[ 57.106890][ T25] audit: type=1800 audit(1555004364.961:24): pid=8867 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="sudo" dev="sda1" ino=2454 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 57.520127][ T25] audit: type=1800 audit(1555004365.441:25): pid=8867 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 57.550542][ T25] audit: type=1800 audit(1555004365.441:26): pid=8867 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.114' (ECDSA) to the list of known hosts. 2019/04/11 17:39:36 fuzzer started 2019/04/11 17:39:38 dialing manager at 10.128.0.26:38715 2019/04/11 17:39:38 syscalls: 2408 2019/04/11 17:39:38 code coverage: enabled 2019/04/11 17:39:38 comparison tracing: enabled 2019/04/11 17:39:38 extra coverage: extra coverage is not supported by the kernel 2019/04/11 17:39:38 setuid sandbox: enabled 2019/04/11 17:39:38 namespace sandbox: enabled 2019/04/11 17:39:38 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/11 17:39:38 fault injection: enabled 2019/04/11 17:39:38 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/11 17:39:38 net packet injection: enabled 2019/04/11 17:39:38 net device setup: enabled 17:40:33 executing program 0: rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(r0, &(0x7f0000003780)=[{{0x0, 0x0, &(0x7f0000003740)=[{&(0x7f0000003640)="e327f8610ace3af9cae950c21a1c4b373595f1a0ed1f005b78e75ca44cf6d285e9fbbc85cd40199e5be550526a107e0f76b8c47a52a3ec31e937b075570a9e71e137858f4d27b3aab5f306118f83727494f6824209a892d5df8aaeb597882fa23f58f905aeb33803ed58649cd832daf7e89e390abfa35c7ee15036e03014d1d5cd8dc3f1d41ed28935f93504644a7a20d0022a148e6e3a1cfd0926f94d1746a7caddbb350effec6d7568fd786bed0e3307aea5aebf16a6d58d4aac0fde3dee06f678430033", 0xc5}], 0x1}, 0xfffffffffffffff8}], 0x1, 0xc0) syzkaller login: [ 125.561204][ T9030] IPVS: ftp: loaded support on port[0] = 21 17:40:33 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r0 = open(&(0x7f00000003c0)='./file0\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000040), 0xa198) [ 125.631565][ T9030] chnl_net:caif_netlink_parms(): no params data found [ 125.666909][ T9030] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.677098][ T9030] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.687791][ T9030] device bridge_slave_0 entered promiscuous mode [ 125.705321][ T9030] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.712453][ T9030] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.733717][ T9030] device bridge_slave_1 entered promiscuous mode [ 125.761335][ T9030] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 125.776014][ T9033] IPVS: ftp: loaded support on port[0] = 21 [ 125.784497][ T9030] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 125.805057][ T9030] team0: Port device team_slave_0 added [ 125.812599][ T9030] team0: Port device team_slave_1 added 17:40:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) [ 125.895143][ T9030] device hsr_slave_0 entered promiscuous mode 17:40:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001040)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c) [ 125.943743][ T9030] device hsr_slave_1 entered promiscuous mode [ 126.048864][ T9030] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.056094][ T9030] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.063459][ T9030] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.070518][ T9030] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.097123][ T9035] IPVS: ftp: loaded support on port[0] = 21 [ 126.111188][ T9037] IPVS: ftp: loaded support on port[0] = 21 17:40:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000140)=0xfffffffffffffe7a) [ 126.193914][ T9030] 8021q: adding VLAN 0 to HW filter on device bond0 [ 126.240225][ T9030] 8021q: adding VLAN 0 to HW filter on device team0 [ 126.280543][ T9033] chnl_net:caif_netlink_parms(): no params data found [ 126.290601][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 126.299178][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.317364][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.325623][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 126.342458][ T9041] IPVS: ftp: loaded support on port[0] = 21 [ 126.367682][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 17:40:34 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) [ 126.379239][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.386422][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.395228][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.403650][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.410714][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.420134][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 126.482184][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 126.503771][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 126.512279][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 126.520563][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 126.536836][ T9030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 126.573897][ T9035] chnl_net:caif_netlink_parms(): no params data found [ 126.583976][ T9033] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.591032][ T9033] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.598737][ T9033] device bridge_slave_0 entered promiscuous mode [ 126.605968][ T9033] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.613107][ T9033] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.620702][ T9033] device bridge_slave_1 entered promiscuous mode [ 126.635736][ T9033] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 126.643959][ T9046] IPVS: ftp: loaded support on port[0] = 21 [ 126.652072][ T9037] chnl_net:caif_netlink_parms(): no params data found [ 126.666996][ T9033] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 126.687334][ T9033] team0: Port device team_slave_0 added [ 126.703639][ T9033] team0: Port device team_slave_1 added [ 126.795881][ T9033] device hsr_slave_0 entered promiscuous mode [ 126.833464][ T9033] device hsr_slave_1 entered promiscuous mode [ 126.887144][ T9035] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.895155][ T9035] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.902800][ T9035] device bridge_slave_0 entered promiscuous mode [ 126.911320][ T9035] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.918857][ T9035] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.926583][ T9035] device bridge_slave_1 entered promiscuous mode [ 126.940482][ T9037] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.947656][ T9037] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.955439][ T9037] device bridge_slave_0 entered promiscuous mode [ 126.962667][ T9037] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.969885][ T9037] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.977546][ T9037] device bridge_slave_1 entered promiscuous mode [ 126.998341][ T9037] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 127.007880][ T9037] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 127.024277][ T9037] team0: Port device team_slave_0 added [ 127.030743][ T9037] team0: Port device team_slave_1 added [ 127.045142][ T9035] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 127.085415][ T9030] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 127.093723][ T9035] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 127.108012][ T9041] chnl_net:caif_netlink_parms(): no params data found [ 127.129665][ T9035] team0: Port device team_slave_0 added [ 127.174535][ T9037] device hsr_slave_0 entered promiscuous mode [ 127.223518][ T9037] device hsr_slave_1 entered promiscuous mode [ 127.289460][ T9035] team0: Port device team_slave_1 added 17:40:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x85ffffff, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, 0x0, 0x20000, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 127.367042][ T9035] device hsr_slave_0 entered promiscuous mode [ 127.423440][ T9035] device hsr_slave_1 entered promiscuous mode [ 127.469340][ T9037] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.476466][ T9037] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.483804][ T9037] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.492184][ T9037] bridge0: port 1(bridge_slave_0) entered forwarding state 17:40:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$KDENABIO(r1, 0x4b36) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000040)={'veth0_to_hsr\x00', {0x2, 0x4e23, @empty}}) r2 = semget$private(0x0, 0x1, 0x141) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000100)=""/232) madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:auditd_etc_t:s0\x00', 0x22, 0x2) r3 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x9}) mq_timedsend(r3, 0x0, 0x0, 0x0, 0x0) [ 127.531528][ T9041] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.538760][ T9041] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.546704][ T9041] device bridge_slave_0 entered promiscuous mode [ 127.575384][ T9035] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.582479][ T9035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.589828][ T9035] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.597022][ T9035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.606187][ T9041] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.613424][ T9041] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.621135][ T9041] device bridge_slave_1 entered promiscuous mode [ 127.628668][ T9046] chnl_net:caif_netlink_parms(): no params data found [ 127.657388][ T9041] bond0: Enslaving bond_slave_0 as an active interface with an up link 17:40:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x814, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") [ 127.686542][ T9041] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 127.713340][ T9046] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.720694][ T9046] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.730102][ T9046] device bridge_slave_0 entered promiscuous mode [ 127.745565][ T9066] FAT-fs (loop0): bogus number of reserved sectors [ 127.752221][ T9066] FAT-fs (loop0): Can't find a valid FAT filesystem [ 127.759602][ T9047] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.767576][ T9047] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.775379][ T9047] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.783174][ T9047] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.793885][ T9041] team0: Port device team_slave_0 added [ 127.802846][ T9046] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.812106][ T9046] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.819943][ T9046] device bridge_slave_1 entered promiscuous mode [ 127.833632][ T9041] team0: Port device team_slave_1 added [ 127.842039][ T9033] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.850005][ T9066] FAT-fs (loop0): bogus number of reserved sectors [ 127.862087][ T9046] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 127.862687][ T9066] FAT-fs (loop0): Can't find a valid FAT filesystem [ 127.877223][ T9046] bond0: Enslaving bond_slave_1 as an active interface with an up link 17:40:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) [ 127.945829][ T9041] device hsr_slave_0 entered promiscuous mode [ 128.004799][ T9041] device hsr_slave_1 entered promiscuous mode [ 128.053608][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.061697][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.071007][ T9033] 8021q: adding VLAN 0 to HW filter on device team0 [ 128.079627][ T9046] team0: Port device team_slave_0 added [ 128.086584][ T9046] team0: Port device team_slave_1 added [ 128.134530][ T9046] device hsr_slave_0 entered promiscuous mode [ 128.183444][ T9046] device hsr_slave_1 entered promiscuous mode 17:40:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") getsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 128.225474][ T9037] 8021q: adding VLAN 0 to HW filter on device bond0 [ 128.233681][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 128.242617][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.251241][ T2988] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.258300][ T2988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.266210][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 128.293821][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 128.302739][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.312135][ T2988] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.319271][ T2988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.347620][ T9037] 8021q: adding VLAN 0 to HW filter on device team0 [ 128.356148][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 128.366558][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 128.375761][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 128.384757][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 128.393400][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 128.402256][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 128.410759][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 128.419247][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.427616][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 