Warning: Permanently added '10.128.1.8' (ECDSA) to the list of known hosts. 2019/12/11 22:28:28 fuzzer started 2019/12/11 22:28:30 dialing manager at 10.128.0.26:33577 2019/12/11 22:28:30 syscalls: 2701 2019/12/11 22:28:30 code coverage: enabled 2019/12/11 22:28:30 comparison tracing: enabled 2019/12/11 22:28:30 extra coverage: enabled 2019/12/11 22:28:30 setuid sandbox: enabled 2019/12/11 22:28:30 namespace sandbox: enabled 2019/12/11 22:28:30 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/11 22:28:30 fault injection: enabled 2019/12/11 22:28:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/11 22:28:30 net packet injection: enabled 2019/12/11 22:28:30 net device setup: enabled 2019/12/11 22:28:30 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/11 22:28:30 devlink PCI setup: PCI device 0000:00:10.0 is not available 22:30:20 executing program 0: 22:30:20 executing program 1: [ 186.700798][ T9048] IPVS: ftp: loaded support on port[0] = 21 [ 186.847785][ T9048] chnl_net:caif_netlink_parms(): no params data found [ 186.906890][ T9051] IPVS: ftp: loaded support on port[0] = 21 [ 186.942542][ T9048] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.950095][ T9048] bridge0: port 1(bridge_slave_0) entered disabled state 22:30:20 executing program 2: [ 186.958720][ T9048] device bridge_slave_0 entered promiscuous mode [ 186.989694][ T9048] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.998809][ T9048] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.008514][ T9048] device bridge_slave_1 entered promiscuous mode [ 187.066026][ T9048] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.094432][ T9048] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.194757][ T9048] team0: Port device team_slave_0 added [ 187.206671][ T9051] chnl_net:caif_netlink_parms(): no params data found [ 187.209095][ T9054] IPVS: ftp: loaded support on port[0] = 21 [ 187.227074][ T9048] team0: Port device team_slave_1 added 22:30:20 executing program 3: [ 187.416044][ T9048] device hsr_slave_0 entered promiscuous mode [ 187.465025][ T9048] device hsr_slave_1 entered promiscuous mode [ 187.533162][ T9051] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.540379][ T9051] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.552062][ T9051] device bridge_slave_0 entered promiscuous mode 22:30:21 executing program 4: [ 187.580501][ T9056] IPVS: ftp: loaded support on port[0] = 21 [ 187.590392][ T9051] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.604552][ T9051] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.612931][ T9051] device bridge_slave_1 entered promiscuous mode [ 187.665299][ T9048] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 187.733959][ T9051] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.753640][ T9048] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 187.795085][ T9048] netdevsim netdevsim0 netdevsim2: renamed from eth2 22:30:21 executing program 5: [ 187.846794][ T9048] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 187.921045][ T9051] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.999916][ T9058] IPVS: ftp: loaded support on port[0] = 21 [ 188.055476][ T9051] team0: Port device team_slave_0 added [ 188.075151][ T9051] team0: Port device team_slave_1 added [ 188.097016][ T9062] IPVS: ftp: loaded support on port[0] = 21 [ 188.120274][ T9054] chnl_net:caif_netlink_parms(): no params data found [ 188.194448][ T9051] device hsr_slave_0 entered promiscuous mode [ 188.243040][ T9051] device hsr_slave_1 entered promiscuous mode [ 188.302622][ T9051] debugfs: Directory 'hsr0' with parent '/' already present! [ 188.402601][ T9056] chnl_net:caif_netlink_parms(): no params data found [ 188.419988][ T9054] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.429121][ T9054] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.437183][ T9054] device bridge_slave_0 entered promiscuous mode [ 188.447263][ T9054] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.454765][ T9054] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.464449][ T9054] device bridge_slave_1 entered promiscuous mode [ 188.508924][ T9051] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 188.566719][ T9051] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 188.627125][ T9051] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 188.701842][ T9054] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.718077][ T9054] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.737774][ T9051] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 188.860268][ T9056] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.868394][ T9056] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.876790][ T9056] device bridge_slave_0 entered promiscuous mode [ 188.885136][ T9056] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.892212][ T9056] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.900137][ T9056] device bridge_slave_1 entered promiscuous mode [ 188.913617][ T9054] team0: Port device team_slave_0 added [ 188.931993][ T9054] team0: Port device team_slave_1 added [ 189.025753][ T9054] device hsr_slave_0 entered promiscuous mode [ 189.094306][ T9054] device hsr_slave_1 entered promiscuous mode [ 189.142628][ T9054] debugfs: Directory 'hsr0' with parent '/' already present! [ 189.207993][ T9058] chnl_net:caif_netlink_parms(): no params data found [ 189.218870][ T9056] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 189.236619][ T9048] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.258147][ T9056] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.317401][ T9062] chnl_net:caif_netlink_parms(): no params data found [ 189.344040][ T9054] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 189.376648][ T9056] team0: Port device team_slave_0 