[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 53.423691][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 53.423708][ T27] audit: type=1800 audit(1577069784.775:29): pid=7755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 53.449909][ T27] audit: type=1800 audit(1577069784.775:30): pid=7755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.28' (ECDSA) to the list of known hosts. 2019/12/23 02:56:32 fuzzer started 2019/12/23 02:56:34 dialing manager at 10.128.0.105:34873 2019/12/23 02:56:34 syscalls: 2692 2019/12/23 02:56:34 code coverage: enabled 2019/12/23 02:56:34 comparison tracing: enabled 2019/12/23 02:56:34 extra coverage: enabled 2019/12/23 02:56:34 setuid sandbox: enabled 2019/12/23 02:56:34 namespace sandbox: enabled 2019/12/23 02:56:34 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/23 02:56:34 fault injection: enabled 2019/12/23 02:56:34 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/23 02:56:34 net packet injection: enabled 2019/12/23 02:56:34 net device setup: enabled 2019/12/23 02:56:34 concurrency sanitizer: enabled 2019/12/23 02:56:34 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 71.062012][ T7919] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/23 02:56:46 adding functions to KCSAN blacklist: 'taskstats_exit' 'blk_mq_free_request' 'vti_tunnel_xmit' 'pipe_double_lock' 'ext4_free_inode' 'ext4_free_inodes_count' 'timer_clear_idle' 'ext4_nonda_switch' 'rcu_gp_fqs_loop' 'ext4_write_end' 'd_alloc_parallel' 'tick_do_update_jiffies64' 'l2tp_tunnel_del_work' 'ext4_mark_iloc_dirty' 'wbc_detach_inode' '__find_get_block' 'pid_update_inode' 'iomap_dio_bio_actor' 'clear_inode' 'kauditd_thread' 'blk_stat_add' 'ext4_writepages' 'generic_file_read_iter' '__writeback_single_inode' 'fasync_remove_entry' 'tick_nohz_next_event' 'xas_clear_mark' 'blk_mq_run_hw_queue' 'audit_log_start' 'mm_update_next_owner' 'tomoyo_check_path_acl' 'complete_signal' 'vm_area_dup' 'blk_mq_get_request' 'do_exit' 'xas_find_marked' 'wbt_issue' 'ondemand_readahead' 'rcu_gp_fqs_check_wake' 'lruvec_lru_size' 'echo_char' 'tick_nohz_idle_stop_tick' 'snd_seq_check_queue' 'tomoyo_supervisor' 'ep_poll' 'do_syslog' 'do_wait' 'dd_has_work' 'sit_tunnel_xmit' '__rcu_read_unlock' 'mod_timer' 'poll_schedule_timeout' 'generic_fillattr' 'percpu_counter_add_batch' 'ext4_has_free_clusters' '__snd_rawmidi_transmit_ack' 'run_timer_softirq' 'blk_mq_dispatch_rq_list' 'sbitmap_queue_clear' 'file_update_time' 'find_get_pages_range_tag' 'process_srcu' 'wbt_done' 'ext4_mb_good_group' 'list_lru_count_one' '__d_lookup_done' 'virtqueue_disable_cb' '__mark_inode_dirty' 'wbt_wait' 'shmem_file_read_iter' 'add_timer' 'find_next_bit' 'generic_update_time' 'do_try_to_free_pages' 'blk_mq_sched_dispatch_requests' 'do_nanosleep' 'tick_sched_do_timer' 'generic_write_end' 'evict' '__delete_from_page_cache' '__ext4_new_inode' 'copy_process' 'ktime_get_real_seconds' '__hrtimer_run_queues' 'n_tty_receive_buf_common' 03:00:01 executing program 0: r0 = add_key(&(0x7f0000002000)='logon\x00', &(0x7f0000001000), &(0x7f0000001000)="1c989cc9f58ec796be4720e6160291a2fb7c6445e84b8e9e349ead029fe38d5810bf992b5d51f406a51cc339021268aed6f767582af42dbc8ea1110e4353fcf30b20f1f27ed3b44bef6444f8ca6a808e34ded636ef55e151c11b4ef7a5384f4a0ceb885759dfeeca5aaa540de461d2130755897533032f5639c4ba79988a49d63084f2cbed0a84e5e733146f15192fdabd0e3a", 0x93, 0xfffffffffffffffc) keyctl$update(0x2, r0, &(0x7f0000000180)=':', 0x1) 03:00:01 executing program 1: r0 = open(&(0x7f0000000500)='./bus\x00', 0x152047, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='/dev/keychord\x00', 0x0) pwritev(r2, &(0x7f0000000440)=[{&(0x7f0000000480)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fcntl$setstatus(r0, 0x4, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(r3, &(0x7f0000000180)='net/hci\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fstat(r2, &(0x7f00000001c0)) r8 = socket$inet_udp(0x2, 0x2, 0x0) splice(r7, 0x0, r8, 0x0, 0x30005, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x7ffff) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x44000, 0x0) [ 269.907746][ T7923] IPVS: ftp: loaded support on port[0] = 21 [ 270.002214][ T7923] chnl_net:caif_netlink_parms(): no params data found [ 270.065512][ T7923] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.081456][ T7923] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.101383][ T7923] device bridge_slave_0 entered promiscuous mode [ 270.109180][ T7923] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.126574][ T7923] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.135169][ T7923] device bridge_slave_1 entered promiscuous mode [ 270.152843][ T7923] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 03:00:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 270.164267][ T7923] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 270.183336][ T7926] IPVS: ftp: loaded support on port[0] = 21 [ 270.184965][ T7923] team0: Port device team_slave_0 added [ 270.197258][ T7923] team0: Port device team_slave_1 added [ 270.283565][ T7923] device hsr_slave_0 entered promiscuous mode [ 270.321619][ T7923] device hsr_slave_1 entered promiscuous mode [ 270.389103][ T7928] IPVS: ftp: loaded support on port[0] = 21 [ 