128.436128][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.444496][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.452039][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.460753][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 128.488178][ T9037] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 17:40:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") bpf$BPF_PROG_QUERY(0xe, 0x0, 0x0) [ 128.499368][ T9037] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 128.515785][ T9033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 128.536216][ T9035] 8021q: adding VLAN 0 to HW filter on device bond0 [ 128.544126][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 128.552700][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.561779][ T3508] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.568901][ T3508] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.576638][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 128.585234][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.593500][ T3508] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.600644][ T3508] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.608338][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 128.616862][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 128.625604][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 128.634329][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 128.643716][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 128.652099][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 128.660582][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 128.668882][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.677336][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 128.685515][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.704860][ T9037] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 128.716278][ T9041] 8021q: adding VLAN 0 to HW filter on device bond0 [ 128.727101][ T9035] 8021q: adding VLAN 0 to HW filter on device team0 [ 128.735118][ T9038] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 128.742725][ T9038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 17:40:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca5055e0bcfec7be070") perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 128.750770][ T9038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.758530][ T9038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.767798][ T9046] 8021q: adding VLAN 0 to HW filter on device bond0 [ 128.792088][ T9033] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 128.820671][ T9046] 8021q: adding VLAN 0 to HW filter on device team0 [ 128.843688][ T9041] 8021q: adding VLAN 0 to HW filter on device team0 [ 128.863744][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.871574][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.879740][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 128.888622][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.897026][ T2988] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.905065][ T2988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.912524][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 128.921205][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.929569][ T2988] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.936801][ T2988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.944574][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 128.952979][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.961520][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.969193][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 128.977689][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.985920][ T2988] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.992945][ T2988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.000581][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.009126][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.017461][ T2988] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.024528][ T2988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.031998][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 129.040456][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 129.048888][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 129.057339][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 129.066853][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 129.075260][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 129.083544][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 129.092302][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 129.100118][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 129.116452][ T9035] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 129.128873][ T9035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 129.137679][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.146507][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.154840][ T9047] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.161904][ T9047] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.169624][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 129.178040][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.186525][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.194857][ T9047] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.201884][ T9047] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.209523][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 129.218354][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 129.226811][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 129.238100][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 129.246418][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 129.254924][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 129.268891][ T9041] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 129.279401][ T9041] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 129.298863][ T9046] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 129.310243][ T9046] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 129.325592][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 129.339799][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 129.351892][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 129.361163][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 129.369573][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 129.377811][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 