added [ 189.384021][ T9058] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.391092][ T9058] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.399688][ T9058] device bridge_slave_0 entered promiscuous mode [ 189.408289][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.416985][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.437039][ T9054] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 189.505757][ T9056] team0: Port device team_slave_1 added [ 189.513713][ T9058] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.520790][ T9058] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.531226][ T9058] device bridge_slave_1 entered promiscuous mode [ 189.541469][ T9048] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.549267][ T9062] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.557372][ T9062] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.567716][ T9062] device bridge_slave_0 entered promiscuous mode [ 189.576398][ T9054] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 189.631644][ T9054] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 189.696596][ T9062] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.703884][ T9062] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.711535][ T9062] device bridge_slave_1 entered promiscuous mode [ 189.736718][ T9062] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 189.753203][ T9062] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.771860][ T9058] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 189.801784][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.811109][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.819681][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.826954][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.836510][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.845661][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.854462][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.861508][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.872352][ T9058] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.899997][ T9058] team0: Port device team_slave_0 added [ 189.945936][ T9056] device hsr_slave_0 entered promiscuous mode [ 189.992924][ T9056] device hsr_slave_1 entered promiscuous mode [ 190.042637][ T9056] debugfs: Directory 'hsr0' with parent '/' already present! [ 190.058031][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.074369][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.087788][ T9058] team0: Port device team_slave_1 added [ 190.101551][ T9062] team0: Port device team_slave_0 added [ 190.135419][ T9051] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.147040][ T9062] team0: Port device team_slave_1 added [ 190.194551][ T9058] device hsr_slave_0 entered promiscuous mode [ 190.263039][ T9058] device hsr_slave_1 entered promiscuous mode [ 190.303574][ T9058] debugfs: Directory 'hsr0' with parent '/' already present! [ 190.331684][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.372580][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.381439][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.390639][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.400767][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.410064][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.422556][ T3495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.430282][ T3495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.441964][ T3495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.450674][ T3495] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.475394][ T9056] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 190.521727][ T9056] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 190.579724][ T9051] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.654649][ T9062] device hsr_slave_0 entered promiscuous mode [ 190.703264][ T9062] device hsr_slave_1 entered promiscuous mode [ 190.762577][ T9062] debugfs: Directory 'hsr0' with parent '/' already present! [ 190.770193][ T9056] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 190.819639][ T9048] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.834505][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.844210][ T9058] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 190.888052][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.896782][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.905889][ T9056] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 190.979778][ T3495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.989724][ T3495] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.998300][ T3495] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.005413][ T3495] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.014016][ T9058] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 191.073905][ T9058] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 191.115488][ T9058] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 191.197505][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.215536][ T9054] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.272876][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.281525][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.290856][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.297993][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.307332][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.315970][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.333523][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.342262][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.354565][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.364400][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.373236][ T9062] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 191.434668][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.444355][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 191.451887][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 191.460146][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.468668][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.477429][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.485455][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.494593][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.505122][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.517050][ T9048] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.525386][ T9062] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 191.576615][ T9062] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 191.634857][ T9062] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 191.676409][ T9054] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.689306][ T9051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.743106][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.751758][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.765863][ T9060] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.773002][ T9060] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.780782][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.790080][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.798623][ T9060] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.805725][ T9060] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.815957][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.867118][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 191.877725][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 191.889312][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.901317][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 22:30:25 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1050, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f0000000180)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x841, 0x0) clone(0x3048380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000100)={0xd}, 0xd) [ 191.916982][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.928862][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.964380][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.972247][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.983985][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.995478][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.007806][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.019580][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.032368][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.048682][ T9051] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 192.088307][ T9058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.110514][ T9054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 22:30:25 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS64(r0, 0x4c02, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50bd0b94a4956448cd4144cb88abeba582dc0a71367dc57a20001f62408fdffc7ef067966df29d18a575068d2df00000000000000000000001000", "81c7d401e1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) [ 192.159428][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 192.168069][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 192.181662][ T9054] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 192.222321][ T9062] 8021q: adding VLAN 0 to HW filter on device bond0 22:30:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = userfaultfd(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000140)={'syz_tun\x00', &(0x7f00000001c0)=ANY=[@ANYRES16=r5]}) r6 = dup2(r3, r5) dup3(r6, r4, 0x0) 22:30:25 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x40605414, 0x0) [ 192.307203][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.320938][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.366364][ T9062] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.389717][ T9058] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.402288][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.410272][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.466832][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.483392][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.491993][ T9060] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.499152][ T9060] bridge0: port 1(bridge_slave_0) entered forwarding state 22:30:26 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 22:30:26 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fusectl\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x108020, &(0x7f00000001c0)=ANY=[@ANYBLOB='rootcontext']) [ 192.518365][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.529708][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.551896][ T9060] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.559119][ T9060] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.590084][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.628681][ T9100] fusectl: Unknown parameter 'rootcontext' [ 192.632271][ T9056] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.637479][ T9101] fusectl: Unknown parameter 'rootcontext' 22:30:26 executing program 2: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() ioctl$SNDCTL_DSP_RESET(0xffffffffffffffff, 0x5000, 0x0) stat(0x0, &(0x7f0000000440)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) stat(0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) r0 = semget$private(0x0, 0x1, 0x0) stat(&(0x7f0000000180)='./file0\x00', 0x0) getresgid(0x0, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r3, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r4 = creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x1a3d0, 