T9184] batman_adv: batadv0: The MTU of interface veth3 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 261.438792][ T9184] batman_adv: batadv0: Not using interface veth3 (retrying later): interface not active [ 261.461103][ T9204] xt_bpf: check failed: parse error 02:36:41 executing program 4: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x1ad, 0x0, 0x0) msgsnd(0x0, &(0x7f0000001100)={0x2}, 0x8, 0x0) 02:36:41 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) 02:36:41 executing program 1: socket$inet6(0xa, 0x400000000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000140)) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x24020400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 02:36:41 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x21a, 0x0, 0x59, 0x0, 0x1d7}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='oom_score\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 02:36:41 executing program 2: inotify_init() openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mISDNtimer\x00', 0x0, 0x0) socket(0x1e, 0x805, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 02:36:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = socket(0x11, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 02:36:41 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) 02:36:41 executing program 1: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0x10, 0x8000000100000003, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000440), 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000001ac0)=0x3, 0x4) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = socket(0x10, 0x803, 0x0) r8 = socket(0x2000000000000010, 0x3, 0x0) sendmsg$IPVS_CMD_GET_DEST(r8, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(r7, 0x0, 0x8000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xb, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x5}]}}}]}, 0x44}}, 0x0) 02:36:41 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw6\x00') sendfile(r0, r1, 0x0, 0x100000003) 02:36:41 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) 02:36:41 executing program 1: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0x10, 0x8000000100000003, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000440), 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000001ac0)=0x3, 0x4) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = socket(0x10, 0x803, 0x0) r8 = socket(0x2000000000000010, 0x3, 0x0) sendmsg$IPVS_CMD_GET_DEST(r8, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(r7, 0x0, 0x8000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xb, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x5}]}}}]}, 0x44}}, 0x0) 02:36:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = socket(0x11, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 02:36:41 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) 02:36:41 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x21a, 0x0, 0x59, 0x0, 0x1d7}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='oom_score\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 02:36:42 executing program 1: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0x10, 0x8000000100000003, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000440), 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000001ac0)=0x3, 0x4) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = socket(0x10, 0x803, 0x0) r8 = socket(0x2000000000000010, 0x3, 0x0) sendmsg$IPVS_CMD_GET_DEST(r8, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(r7, 0x0, 0x8000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xb, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x5}]}}}]}, 0x44}}, 0x0) [ 262.335343][ T9260] xt_bpf: check failed: parse error 02:36:42 executing program 4: socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xbf) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000700)={0xfffffffffffffffd, 0x40000007fff, 0x7ffffffe}, 0x14) shutdown(r0, 0x2) 02:36:42 executing program 2: inotify_init() openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mISDNtimer\x00', 0x0, 0x0) socket(0x1e, 0x805, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 02:36:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = socket(0x11, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 02:36:42 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) 02:36:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 02:36:42 executing program 1: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0x10, 0x8000000100000003, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000440), 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000001ac0)=0x3, 0x4) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = socket(0x10, 