129.386758][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 129.395300][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 129.403469][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 129.411980][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 129.420385][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 129.428785][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 129.437184][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 129.445423][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 129.453789][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 129.461974][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 17:40:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") get_mempolicy(0x0, &(0x7f0000000080), 0x100000001, &(0x7f0000fef000/0x2000)=nil, 0x4) [ 129.470409][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 129.478267][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 129.486027][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 129.493970][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 129.508727][ T9041] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 129.529028][ T9035] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 129.555679][ T9046] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 129.659904][ C1] hrtimer: interrupt took 24682 ns 17:40:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mknodat(r1, &(0x7f0000000240)='./file0\x00', 0x0, 0x5) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v2={0x2000000, [{0x10001, 0x8001}]}, 0x14, 0x1) 17:40:37 executing program 3: mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xca) madvise(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0xcb) 17:40:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xca) madvise(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0xcb) 17:40:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mbind(&(0x7f0000b27000/0x2000)=nil, 0x2000, 0x2, &(0x7f0000000100)=0x9, 0x3, 0x2) 17:40:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) 17:40:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mbind(&(0x7f0000b27000/0x2000)=nil, 0x2000, 0x2, &(0x7f0000000100)=0x9, 0x3, 0x0) madvise(&(0x7f0000b26000/0x3000)=nil, 0x3000, 0xf) 17:40:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) 17:40:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xca) madvise(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0xcb) 17:40:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2000001, 0x4000000032, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x0, 0x0}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x1a, 0x0, &(0x7f0000000100)) 17:40:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") fgetxattr(r0, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)=""/92, 0x5c) 17:40:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000100)) 17:40:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000140)="11dc86055e0bceec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001940)='e\xaf.\xb6G\x02\x03\x00\x00\x00\x00\x00\xff\x17*=L\xab\x03\xab\n\xa5\x13\x96M\xe0\x1ex\v)\xd7\x02\x88U]\xeb\xcf\xa3\x10\x1a\xaf\"I\xa8\x1c(=\xa8\x1a\xd3\x91\x05\xf2\x00#i\xa2\xd9\x96\x12J\xd5\xb0~|\x7f\xe0\x87\x9ac\x84\x14\xf7*0&m\x98\x88\fJ\xfe\xe8H(\xc2\x15\vp\x12\x03\x94:\xbb\xae\"R\x88*\x933\xc6\xe5\xa0\xf4\xc2\xb0\x89\xbc\'\xf0\xf5\xe4', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) 17:40:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") fgetxattr(r0, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)=""/92, 0x5c) 17:40:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) 17:40:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca5055e0bcfec7be070") prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) 17:40:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) 17:40:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") munmap(&(0x7f0000ff7000/0x1000)=nil, 0x1000) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xca) madvise(&(0x7f0000ff1000/0x2000)=nil, 0x2000, 0xcb) 17:40:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") clock_adjtime(0xc00, 0x0) 17:40:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) 17:40:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x42800) pread64(r1, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xca) madvise(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0xca) 17:40:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001380)=ANY=[@ANYBLOB='utf8=0']) 17:40:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) 17:40:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") fgetxattr(r0, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)=""/92, 0x5c) 17:40:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r1, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r2) [ 130.231910][ T9194] FAT-fs (loop4): bogus number of reserved sectors [ 130.239175][ T9194] FAT-fs (loop4): Can't find a valid FAT filesystem 17:40:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) 17:40:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") fgetxattr(r0, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)=""/92, 0x5c) 17:40:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") madvise(&(0x7f0000b26000/0x3000)=nil, 0x3000, 0x12) [ 130.335454][ T9212] FAT-fs (loop4): bogus number of reserved sectors [ 130.342192][ T9212] FAT-fs (loop4): Can't find a valid FAT filesystem 17:40:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fgetxattr(r0, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)=""/92, 0x5c) 17:40:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x42800) pread64(r1, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 17:40:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xca) madvise(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0xcb) 17:40:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10) getpeername(r0, &(0x7f0000000280)=@pppol2tp, &(0x7f0000000300)=0x80) 17:40:38 executing program 0: fgetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)=""/92, 0x5c) 17:40:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x42800) pread64(r1, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 17:40:38 executing program 0: fgetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)=""/92, 0x5c) 17:40:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 17:40:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x42800) pread64(r1, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x42800) pread64(r1, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:38 executing program 0: fgetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)=""/92, 