0x4000054, 0x54000000, [], [{0x0, 0x0, 0x80000001}, {0x801}]}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r5}]}]}, 0x28}}, 0x24000cc9) syz_open_dev$dmmidi(0x0, 0x0, 0x0) 22:30:26 executing program 1: getpid() r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000000180)=0x0) r2 = eventfd2(0x0, 0x0) read$eventfd(r2, &(0x7f0000000280), 0x8) io_submit(r1, 0x1, &(0x7f0000001300)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) [ 192.689871][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.704941][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.730753][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.748301][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.755700][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.785998][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.797421][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.806087][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.813234][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.821243][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.835783][ C1] hrtimer: interrupt took 51335 ns [ 192.836463][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.857605][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 22:30:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) memfd_create(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c07, 0x0) [ 192.907345][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.918501][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.933649][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.942263][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.960937][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.970899][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.980454][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.989203][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.997865][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.009523][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.036282][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.062371][ T9062] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.083623][ T9056] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.108333][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.184237][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.196428][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.206424][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.218608][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.227298][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.235966][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.244532][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.251598][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.259299][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.268299][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.276833][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.283925][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.291890][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.300000][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.313312][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.321703][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.352067][ T9058] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 193.365334][ T9058] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.378545][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.387347][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 193.395171][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 193.402825][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.413975][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.423414][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.437626][ T9062] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.474734][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.485107][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.498515][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.507190][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.516443][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 193.523956][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 193.531371][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.540864][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.550607][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.567885][ T9058] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.579534][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.588712][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.599022][ T9056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.627648][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 193.638036][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 193.652351][ T9056] 8021q: adding VLAN 0 to HW filter on device batadv0 22:30:27 executing program 3: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() ioctl$SNDCTL_DSP_RESET(0xffffffffffffffff, 0x5000, 0x0) stat(0x0, &(0x7f0000000440)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) stat(0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) r0 = semget$private(0x0, 0x1, 0x0) stat(&(0x7f0000000180)='./file0\x00', 0x0) getresgid(0x0, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r3, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r4 = creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x1a3d0, 0x4000054, 0x54000000, [], [{0x0, 0x0, 0x80000001}, {0x801}]}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r5}]}]}, 0x28}}, 0x24000cc9) syz_open_dev$dmmidi(0x0, 0x0, 0x0) 22:30:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003e39405cb4aed12f0000000000ae47a8", 