270.398425][ T7923] netdevsim netdevsim0 netdevsim0: renamed from eth0 03:00:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x0) [ 270.456726][ T7923] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 270.514375][ T7923] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 270.578475][ T7923] netdevsim netdevsim0 netdevsim3: renamed from eth3 03:00:02 executing program 4: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) socket(0x0, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) sendto$inet(r0, &(0x7f0000000080)='\x00', 0xffffffffffffff18, 0x80811, 0x0, 0x0) [ 270.705192][ T7931] IPVS: ftp: loaded support on port[0] = 21 [ 270.731789][ T7926] chnl_net:caif_netlink_parms(): no params data found [ 270.766394][ T7923] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.773500][ T7923] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.780822][ T7923] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.787912][ T7923] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.882645][ T7926] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.889738][ T7926] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.908976][ T7926] device bridge_slave_0 entered promiscuous mode 03:00:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080), 0x4) [ 270.950094][ T7926] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.957344][ T7926] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.982736][ T7926] device bridge_slave_1 entered promiscuous mode [ 270.995154][ T7934] IPVS: ftp: loaded support on port[0] = 21 [ 271.071447][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.079377][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.097509][ T7923] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.108006][ T7928] chnl_net:caif_netlink_parms(): no params data found [ 271.117967][ T7926] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 271.148094][ T7926] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 271.157652][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.165628][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.216494][ T7938] IPVS: ftp: loaded support on port[0] = 21 [ 271.220785][ T7928] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.229741][ T7928] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.237584][ T7928] device bridge_slave_0 entered promiscuous mode [ 271.245667][ T7923] 8021q: adding VLAN 0 to HW filter on device team0 [ 271.260784][ T7926] team0: Port device team_slave_0 added [ 271.267267][ T7926] team0: Port device team_slave_1 added [ 271.275297][ T7928] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.282977][ T7928] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.290776][ T7928] device bridge_slave_1 entered promiscuous mode [ 271.297857][ T7931] chnl_net:caif_netlink_parms(): no params data found [ 271.393843][ T7926] device hsr_slave_0 entered promiscuous mode [ 271.451748][ T7926] device hsr_slave_1 entered promiscuous mode [ 271.521399][ T7926] debugfs: Directory 'hsr0' with parent '/' already present! [ 271.529663][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.538378][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.547273][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.554382][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.580313][ T7928] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 271.615630][ T7928] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 271.639300][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.648061][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.656520][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.663552][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.671185][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 271.680243][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.689166][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 271.698025][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.706883][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 271.735242][ T7928] team0: Port device team_slave_0 added [ 271.745729][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 271.754342][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.763790][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 271.772607][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.783603][ T7934] chnl_net:caif_netlink_parms(): no params data found [ 271.806967][ T7928] team0: Port device team_slave_1 added [ 271.814972][ T7931] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.823683][ T7931] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.831612][ T7931] device bridge_slave_0 entered promiscuous mode [ 271.839596][ T7931] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.847191][ T7931] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.854960][ T7931] device bridge_slave_1 entered promiscuous mode [ 271.862199][ T7926] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 271.927648][ T7926] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 271.984932][ T7926] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 272.053903][ T7923] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 272.065668][ T7923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 