0x5c) 17:40:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 17:40:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 17:40:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x42800) pread64(r1, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x42800) pread64(r1, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:38 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) fgetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)=""/92, 0x5c) 17:40:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x42800) 17:40:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 17:40:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 17:40:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) pread64(r1, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:38 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) fgetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)=""/92, 0x5c) 17:40:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) 17:40:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 17:40:39 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 17:40:39 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) fgetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)=""/92, 0x5c) 17:40:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) pread64(r1, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 17:40:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) 17:40:39 executing program 5: munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 17:40:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fgetxattr(r0, 0x0, &(0x7f00000000c0)=""/92, 0x5c) 17:40:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) 17:40:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) pread64(r1, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:39 executing program 5: munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 17:40:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 17:40:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fgetxattr(r0, 0x0, &(0x7f00000000c0)=""/92, 0x5c) 17:40:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:39 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) 17:40:39 executing program 5: munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 17:40:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) pread64(0xffffffffffffffff, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 17:40:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fgetxattr(r0, 0x0, &(0x7f00000000c0)=""/92, 0x5c) 17:40:39 executing program 5: munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 17:40:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 17:40:39 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:39 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) 17:40:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fgetxattr(r0, &(0x7f0000000080)=@known='system.sockprotoname\x00', 0x0, 0x0) 17:40:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) pread64(0xffffffffffffffff, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:39 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 17:40:39 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 17:40:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fgetxattr(r0, &(0x7f0000000080)=@known='system.sockprotoname\x00', 0x0, 0x0) 17:40:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="112ba5055e0bcfec7be070") fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) pread64(0xffffffffffffffff, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:39 executing program 4: r0 = syz_open_dev$vcsa(0x0, 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) 17:40:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 17:40:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fgetxattr(r0, &(0x7f0000000080)=@known='system.sockprotoname\x00', 0x0, 0x0) 17:40:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") select(0x40, &(0x7f0000000200)={0x8}, 0x0, &(0x7f0000000280)={0x4, 0x9, 0x0, 0x0, 0x807, 0x10001, 0x7, 0x7fffffff}, &(0x7f00000002c0)={0x0, 0x2710}) 17:40:39 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:39 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:39 executing program 4: r0 = syz_open_dev$vcsa(0x0, 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) 17:40:39 executing program 4: r0 = syz_open_dev$vcsa(0x0, 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) 17:40:39 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 17:40:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, 0x0, 0x6, 0x0, "4877bb1f56d48eb1fa5fac76a792a929a57f6062b013ec6bc7af6c5bb203dab4011d7c609668388bc03832f302a5020f09000000d2fb5a00eb0900"}, 0x101f1) 17:40:39 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) 17:40:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000b27000/0x3000)=nil, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") munmap(&(0x7f0000b26000/0x2000)=nil, 0x2000) 17:40:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:39 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_MM(0x23, 0xf, &(0x7f0000ff3000/0x1000)=nil) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ff0000/0x1000)=nil) madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xca) madvise(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0xcb) 17:40:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) madvise(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0x13) 17:40:39 executing program 3: r0 = syz_open_dev$vcsa(0x0, 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:39 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 17:40:39 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) 17:40:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:40 executing program 3: r0 = syz_open_dev$vcsa(0x0, 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8) 17:40:40 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 17:40:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, 0x0, 0x0) write$P9_RWRITE(r2, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 17:40:40 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) 17:40:40 executing program 3: r0 = syz_open_dev$vcsa(0x0, 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup3(r0, r1, 0x0) write$P9_RLERRORu(r2, 0x0, 0x0) 17:40:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 17:40:40 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:40 executing program 4: syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) 17:40:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) 17:40:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 17:40:40 