0x1c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:30:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0004060000feff800000003a4288443e7ff09b5ed7750700feff162d0201008cfe6d40fedc00000075c4171f001b4f36366194335b71e5fe003b40040000710e134c2a7b9db52376591a7a71e8b8e01db2e9b638096e6c582a66a2279a6f3d82dd1f2c27283c2b9fdb90109e6697fa878514e8277f16bedd18081374ea271190fdda477c053c82cf881194fae73ec1a838a8edeb69fa40103c110d5535bd2d886c53250d51a6279441c1adcda2b01a51c324b9d87b206bba083a1a0fb8cbfdfb48b6a6c5f16162f77ad1478ac098f8a217924e062dbd81c4460ec487f4b0723dd071d60a69e32a19ba723141e536d880b600e7a976b5a8d2c17c1e0764e201a554080057191ea805dc590775526f9e911393494a1d33f1e6ce190f389d990b6f1cecf6e3801af8fe78b45cf33a64bb47b8b9bae67ce7fdf5ddf8f1bdb9f84999953ae90867185c38d5446925c20300000000000000392a032328fcaf1fa4046db3e358503e4a1861f7b5132204614e51a91990cbed370be7a51a1603f6259b275080f4ddf59da885ca3e9b461132125ee8d880bbb1084a4307caee6a509af879ec047276b4709dbf104584c794f6f60543b0285e8a8b419b73e885c1c8907199f7a98e78bd040000000000000056dbf7a3c023a47ddcb9b4b978331f7020cd901bffd7b972d06a9c28979b001524949d69bd2bc792fd32f8f7a300000000000000000000000000000000ccf6a66f86d7e51f54bf105c16d62880408ac4e6806ff9e857f1a8cdfaa4f5a1fd4bbf7f3aeb28c2834b4f5845c44513d593598b9785da82c52d9a93853aa56bca5a8200fa44e1fe2f449e223821357165ea298737a35e116448a3d12fe7af14e2ce456fe53fb40012a96c56fc0a46809bfa5f9b3dcf194c2ed024"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000400)=""/236, 0x117248e3) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x4) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 22:30:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x27c9, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000540)=""/20, 0x14}, {0x0}, {0x0}], 0x3}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r2, 0x0) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r4, &(0x7f00000009c0)=[{&(0x7f0000000180)=""/183, 0xb7}, {0x0}], 0x2) shutdown(r3, 0x0) shutdown(r1, 0x0) 22:30:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000140)={'syz_tun\x00', &(0x7f00000001c0)=ANY=[@ANYRES16=r5]}) r6 = dup2(r3, r5) dup3(r6, r4, 0x0) 22:30:27 executing program 2: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() ioctl$SNDCTL_DSP_RESET(0xffffffffffffffff, 0x5000, 0x0) stat(0x0, &(0x7f0000000440)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) stat(0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) r0 = semget$private(0x0, 0x1, 0x0) stat(&(0x7f0000000180)='./file0\x00', 0x0) getresgid(0x0, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r3, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r4 = creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x1a3d0, 0x4000054, 0x54000000, [], [{0x0, 0x0, 0x80000001}, {0x801}]}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r5}]}]}, 0x28}}, 0x24000cc9) syz_open_dev$dmmidi(0x0, 0x0, 0x0) 22:30:27 executing program 3: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() ioctl$SNDCTL_DSP_RESET(0xffffffffffffffff, 0x5000, 0x0) stat(0x0, &(0x7f0000000440)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) stat(0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) r0 = semget$private(0x0, 0x1, 0x0) stat(&(0x7f0000000180)='./file0\x00', 0x0) getresgid(0x0, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r3, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r4 = creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x1a3d0, 0x4000054, 0x54000000, [], [{0x0, 0x0, 0x80000001}, {0x801}]}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r5}]}]}, 0x28}}, 0x24000cc9) syz_open_dev$dmmidi(0x0, 0x0, 0x0) 22:30:27 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mlockall(0x1) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 22:30:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000400)=""/236, 0x117248e3) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x4) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 22:30:27 executing program 2: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() ioctl$SNDCTL_DSP_RESET(0xffffffffffffffff, 0x5000, 0x0) stat(0x0, &(0x7f0000000440)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) stat(0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) r0 = semget$private(0x0, 0x1, 0x0) stat(&(0x7f0000000180)='./file0\x00', 0x0) getresgid(0x0, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r3, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r4 = creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x1a3d0, 0x4000054, 0x54000000, [], [{0x0, 0x0, 0x80000001}, {0x801}]}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r5}]}]}, 0x28}}, 0x24000cc9) syz_open_dev$dmmidi(0x0, 0x0, 0x0) 22:30:27 executing program 1: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r1, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) 22:30:28 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) readv(r0, &(0x7f0000000040)=[{&(0x7f0000001200)=""/212, 0xd4}], 0x1) 22:30:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) alarm(0x0) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x807a00, 0x0) 22:30:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/189) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x101000, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mlockall(0x1) 22:30:30 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000400)=""/236, 0x117248e3) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x4) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 22:30:30 executing program 1: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r1, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) 22:30:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x27c9, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000540)=""/20, 0x14}, {0x0}, {0x0}], 0x3}, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r2, 