0x803, 0x0) r8 = socket(0x2000000000000010, 0x3, 0x0) sendmsg$IPVS_CMD_GET_DEST(r8, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(r7, 0x0, 0x8000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xb, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x5}]}}}]}, 0x44}}, 0x0) 02:36:42 executing program 4: socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xbf) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000700)={0xfffffffffffffffd, 0x40000007fff, 0x7ffffffe}, 0x14) shutdown(r0, 0x2) [ 262.770011][ T9288] xt_bpf: check failed: parse error 02:36:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) socket(0x11, 0x80002, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 02:36:42 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) 02:36:42 executing program 5: r0 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 02:36:42 executing program 1: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0x10, 0x8000000100000003, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000440), 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000001ac0)=0x3, 0x4) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x10, 0x803, 0x0) r7 = socket(0x2000000000000010, 0x3, 0x0) sendmsg$IPVS_CMD_GET_DEST(r7, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xb, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x5}]}}}]}, 0x44}}, 0x0) 02:36:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f00000004c0)={"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"}) 02:36:42 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) [ 263.079297][ T9310] xt_bpf: check failed: parse error [ 263.270482][ T9321] xt_bpf: check failed: parse error 02:36:43 executing program 2: inotify_init() openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mISDNtimer\x00', 0x0, 0x0) socket(0x1e, 0x805, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 02:36:43 executing program 1: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0x10, 0x8000000100000003, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000440), 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000001ac0)=0x3, 0x4) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x10, 0x803, 0x0) socket(0x2000000000000010, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xb, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x5}]}}}]}, 0x44}}, 0x0) 02:36:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) socket(0x11, 0x80002, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 02:36:43 executing program 5: r0 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 02:36:43 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) 02:36:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f00000004c0)={"ffd76508f5f8a4bb5132393b56a4d1ea707d925d75e6ef31238a7ee36a4372a2110742ed1a3f8526b7827babdfb24e8e6023ff0c32d77f7b6d8ff2c17b049aadfa485dcf1276b2be62e9698d51d48e477b92de53f55f12726efd6338427e42984a4c490856d8a706de61d968f0dc8db88b655c582e436a4b65576f368c7c51260d98c9c5c3ffa6219241f5d4d644f0ee8f92be3645b6c93d3ccac6d01b93a0df263ea588f71f090efe5a21dc8eb63a80d9fc40cb028bad8abab43612560eb4c3c8a7387f0f12de9aa68c881072fcee303342f0be444175d6214966e966a8084d0f18722222384c1b824da6cd64b109007516b43ad110324631f5887e17c9d971e822a36568a398b91c270bb96b82c5a1a9a13adf3ed028035ca148fb2443a61f5477ee29d33dd8c5455ce8f0298b0724405b7b7e8eff67d11d8674d93bbe76283c5744adce876b6d5bdd00f7139e70b080a8193e71537c37b14790de237c9bc9d4d335a03e1c60c9ddb2c8efcbe8404a20c6ea2363947519e518b1a714fa8056deb433c2970001ce94d5d35ccba90e35b9c7e24a505b0c1bfe466c3882cc3cfb5fa117de306a02dfc35c1290a99579f77aeeabb7efa790122bb513fa63784e7ffabbb08be19d1dec1561f5780f6afe8114026f08160f78748bb1b5b6019cfa958162ad57dd289aad0d93f6686109cb45a94b92d11687adcd04a80fddfc81d68fc8ad42ea8a6bd8e0070f2bec60acd40472cf5915fa42fb072be5b8b1507e3f355739bf047e10baf41c3148510f9755c5d2cd5f5cc9000cebb40a40a62a0b514cddfd55aad4c601e08f35229a336e60b4594a3ccaa0e047c04c8d217469e9586f87e5b00e36160fcd69eb82e783f5670b466731ab862e4d84545b9632323e8a525262b30563e8bb2d9b61c491596388e07addc06599167b6f5d86974f616557087e1797f5c103196e0568d3bd0d1014b88d3ef40c3d42dc70dd2695540fec2dc444c4f6029097ae6f73041e04d6f030dae45713dfcf4ce98344859781f461900c19ddc73308bd310ab681858cfaf18b8a284098f30da766d777d36312fc02e9f1834fd489f01f96ab2726859e933601af8b0878447538f692943d2181fb15709cabaa4e6927d8dca294b4f62aae3eaf737847f70345f4e7dc3d821baefa17e564dd45ef8294151b8f385ad7a558330bc662913727bb060c32d617b339640ddf48d6fcafa56d389963e758468df62e8a0110c2c5eedf5e196b6fb1e6a62a2915bb83359004e95ff492e03c4cc0be3962caadcde14204cabad8b3103aff4fd08bc538be8a8fed0483d74c5d7eabedd116d7b0975509483d3acbb69647f73aa9dae98bc3de33289e0cba23a615603c50374d8a2fe85a9606b1938825ab32fe57470e8e1819aadfd11a7d5918e2632b02974ad3fc28178e15d92f5123ba085837ecea"}) 