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup3(r0, r1, 0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 17:40:40 executing program 4: syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) 17:40:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 17:40:40 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup3(r0, r1, 0x0) write$nbd(r2, 0x0, 0x0) 17:40:40 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:40 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:40 executing program 4: syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) 17:40:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x0, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 17:40:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:41 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000001c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect(r1, &(0x7f0000000640)=@nl=@proc, 0x80) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) 17:40:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x0, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 17:40:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:41 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 17:40:41 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:41 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x0, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 17:40:41 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 17:40:41 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:41 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x0) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup3(r0, r1, 0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 17:40:41 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 17:40:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000001c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect(r1, &(0x7f0000000640)=@nl=@proc, 0x80) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) 17:40:41 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x0) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:41 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:41 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000005c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, &(0x7f0000000340)='TRUE', 0x4, 0x0) execve(&(0x7f0000000180)='./file1\x00', &(0x7f0000000340), 0x0) mknod(&(0x7f0000000140)='./file1\x00', 0x29c, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 17:40:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup3(r0, r1, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) 17:40:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:41 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:41 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x0) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r2 = dup2(r0, r1) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGSND(r2, 0x8040451a, 0x0) 17:40:41 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(0xffffffffffffffff, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000001c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect(r1, &(0x7f0000000640)=@nl=@proc, 0x80) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) 17:40:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup3(r0, r1, 0x0) write$P9_RFLUSH(r2, 0x0, 0x0) 17:40:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) write$binfmt_elf32(r1, 0x0, 0x0) 17:40:42 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(0xffffffffffffffff, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup3(r0, r1, 0x0) write$binfmt_misc(r1, 0x0, 0xfffffd9f) 17:40:42 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000001c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect(r1, &(0x7f0000000640)=@nl=@proc, 0x80) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) 17:40:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup3(r0, r1, 0x0) write$cgroup_int(r2, 0x0, 0x0) 17:40:42 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(0xffffffffffffffff, &(0x7f0000000000)=""/120, 0x78, 0x2f) 17:40:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup3(r0, r1, 0x0) write$P9_ROPEN(r2, 0x0, 0x0) 17:40:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup3(r0, r1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)) 17:40:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:42 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(r0, 0x0, 0x0, 0x2f) 17:40:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x129f0817) syz_execute_func(&(0x7f0000000040)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r1, 0x0, 0x0, 0x80020003ffc, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) mprotect(&(0x7f0000579000/0x3000)=nil, 0x3000, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, 0x0, 0x0) 17:40:42 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, 0x0) 17:40:43 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000680)='./file1\x00', &(0x7f0000000940)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000005c0)='./file1\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0) 17:40:43 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(r0, 0x0, 0x0, 0x2f) 17:40:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000001c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect(r1, &(0x7f0000000640)=@nl=@proc, 0x80) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:40:43 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x805, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev={0xac, 0x70}}}}}}}, 0x0) 17:40:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x4, 0xffffffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 135.246569][ T9758] __ntfs_error: 4 callbacks suppressed [ 135.246581][ T9758] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 135.272898][ T9758] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 17:40:43 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(r0, 0x0, 0x0, 0x2f) 17:40:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x4, 0xffffffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 135.311874][ T9771] (unnamed net_device) (uninitialized): option updelay: invalid value (18446744073709551615) [ 135.337974][ T9758] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 135.345850][ T9771] (unnamed net_device) (uninitialized): option updelay: allowed values 0 - 2147483647 [ 135.401296][ T9778] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 135.427775][ T9784] (unnamed net_device) (uninitialized): option updelay: invalid value (18446744073709551615) 17:40:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 135.440270][ T9778] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 135.482056][ T9784] (unnamed net_device) (uninitialized): option updelay: allowed values 0 - 2147483647 [ 135.504163][ T9778] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 17:40:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000001c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect(r1, &(0x7f0000000640)=@nl=@proc, 0x80) 17:40:43 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x0) 17:40:43 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x4, 0xffffffffffffffff}]}}}]}, 0x3c}}, 0x0) 17:40:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000680)='./file1\x00', &(0x7f0000000940)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000005c0)='./file1\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0) [ 136.055164][ T9800] (unnamed net_device) (uninitialized): option updelay: invalid value (18446744073709551615) [ 136.083245][ T9805] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 136.092578][ T9805] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 17:40:44 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:44 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\n\x00L\xff\xff\xff\xc3`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 136.106218][ T9800] (unnamed net_device) (uninitialized): option updelay: allowed values 0 - 2147483647 [ 136.116469][ T9805] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 17:40:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:44 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x0) 17:40:44 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x4, 0xffffffffffffffff}]}}}]}, 0x3c}}, 0x0) 17:40:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000001c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) connect(r1, &(0x7f0000000640)=@nl=@proc, 0x80) 17:40:44 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:44 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) pread64(r0, &(0x7f0000000000)=""/120, 0x78, 0x0) 17:40:44 executing program 5: mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000001c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) connect(0xffffffffffffffff, &(0x7f0000000640)=@nl=@proc, 0x80) 17:40:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 136.525792][ T9828] device team0 entered promiscuous mode [ 136.531470][ T9828] device team_slave_0 entered promiscuous mode [ 136.553410][ T9828] device team_slave_1 entered promiscuous mode [ 136.560494][ T9828] 8021q: adding VLAN 0 to HW filter on device team0 [ 136.576314][ T9830] (unnamed net_device) (uninitialized): option updelay: invalid value (18446744073709551615) [ 136.587366][ T9830] (unnamed net_device) (uninitialized): option updelay: allowed values 0 - 2147483647 [ 136.601010][ T9815] device team0 left promiscuous mode [ 136.606697][ T9815] device team_slave_0 left promiscuous mode [ 136.613344][ T9815] device team_slave_1 left promiscuous mode [ 136.673175][ T9828] device team0 entered promiscuous mode [ 136.678887][ T9828] device team_slave_0 entered promiscuous mode [ 136.686908][ T9828] device team_slave_1 entered promiscuous mode [ 136.696927][ T9828] 8021q: adding VLAN 0 to HW filter on device team0 17:40:44 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\n\x00L\xff\xff\xff\xc3`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 17:40:44 executing program 5: mknod(0x0, 0x1040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:44 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PPPOEIOCDFWD(r0, 0x80045105, 0x70e000) 17:40:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000001c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) connect(0xffffffffffffffff, &(0x7f0000000640)=@nl=@proc, 0x80) 17:40:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:44 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x4, 0xffffffffffffffff}]}}}]}, 0x3c}}, 0x0) 17:40:44 executing program 5: mknod(0x0, 0x1040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:44 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PPPOEIOCDFWD(r0, 0x80045105, 0x70e000) 17:40:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000001c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) connect(0xffffffffffffffff, &(0x7f0000000640)=@nl=@proc, 0x80) 17:40:44 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x4, 0xffffffffffffffff}]}}}]}, 0x3c}}, 0x0) 17:40:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 136.849833][ T9875] device team0 left promiscuous mode [ 136.877255][ T9875] device team_slave_0 left promiscuous mode 17:40:44 executing program 5: mknod(0x0, 0x1040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) [ 136.910698][ T9875] device team_slave_1 left promiscuous mode [ 137.043821][ T9889] device team0 entered promiscuous mode [ 137.049432][ T9889] device team_slave_0 entered promiscuous mode [ 137.057793][ T9889] device team_slave_1 entered promiscuous mode [ 137.065242][ T9889] 8021q: adding VLAN 0 to HW filter on device team0 17:40:45 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x0, {{0x2, 0x0, @local}}}, 0x88) 17:40:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000001c0)=0x100000001, 0x4) r1 = dup2(r0, r0) connect(r1, &(0x7f0000000640)=@nl=@proc, 0x80) 17:40:45 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PPPOEIOCDFWD(r0, 0x80045105, 0x70e000) 17:40:45 executing program 5: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:45 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x4, 0xffffffffffffffff}]}}}]}, 0x3c}}, 0x0) 17:40:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:45 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x4, 0xffffffffffffffff}]}}}]}, 0x3c}}, 0x0) 17:40:45 executing program 5: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) [ 137.148842][ T25] audit: type=1800 audit(1555004445.071:31): pid=9899 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16614 res=0 17:40:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000001c0)=0x100000001, 0x4) r1 = dup2(r0, r0) connect(r1, &(0x7f0000000640)=@nl=@proc, 0x80) 17:40:45 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PPPOEIOCDFWD(r0, 0x80045105, 0x70e000) 17:40:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000180)) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f00000000c0)={0x5, 0x8, 0x1, 0x2, 0xe6}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x16}]}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\xf6', 0x1ff) 17:40:45 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x4, 0xffffffffffffffff}]}}}]}, 0x3c}}, 0x0) 17:40:45 executing program 5: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000001c0)=0x100000001, 