0x0) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r4, &(0x7f00000009c0)=[{&(0x7f0000000180)=""/183, 0xb7}], 0x1) shutdown(r3, 0x0) shutdown(r1, 0x0) 22:30:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}, 0x401}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x8}, 0x8) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0xa34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x227, 0xfffffffffffffffe) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000980)=[{&(0x7f00000004c0)}, {&(0x7f0000000c00)}, {&(0x7f0000000b40)="56f9e3f13f70ab1d55d25754b0481af719e24baa0a56df3ba3da0db9a93972d1fcb3ccf86104a111f593f5318a57ced58ed9d3b6179730d253f617154e97a4244ccf8d0f6430de831c86d21041c586ad716e3a6c93ccbaa8746f3e31f2bd2ecb6611353dbc3a75c5be0bf3a3bcaf24b6129922b65bb94f697bca279491ba4d4c7b7898bfe3221a644a75d83e", 0x8c}, {&(0x7f0000000cc0)="a34082c2e7324a8b6d1246aa726d5910834155947cc590fef9b3a3108cf939b3fceccb60cf7eba197cf12f0c62d411f8090d32b810086b7d3fff57777c62dbbb545d7fc90657fd86d1e79e1ff7563a5e9e1fed568dd281e37037b17d08f2a415d14a73a03840f89116d419cd7bc816969254e765dfc9f0426289473c3fbdd40c77224d8aed6edd", 0x87}, {&(0x7f00000006c0)="f90a6ecf72adb89cf65c3ffa0fca96e85be5fedbd056a7cd56b878713f7a5f9816add4ab29d2011a11dbfd056f6ebba33d2f2aa3dd79c5db099ff8241f7e8e1a30dec60f10778a7cd6ca5faaaedd058e697fe2d89b906fafa4e1b71d7d7de2ff5341454ced671a7d1002b8", 0x6b}, {&(0x7f0000000800)="b1912ce1a93508452c7ad24c36ceba0087be062ee910c73598c7505e1f188da4d27e41064950ef063ac2c612e7f70fc4838f9dafe8da93eb310756d8df5cf88fbe4a931e9f09da704e2ed6ef5a603d5b13ca0c5c0ec60ec5a6ca1687723268e4ef412d854a81f4bd60375ee0e5c5c4eb0b81cda85813722f0ab93d1a2a9257af7f9cbca6386ff0c549b90420cd5bc97bae49b19143696fc23fdf4fbaf2b8c38aee4bb7f8d6241d346461221c8875ea0e96ccd2378056", 0xb6}, {&(0x7f00000000c0)="c620df5dc1f2469eed53e9f46a67749d758f10090651e7a0d114", 0x1a}, {0x0}, {0x0}, {0x0}], 0xa, 0x0) socket(0x840000000002, 0x3, 0x200000000000ff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') preadv(r4, &(0x7f00000017c0), 0x1b4, 0x500000000000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 22:30:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 22:30:30 executing program 1: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r1, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) 22:30:30 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000400)=""/236, 0x117248e3) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x4) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 22:30:30 executing program 0: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x1, 0x0) 22:30:30 executing program 3: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:30:31 executing program 1: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r1, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) 22:30:31 executing program 0: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() stat(0x0, &(0x7f0000000440)) fstat(0xffffffffffffffff, 0x0) stat(0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x2c, 0x21, 0x101, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r1, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x1a3d0, 0x4000054, 0x54000000, [], [{0x0, 0x0, 0x80000001}, {0x801}]}) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}}, 0x24000cc9) 22:30:31 executing program 4: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x285042a, 0x0) 22:30:31 executing program 1: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) 22:30:31 executing program 2: r0 = socket(0x15, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000140)) 22:30:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002400)={0xffffffffffffffff, 0xc0, &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r4, &(0x7f00000017c0), 0x1d0, 0x7a) 22:30:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000400)=""/236, 0x117248e3) syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x4) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 22:30:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1, 0x0, 0x0, 0x7}]}, {0x0, [0x5f, 0x5f, 0x5f]}}, &(0x7f0000000300)=""/250, 0x29, 0xfa, 0x8}, 0x20) 22:30:31 executing program 1: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) 22:30:31 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000240)) 22:30:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) open$dir(0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa, 0x0, 0x0, 0x20, 0x0, 0xd100}) [ 198.252307][ T9276] EXT4-fs (sda1): re-mounted. Opts: 22:30:31 executing program 1: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, 0x0, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) [ 198.295514][ T9283] EXT4-fs (sda1): re-mounted. Opts: 22:30:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x20) 22:30:31 executing program 4: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000600)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53dc9f2653d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r1, r0, r1}, &(0x7f0000000240)=""/112, 0x208, &(0x7f0000000580)={&(0x7f0000000500)={'crc32\x00'}}) [ 198.431110][ T9291] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 22:30:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0f01d866b9800000c00f326635000100000f30ded90ff49500300fc7b671070f20d86635080000000f22d8ba6100ec0f001f633ff30f09", 0x37}], 0x1, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x404a}}, 0x0) 22:30:32 executing program 1: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r0, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) [ 198.601161][ T9289] list_del corruption. prev->next should be ffff888096bb1170, but was ffff888096bb12d0 [ 198.611652][ T9289] ------------[ cut here ]------------ [ 198.617126][ T9289] kernel BUG at lib/list_debug.c:51! [ 198.622547][ T9289] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 