272.074967][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 272.083707][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.106817][ T7934] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.114075][ T7934] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.123893][ T7934] device bridge_slave_0 entered promiscuous mode [ 272.130762][ T7926] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 272.194869][ T7934] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.202155][ T7934] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.209935][ T7934] device bridge_slave_1 entered promiscuous mode [ 272.235184][ T7931] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 272.293177][ T7928] device hsr_slave_0 entered promiscuous mode [ 272.361691][ T7928] device hsr_slave_1 entered promiscuous mode [ 272.421454][ T7928] debugfs: Directory 'hsr0' with parent '/' already present! [ 272.430323][ T7934] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 272.440673][ T7934] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 272.467360][ T7931] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 272.488246][ T7934] team0: Port device team_slave_0 added [ 272.504631][ T7931] team0: Port device team_slave_0 added [ 272.515790][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 272.524948][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 272.532922][ T7938] chnl_net:caif_netlink_parms(): no params data found [ 272.542358][ T7934] team0: Port device team_slave_1 added [ 272.554740][ T7931] team0: Port device team_slave_1 added [ 272.665649][ T7931] device hsr_slave_0 entered promiscuous mode [ 272.721788][ T7931] device hsr_slave_1 entered promiscuous mode [ 272.791384][ T7931] debugfs: Directory 'hsr0' with parent '/' already present! [ 272.799351][ T7928] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 272.866777][ T7923] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 272.875511][ T7928] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 272.943457][ T7934] device hsr_slave_0 entered promiscuous mode [ 273.001544][ T7934] device hsr_slave_1 entered promiscuous mode [ 273.081393][ T7934] debugfs: Directory 'hsr0' with parent '/' already present! [ 273.091970][ T7938] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.099006][ T7938] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.107445][ T7938] device bridge_slave_0 entered promiscuous mode [ 273.124247][ T7928] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 273.192142][ T7938] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.199237][ T7938] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.207267][ T7938] device bridge_slave_1 entered promiscuous mode [ 273.222475][ T7928] netdevsim netdevsim2 netdevsim3: renamed from eth3 03:00:04 executing program 0: 03:00:04 executing program 0: [ 273.336106][ T7931] netdevsim netdevsim3 netdevsim0: renamed from eth0 03:00:04 executing program 0: [ 273.393539][ T7931] netdevsim netdevsim3 netdevsim1: renamed from eth1 03:00:04 executing program 0: [ 273.441227][ T7926] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.455572][ T7934] netdevsim netdevsim4 netdevsim0: renamed from eth0 03:00:04 executing program 0: [ 273.493167][ T7934] netdevsim netdevsim4 netdevsim1: renamed from eth1 03:00:04 executing program 0: [ 273.541869][ T7931] netdevsim netdevsim3 netdevsim2: renamed from eth2 03:00:04 executing program 0: [ 273.607318][ T7931] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 273.660742][ T7926] 8021q: adding VLAN 0 to HW filter on device team0 [ 273.684616][ T7934] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 273.733534][ T7934] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 273.784524][ T7938] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 273.794741][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.802738][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.831756][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 273.840521][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.849025][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.856100][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.864059][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 273.872840][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 273.881127][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.888163][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.897413][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 273.906223][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 273.916124][ T7938] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 273.937692][ T7938] team0: Port device team_slave_0 added [ 273.944785][ T7938] team0: Port device team_slave_1 added [ 274.003586][ T7938] device hsr_slave_0 entered promiscuous mode [ 274.041604][ T7938] device hsr_slave_1 entered promiscuous mode [ 274.081559][ T7938] debugfs: Directory 'hsr0' with parent '/' already present! [ 274.089781][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 274.101552][ T7928] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.111460][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 274.119056][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.132950][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 