0x4) r1 = dup2(r0, r0) connect(r1, &(0x7f0000000640)=@nl=@proc, 0x80) 17:40:45 executing program 3: ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0x80045105, 0x70e000) 17:40:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:45 executing program 5: mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 17:40:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) connect(r1, &(0x7f0000000640)=@nl=@proc, 0x80) 17:40:45 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x4, 0xffffffffffffffff}]}}}]}, 0x3c}}, 0x0) 17:40:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0xffffffffffffff48}}], 0x400000000000094, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) 17:40:45 executing program 3: ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0x80045105, 0x70e000) 17:40:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) connect(r1, &(0x7f0000000640)=@nl=@proc, 0x80) [ 301.153428][ T1044] INFO: task syz-executor.1:9924 blocked for more than 143 seconds. [ 301.169412][ T1044] Not tainted 5.1.0-rc4-next-20190411 #23 [ 301.177639][ T1044] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 301.187635][ T1044] syz-executor.1 D28520 9924 9033 0x00000004 [ 301.195108][ T1044] Call Trace: [ 301.198859][ T1044] __schedule+0x817/0x1cc0 [ 301.203588][ T1044] ? retint_kernel+0x2d/0x2d [ 301.208564][ T1044] ? __sched_text_start+0x8/0x8 [ 301.213521][ T1044] ? __mutex_lock+0x527/0x1310 [ 301.219526][ T1044] schedule+0x92/0x180 [ 301.225139][ T1044] schedule_preempt_disabled+0x13/0x20 [ 301.232162][ T1044] __mutex_lock+0x726/0x1310 [ 301.237196][ T1044] ? snd_seq_kernel_client_ctl+0xe5/0x170 [ 301.244728][ T1044] ? mutex_trylock+0x1e0/0x1e0 [ 301.249880][ T1044] ? odev_release+0x54/0x80 [ 301.255328][ T1044] ? __fput+0x2e5/0x8d0 [ 301.259868][ T1044] ? ____fput+0x16/0x20 [ 301.265063][ T1044] ? exit_to_usermode_loop+0x273/0x2c0 [ 301.270706][ T1044] ? do_syscall_64+0x52d/0x610 [ 301.276097][ T1044] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.282379][ T1044] ? lock_acquire+0x16f/0x3f0 [ 301.287783][ T1044] ? kasan_check_write+0x14/0x20 [ 301.293206][ T1044] ? do_raw_spin_lock+0x12a/0x2e0 [ 301.298231][ T1044] mutex_lock_nested+0x16/0x20 [ 301.304085][ T1044] ? mutex_lock_nested+0x16/0x20 [ 301.310190][ T1044] snd_seq_kernel_client_ctl+0xe5/0x170 [ 301.317102][ T1044] snd_seq_oss_writeq_clear+0xe0/0x140 [ 301.323879][ T1044] ? snd_seq_oss_writeq_wakeup+0xc0/0xc0 [ 301.331053][ T1044] ? snd_seq_oss_timer_delete+0x5a/0x80 [ 301.338327][ T1044] ? create_port+0x250/0x250 [ 301.343813][ T1044] snd_seq_oss_writeq_delete+0x20/0x40 [ 301.349592][ T1044] free_devinfo+0x66/0xc0 [ 301.355879][ T1044] port_delete+0xe8/0x1c0 [ 301.361073][ T1044] snd_seq_delete_port+0x266/0x330 [ 301.367347][ T1044] snd_seq_ioctl_delete_port+0xba/0x190 [ 301.373768][ T1044] snd_seq_kernel_client_ctl+0x112/0x170 [ 301.381586][ T1044] ? snd_seq_info_done+0x30/0x30 [ 301.387552][ T1044] snd_seq_event_port_detach+0xba/0x100 [ 301.393873][ T1044] ? snd_seq_event_port_attach+0x220/0x220 [ 301.399945][ T1044] ? kasan_check_write+0x14/0x20 [ 301.405351][ T1044] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 301.411603][ T1044] delete_port+0x87/0xd0 [ 301.416388][ T1044] snd_seq_oss_release+0xf5/0x150 [ 301.421633][ T1044] odev_release+0x54/0x80 [ 301.426884][ T1044] __fput+0x2e5/0x8d0 [ 301.431181][ T1044] ____fput+0x16/0x20 [ 301.435807][ T1044] task_work_run+0x14a/0x1c0 [ 301.441632][ T1044] exit_to_usermode_loop+0x273/0x2c0 [ 301.447592][ T1044] do_syscall_64+0x52d/0x610 [ 301.452894][ T1044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.459102][ T1044] RIP: 0033:0x4129e1 [ 301.463181][ T1044] Code: e8 34 99 01 00 e9 45 fe ff ff 4c 8b 86 80 00 00 00 4c 39 c3 72 08 48 85 f6 e9 32 fd ff ff 44 0f b6 46 64 41 80 f8 01 74 08 48 <85> f6 e9 1f fd ff ff 0f b7 56 5e 66 85 d2 74 6a 48 29 fb 0f b7 d2 [ 301.485384][ T1044] RSP: 002b:00007fff907afd00 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 301.495321][ T1044] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00000000004129e1 [ 301.503706][ T1044] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 301.512591][ T1044] RBP: 000000000073c900 R08: 00000000f8309d34 R09: 00000000f8309d38 [ 301.521567][ T1044] R10: 00007fff907afdd0 R11: 0000000000000293 R12: 0000000000000001 [ 301.530729][ T1044] R13: 000000000073c900 R14: 00000000000218e5 R15: 000000000073bfac [ 301.539445][ T1044] INFO: lockdep is turned off. [ 301.544617][ T1044] NMI backtrace for cpu 0 [ 301.549052][ T1044] CPU: 0 PID: 1044 Comm: khungtaskd Not tainted 5.1.0-rc4-next-20190411 #23 [ 301.558407][ T1044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.569110][ T1044] Call Trace: [ 301.572488][ T1044] dump_stack+0x172/0x1f0 [ 301.577307][ T1044] nmi_cpu_backtrace.cold+0x63/0xa4 [ 301.583443][ T1044] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 301.589243][ T1044] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 301.597692][ T1044] arch_trigger_cpumask_backtrace+0x14/0x20 [ 301.603822][ T1044] watchdog+0x9b7/0xec0 [ 301.608199][ T1044] kthread+0x357/0x430 [ 301.612707][ T1044] ? reset_hung_task_detector+0x30/0x30 [ 301.618703][ T1044] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 301.626347][ T1044] ret_from_fork+0x3a/0x50 [ 301.631806][ T1044] Sending NMI from CPU 0 to CPUs 1: [ 301.637263][ C1] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0x2/0x10 [ 301.638758][ T1044] Kernel panic - not syncing: hung_task: blocked tasks [ 301.653843][ T1044] CPU: 0 PID: 1044 Comm: khungtaskd Not tainted 5.1.0-rc4-next-20190411 #23 [ 301.663994][ T1044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.676418][ T1044] Call Trace: [ 301.680346][ T1044] dump_stack+0x172/0x1f0 [ 301.685057][ T1044] panic+0x2cb/0x72b [ 301.689438][ T1044] ? __warn_printk+0xf3/0xf3 [ 301.694507][ T1044] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 301.700527][ T1044] ? ___preempt_schedule+0x16/0x18 [ 301.706395][ T1044] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 301.714333][ T1044] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 301.720779][ T1044] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 301.727224][ T1044] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 301.733669][ T1044] watchdog+0x9c8/0xec0 [ 301.738638][ T1044] kthread+0x357/0x430 [ 301.743015][ T1044] ? reset_hung_task_detector+0x30/0x30 [ 301.748914][ T1044] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 301.755482][ T1044] ret_from_fork+0x3a/0x50 [ 301.762178][ T1044] Kernel Offset: disabled [ 301.766717][ T1044] Rebooting in 86400 seconds..