198.628627][ T9289] CPU: 1 PID: 9289 Comm: syz-executor.2 Not tainted 5.5.0-rc1-next-20191211-syzkaller #0 [ 198.638422][ T9289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 22:30:32 executing program 1: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r0, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) [ 198.648504][ T9289] RIP: 0010:__list_del_entry_valid.cold+0xf/0x4f [ 198.654832][ T9289] Code: e8 c9 00 cb fd 0f 0b 48 89 f1 48 c7 c7 c0 10 70 88 4c 89 e6 e8 b5 00 cb fd 0f 0b 4c 89 f6 48 c7 c7 60 12 70 88 e8 a4 00 cb fd <0f> 0b 4c 89 ea 4c 89 f6 48 c7 c7 a0 11 70 88 e8 90 00 cb fd 0f 0b [ 198.674615][ T9289] RSP: 0018:ffffc900017c7c88 EFLAGS: 00010282 [ 198.680692][ T9289] RAX: 0000000000000054 RBX: ffff888096b32880 RCX: 0000000000000000 [ 198.688691][ T9289] RDX: 0000000000000000 RSI: ffffffff815e8576 RDI: fffff520002f8f83 22:30:32 executing program 1: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r0, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) [ 198.696670][ T9289] RBP: ffffc900017c7ca0 R08: 0000000000000054 R09: ffffed1015d26621 [ 198.704644][ T9289] R10: ffffed1015d26620 R11: ffff8880ae933107 R12: ffff888096b32980 [ 198.712726][ T9289] R13: ffff888096bb12d0 R14: ffff888096bb1170 R15: ffff888096bb1170 [ 198.720709][ T9289] FS: 0000000001645940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 198.729659][ T9289] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 198.736681][ T9289] CR2: 0000001b31825000 CR3: 000000009f6f3000 CR4: 00000000001426e0 [ 198.744678][ T9289] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 198.752651][ T9289] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 198.753128][ T4089] kobject: 'loop1' (00000000afe31413): kobject_uevent_env [ 198.760637][ T9289] Call Trace: [ 198.771016][ T9289] __dentry_kill+0x1fd/0x600 [ 198.775639][ T9289] ? dput+0x38/0xe10 [ 198.779565][ T9289] ? dput+0x38/0xe10 [ 198.783596][ T9289] dput+0x62f/0xe10 [ 198.787414][ T9289] simple_recursive_removal+0x5bc/0x6d0 [ 198.790838][ T4089] kobject: 'loop1' (00000000afe31413): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 198.792968][ T9289] ? debugfs_rename+0x7f0/0x7f0 [ 198.792986][ T9289] debugfs_remove+0x5e/0x80 [ 198.793001][ T9289] kvm_vcpu_release+0x5c/0xa0 [ 198.793013][ T9289] __fput+0x2ff/0x890 [ 198.793026][ T9289] ? kvm_vm_release+0x60/0x60 [ 198.793038][ T9289] ____fput+0x16/0x20 [ 198.793057][ T9289] task_work_run+0x145/0x1c0 [ 198.834433][ T9289] exit_to_usermode_loop+0x316/0x380 [ 198.839732][ T9289] do_syscall_64+0x676/0x790 [ 198.844339][ T9289] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.849818][ T4089] kobject: 'loop1' (00000000afe31413): kobject_uevent_env [ 198.850233][ T9289] RIP: 0033:0x4143e1 [ 198.861341][ T9289] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 198.880951][ T9289] RSP: 002b:00007ffd5c00c840 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 198.886048][ T4089] kobject: 'loop1' (00000000afe31413): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:30:32 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000400)=""/236, 0x117248e3) syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x4) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 22:30:32 executing program 1: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r1, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) [ 198.889381][ T9289] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00000000004143e1 [ 198.889387][ T9289] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 198.889395][ T9289] RBP: 0000000000000001 R08: 00000000fc2b66a5 R09: 00000000fc2b66a9 [ 198.889402][ T9289] R10: 00007ffd5c00c920 R11: 0000000000000293 R12: 000000000075bf20 [ 198.889408][ T9289] R13: 000000000003078c R14: 0000000000761600 R15: 000000000075bf2c [ 198.889421][ T9289] Modules linked in: [ 198.890258][ T9289] ---[ end trace 5a3359250431cee5 ]--- 22:30:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x101000, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mlockall(0x1) [ 198.948181][ T4089] kobject: 'loop5' (0000000092964c2d): kobject_uevent_env [ 198.949066][ T9289] RIP: 0010:__list_del_entry_valid.cold+0xf/0x4f [ 198.962557][ T9289] Code: e8 c9 00 cb fd 0f 0b 48 89 f1 48 c7 c7 c0 10 70 88 4c 89 e6 e8 b5 00 cb fd 0f 0b 4c 89 f6 48 c7 c7 60 12 70 88 e8 a4 00 cb fd <0f> 0b 4c 89 ea 4c 89 f6 48 c7 c7 a0 11 70 88 e8 90 00 cb fd 0f 0b [ 198.978221][ T4089] kobject: 'loop5' (0000000092964c2d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 198.982197][ T9289] RSP: 0018:ffffc900017c7c88 EFLAGS: 00010282 [ 198.998439][ T9289] RAX: 0000000000000054 RBX: ffff888096b32880 RCX: 0000000000000000 [ 199.006473][ T9289] RDX: 0000000000000000 RSI: ffffffff815e8576 RDI: fffff520002f8f83 [ 199.014478][ T9289] RBP: ffffc900017c7ca0 R08: 0000000000000054 R09: ffffed1015d26621 [ 199.022485][ T9289] R10: ffffed1015d26620 R11: ffff8880ae933107 R12: ffff888096b32980 [ 199.030459][ T9289] R13: ffff888096bb12d0 R14: ffff888096bb1170 R15: ffff888096bb1170 [ 199.034496][ T4089] kobject: 'loop3' (00000000e62f2e95): kobject_uevent_env [ 199.038585][ T9289] FS: 0000000001645940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 199.038593][ T9289] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 199.038606][ T9289] CR2: 0000001b31825000 CR3: 000000009f6f3000 CR4: 00000000001426e0 [ 199.069379][ T9289] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 199.077402][ T9289] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 199.081202][ T4089] kobject: 'loop3' (00000000e62f2e95): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 199.085406][ T9289] Kernel panic - not syncing: Fatal exception [ 199.086620][ T9289] Kernel Offset: disabled [ 199.107188][ T9289] Rebooting in 86400 seconds..