274.145404][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.168946][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 274.176902][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 274.185668][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.194583][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 274.203006][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 274.211214][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 274.219613][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 274.229399][ T7928] 8021q: adding VLAN 0 to HW filter on device team0 [ 274.238986][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 274.276147][ T7938] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 274.306875][ T7938] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 274.343345][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.353656][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.362033][ T3601] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.369672][ T3601] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.377906][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 274.393556][ T7934] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.402855][ T7931] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.411019][ T7938] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 274.475747][ T7938] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 274.514568][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 274.523490][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.533245][ T7937] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.540309][ T7937] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.548293][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 274.557648][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 274.566614][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 274.575087][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.584656][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 274.599113][ T7934] 8021q: adding VLAN 0 to HW filter on device team0 [ 274.618619][ T7931] 8021q: adding VLAN 0 to HW filter on device team0 [ 274.628304][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 274.636775][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.645220][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 274.653030][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.660675][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 274.669403][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.677952][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.686877][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.695368][ T7933] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.702440][ T7933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.710183][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 274.718729][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 274.727125][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 274.734611][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 274.742136][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 274.774630][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 274.786790][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.795204][ T7933] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.802250][ T7933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.810318][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 274.819300][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 274.827567][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 274.835986][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.844636][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.853226][ T7933] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.860302][ T7933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.868365][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 274.877563][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 274.886162][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.896644][ T7928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 274.913097][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 274.921158][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 274.929753][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 274.938499][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.953967][ T7926] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 274.973192][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 274.982070][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.990670][ T7937] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.997877][ T7937] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.005861][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 275.015476][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 275.023056][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 275.030479][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 275.039101][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 275.050379][ T7928] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 275.073871][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 