02:36:43 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) [ 263.755481][ T9338] xt_bpf: check failed: parse error 02:36:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) socket(0x11, 0x80002, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 02:36:43 executing program 1: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0x10, 0x8000000100000003, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000440), 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000001ac0)=0x3, 0x4) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xb, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x5}]}}}]}, 0x44}}, 0x0) [ 263.893147][ T9349] xt_bpf: check failed: parse error 02:36:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:36:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f00000004c0)={"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"}) 02:36:43 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) 02:36:44 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) 02:36:44 executing program 1: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0x10, 0x8000000100000003, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000440), 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000001ac0)=0x3, 0x4) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xb, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x5}]}}}]}, 0x44}}, 0x0) 02:36:44 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) 02:36:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 02:36:44 executing program 5: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x925, 0x0, [], [{}, {0x801}]}) 02:36:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f00000004c0)={"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"}) 02:36:44 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) 02:36:44 executing program 5: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x925, 0x0, [], [{}, {0x801}]}) 02:36:44 executing program 1: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0x10, 0x8000000100000003, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000440), 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000001ac0)=0x3, 0x4) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xb, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x5}]}}}]}, 0x44}}, 0x0) 02:36:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 02:36:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f00000004c0)={"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"}) 02:36:44 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) 02:36:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="ff0000000019b60300e97f000000000003007b00fd1c9ec2ecb10bfcf33e38820c00000000b89e74e13bdb2c4099040000008bb1ff4688c338cb54a25ac2fbca3cc99f520e18000000000000006e0bc631d30df776a2bdda5f744b7117523f702bb75ad98bc81a3bbd6a"], 0x18) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x11) 02:36:44 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a", 0x239}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xa) close(r2) socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 02:36:44 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x2, 0x3, 0x420, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x0, 0x388, 0x388, 0x388, 0x388, 0x388, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x2a0, 0x2d0, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}, @bytecode={0x0, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x86f) 02:36:45 executing program 1: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0x10, 0x8000000100000003, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000440), 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000001ac0)=0x3, 0x4) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xb, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x5}]}}}]}, 0x44}}, 0x0) 02:36:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40)}], 0x500, 0x0) 02:36:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f00000004c0)={"ffd76508f5f8a4bb5132393b56a4d1ea707d925d75e6ef31238a7ee36a4372a2110742ed1a3f8526b7827babdfb24e8e6023ff0c32d77f7b6d8ff2c17b049aadfa485dcf1276b2be62e9698d51d48e477b92de53f55f12726efd6338427e42984a4c490856d8a706de61d968f0dc8db88b655c582e436a4b65576f368c7c51260d98c9c5c3ffa6219241f5d4d644f0ee8f92be3645b6c93d3ccac6d01b93a0df263ea588f71f090efe5a21dc8eb63a80d9fc40cb028bad8abab43612560eb4c3c8a7387f0f12de9aa68c881072fcee303342f0be444175d6214966e966a8084d0f18722222384c1b824da6cd64b109007516b43ad110324631f5887e17c9d971e822a36568a398b91c270bb96b82c5a1a9a13adf3ed028035ca148fb2443a61f5477ee29d33dd8c5455ce8f0298b0724405b7b7e8eff67d11d8674d93bbe76283c5744adce876b6d5bdd00f7139e70b080a8193e71537c37b14