275.082988][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 275.092198][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 275.101058][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 275.110316][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 275.120794][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 275.147000][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 275.185468][ T7931] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 275.246983][ T7931] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 275.264324][ T7938] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.276855][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 275.285718][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 275.294665][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 275.303500][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 275.312663][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 275.321901][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 275.330579][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 275.346191][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 275.355742][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 275.370843][ T7938] 8021q: adding VLAN 0 to HW filter on device team0 [ 275.383182][ T7934] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 275.406046][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.414083][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.433224][ T7931] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 275.454761][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 275.462827][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 275.470332][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 275.479754][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 275.488325][ T7937] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.495435][ T7937] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.503494][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 275.512000][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 275.520236][ T7937] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.527310][ T7937] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.535168][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 275.551391][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 275.560332][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 275.569575][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 275.578690][ T7937] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 275.598024][ T7938] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 275.608759][ T7938] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 275.620661][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 275.628975][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 275.637602][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 275.646572][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 275.655168][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 275.663936][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 275.672350][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 275.680895][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 275.734151][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 275.771669][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 275.795238][ T7938] 8021q: adding VLAN 0 to HW filter on device batadv0 03:00:07 executing program 2: 03:00:07 executing program 0: 03:00:07 executing program 4: 03:00:07 executing program 3: 03:00:07 executing program 5: 03:00:07 executing program 1: 03:00:07 executing program 0: 03:00:07 executing program 2: 03:00:07 executing program 4: 03:00:07 executing program 3: 03:00:07 executing program 1: 03:00:07 executing program 5: 03:00:07 executing program 2: 03:00:07 executing program 0: 03:00:07 executing program 3: 03:00:07 executing program 4: 03:00:07 executing program 1: 03:00:07 executing program 5: 03:00:08 executing program 0: 03:00:08 executing program 2: 03:00:08 executing program 4: 03:00:08 executing program 5: 03:00:08 executing program 3: 03:00:08 executing program 1: 03:00:08 executing program 0: 03:00:08 executing program 5: 03:00:08 executing program 4: 03:00:08 executing program 2: 03:00:08 executing program 3: 03:00:08 executing program 1: 03:00:08 executing program 0: 03:00:08 executing program 4: 03:00:08 executing program 5: 03:00:08 executing program 1: 03:00:08 executing program 2: 03:00:08 executing program 3: 03:00:08 executing program 0: 03:00:08 executing program 5: 03:00:08 executing program 0: 03:00:09 executing program 4: 03:00:09 executing program 2: 03:00:09 executing program 1: 03:00:09 executing program 3: 03:00:09 executing program 5: 03:00:09 executing program 0: 03:00:09 executing program 4: 03:00:09 executing program 2: 03:00:09 executing program 3: 03:00:09 executing program 1: 03:00:09 executing program 5: 03:00:09 executing program 0: 03:00:09 executing program 4: 03:00:09 executing program 2: 03:00:09 executing program 3: 03:00:09 executing program 5: 03:00:09 executing program 1: 03:00:09 executing program 4: 03:00:09 executing program 0: 03:00:09 executing program 2: 