790de237c9bc9d4d335a03e1c60c9ddb2c8efcbe8404a20c6ea2363947519e518b1a714fa8056deb433c2970001ce94d5d35ccba90e35b9c7e24a505b0c1bfe466c3882cc3cfb5fa117de306a02dfc35c1290a99579f77aeeabb7efa790122bb513fa63784e7ffabbb08be19d1dec1561f5780f6afe8114026f08160f78748bb1b5b6019cfa958162ad57dd289aad0d93f6686109cb45a94b92d11687adcd04a80fddfc81d68fc8ad42ea8a6bd8e0070f2bec60acd40472cf5915fa42fb072be5b8b1507e3f355739bf047e10baf41c3148510f9755c5d2cd5f5cc9000cebb40a40a62a0b514cddfd55aad4c601e08f35229a336e60b4594a3ccaa0e047c04c8d217469e9586f87e5b00e36160fcd69eb82e783f5670b466731ab862e4d84545b9632323e8a525262b30563e8bb2d9b61c491596388e07addc06599167b6f5d86974f616557087e1797f5c103196e0568d3bd0d1014b88d3ef40c3d42dc70dd2695540fec2dc444c4f6029097ae6f73041e04d6f030dae45713dfcf4ce98344859781f461900c19ddc73308bd310ab681858cfaf18b8a284098f30da766d777d36312fc02e9f1834fd489f01f96ab2726859e933601af8b0878447538f692943d2181fb15709cabaa4e6927d8dca294b4f62aae3eaf737847f70345f4e7dc3d821baefa17e564dd45ef8294151b8f385ad7a558330bc662913727bb060c32d617b339640ddf48d6fcafa56d389963e758468df62e8a0110c2c5eedf5e196b6fb1e6a62a2915bb83359004e95ff492e03c4cc0be3962caadcde14204cabad8b3103aff4fd08bc538be8a8fed0483d74c5d7eabedd116d7b0975509483d3acbb69647f73aa9dae98bc3de33289e0cba23a615603c50374d8a2fe85a9606b1938825ab32fe57470e8e1819aadfd11a7d5918e2632b02974ad3fc28178e15d92f5123ba085837ecea"}) [ 265.375866][ T2327] ================================================================== [ 265.384021][ T2327] BUG: KCSAN: data-race in process_srcu / synchronize_srcu [ 265.391212][ T2327] [ 265.393552][ T2327] write to 0xffffffff8625b2e0 of 8 bytes by task 7981 on cpu 0: [ 265.401193][ T2327] process_srcu+0x207/0x780 [ 265.405709][ T2327] process_one_work+0x3d4/0x890 [ 265.410564][ T2327] worker_thread+0xa0/0x800 [ 265.415077][ T2327] kthread+0x1d4/0x200 [ 265.419185][ T2327] ret_from_fork+0x1f/0x30 [ 265.423589][ T2327] [ 265.425929][ T2327] read to 0xffffffff8625b2e0 of 8 bytes by task 2327 on cpu 1: [ 265.433478][ T2327] synchronize_srcu+0x107/0x214 [ 265.438347][ T2327] fsnotify_connector_destroy_workfn+0x63/0xb0 [ 265.444515][ T2327] process_one_work+0x3d4/0x890 [ 265.449379][ T2327] process_scheduled_works+0x50/0xa0 [ 265.454677][ T2327] worker_thread+0x4ee/0x800 [ 265.459292][ T2327] kthread+0x1d4/0x200 [ 265.463368][ T2327] ret_from_fork+0x1f/0x30 [ 265.467772][ T2327] [ 265.470093][ T2327] Reported by Kernel Concurrency Sanitizer on: [ 265.476281][ T2327] CPU: 1 PID: 2327 Comm: kworker/u4:3 Not tainted 5.5.0-rc1-syzkaller #0 [ 265.484698][ T2327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.494873][ T2327] Workqueue: events_unbound fsnotify_connector_destroy_workfn [ 265.502329][ T2327] ================================================================== [ 265.510392][ T2327] Kernel panic - not syncing: panic_on_warn set ... [ 265.516988][ T2327] CPU: 1 PID: 2327 Comm: kworker/u4:3 Not tainted 5.5.0-rc1-syzkaller #0 02:36:45 executing program 1: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0x10, 0x8000000100000003, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000440), 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000001ac0)=0x3, 0x4) socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xb, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x5}]}}}]}, 0x44}}, 0x0) [ 265.525401][ T2327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.535483][ T2327] Workqueue: events_unbound fsnotify_connector_destroy_workfn [ 265.543042][ T2327] Call Trace: [ 265.546349][ T2327] dump_stack+0x11d/0x181 [ 265.550710][ T2327] panic+0x210/0x640 [ 265.554620][ T2327] ? vprintk_func+0x8d/0x140 [ 265.559226][ T2327] kcsan_report.cold+0xc/0xd [ 265.563841][ T2327] kcsan_setup_watchpoint+0x3fe/0x460 [ 265.569250][ T2327] __tsan_read8+0xc6/0x100 02:36:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="ff0000000019b60300e97f000000000003007b00fd1c9ec2ecb10bfcf33e38820c00000000b89e74e13bdb2c4099040000008bb1ff4688c338cb54a25ac2fbca3cc99f520e18000000000000006e0bc631d30df776a2bdda5f744b7117523f702bb75ad98bc81a3bbd6a"], 0x18) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x11) [ 265.573673][ T2327] synchronize_srcu+0x107/0x214 [ 265.578534][ T2327] ? preempt_count_add+0x6f/0xb0 [ 265.583483][ T2327] fsnotify_connector_destroy_workfn+0x63/0xb0 [ 265.589641][ T2327] process_one_work+0x3d4/0x890 [ 265.594514][ T2327] process_scheduled_works+0x50/0xa0 [ 265.599811][ T2327] worker_thread+0x4ee/0x800 [ 265.604415][ T2327] kthread+0x1d4/0x200 [ 265.608493][ T2327] ? rescuer_thread+0x6a0/0x6a0 [ 265.613352][ T2327] ? kthread_unpark+0xe0/0xe0 [ 265.618043][ T2327] ret_from_fork+0x1f/0x30 [ 265.623701][ T2327] Kernel Offset: disabled [ 265.628024][ T2327] Rebooting in 86400 seconds..