03:00:09 executing program 1: 03:00:09 executing program 5: 03:00:09 executing program 3: 03:00:10 executing program 0: 03:00:10 executing program 4: 03:00:10 executing program 2: 03:00:10 executing program 1: 03:00:10 executing program 5: 03:00:10 executing program 3: 03:00:10 executing program 1: 03:00:10 executing program 5: 03:00:10 executing program 2: 03:00:10 executing program 4: 03:00:10 executing program 0: 03:00:10 executing program 3: 03:00:10 executing program 4: 03:00:10 executing program 1: 03:00:10 executing program 5: 03:00:10 executing program 0: 03:00:10 executing program 2: 03:00:10 executing program 3: 03:00:10 executing program 5: 03:00:10 executing program 1: 03:00:10 executing program 4: 03:00:11 executing program 0: 03:00:11 executing program 2: 03:00:11 executing program 5: 03:00:11 executing program 4: 03:00:11 executing program 3: 03:00:11 executing program 1: 03:00:11 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ecryptfs\x00', 0x0, &(0x7f0000000140)='devtmpfs\x00') syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7ff, 0x2, &(0x7f0000000100)=[{&(0x7f0000000280)="515de0686afa498a0f5690d18fc1d33b1b0f6f1db82c92f4af1ae60801e2e5b18b3671bd00a1105d758db4672d2045be2fc5ffcaa758c54d91e3509992b3747bff69ab8b66b6e28098378e1f43b9dfbd1ed0a2cd473b3c6d72055e1ff09a12921f3f6cd53e6b46fcd818fad58e5895898be1f9fde7fcc2c3ddf8853993eb1a9f11199e2ea2fbddc1c7cb6395909183a2da50abd0a8696dca585901990a40ae87fe16e003bf16bb2fc3e1196773bb34b00731f4f372725e4a8af5215076906fd9833a3dd8d12fbf0c8355605dd4650a2049", 0xd1, 0xffff}, {&(0x7f0000000180)="d6845bb4441de36983a9e12454c97736b43a5cef6d07f6767a9eebfe9abfbc6f7b1d80af65bd848ce6f14d8db222e899ac4305167d9e602b4787b95aa238d5d0f3b224f2b1b2f5de1e45e44f87d9248cddee84bc8ead7b0e84aec687964c855b54795d92d8b92fee9a5be8e234c33969cb8937bedf41a6db191f1e90b8c94a77c6acc5fd0d186c84465e5a1f135755127d797602011d0c53457e04e869", 0x9d, 0xfffffffffffffff9}], 0x400, &(0x7f0000000380)='ecryptfs\x00') fsetxattr$security_evm(0xffffffffffffffff, &(0x7f00000003c0)='security.evm\x00', &(0x7f0000000400)=@v2={0x5, 0x1, 0x13, 0x2, 0x9e, "cab8ce5432e87638791414986e5807896264a682e8a37f555c74719c652dba057cb4a785ee9af2e9bf1c750c65878af0965b2471581da925446b082743a8fa44b59cb46648a46732bf2ede9dc4fdfa99e751487b62e5ba8a20081609d50d9edbb3dede11787b9dd9103a3367ff23f44b7c50a20e85e10d267d725ef6d12b2227bd6523131e011305f0407559508a5e4670d6926789965b4dcc7a63325ac1"}, 0xa8, 0x0) 03:00:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) r0 = add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="e58ce4f962a9058ccd0cc99af8d7457f0f38f608ef17182cf2716716", 0x1c, 0xfffffffffffffffa) keyctl$setperm(0x5, r0, 0x20000) 03:00:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r3, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000100)=ANY=[@ANYBLOB="02090000020080005f361eecd0e9b20000000000000000"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r4, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r5 = dup2(r3, r4) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000080)={0x3f, 0x4, 0x4, 0x100, 0xddfa, {r1, r2/1000+10000}, {0x127bc0d5cbc91b45, 0xc, 0x4, 0xff, 0x27, 0x2, "cad6075c"}, 0x101, 0x1, @fd=r5, 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x24}, [@ldst={0x7, 0x0, 0x4, 0x0, 0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 03:00:11 executing program 2: gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) tkill(0xffffffffffffffff, 0x33) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x4, 0x7, 0x0, 0x20}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/softnet_stat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000400)={0x60, 0x0, 0x0, {{0x2, 0x5, 0x0, 0x9, 0x10000, 0x7, 0x8001, 0x9}}}, 0x60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) r6 = socket$inet(0x2, 0x4000000805, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) ioctl$BLKRRPART(r5, 0x125f, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) clone(0x2000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0::6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 03:00:11 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = open(&(0x7f00000003c0)='./file0\x00', 0x1600ff578395b854, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x626041, 0x0) write$P9_RLOPEN(r2, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0xe, 0x4, 0x1}, 0x7}}, 0xf) r3 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80)={0x0, 0x0}, &(0x7f0000000cc0)=0xc) sendmmsg$unix(r1, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, r3}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r4}}}], 0x40, 0x4000}, {0x0, 0x0, 0x0, 0x0, &(0x7f00000010c0), 0x0, 0x4000004}], 0x2, 0x20000000) ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f0000000140)={@null, @null, @default, 0x9, 0x524, 0x3, [@bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000000)) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000100), 0x4) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0xa, 0x3, 0x20) getsockopt$IP6T_SO_GET_REVISION_MATCH(r6, 0x29, 0x44, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) fcntl$dupfd(r5, 0x406, r6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x4e22, 0x3, @dev={0xfe, 0x80, [], 0x1e}, 0xdac}, @in6={0xa, 0x4e20, 0x787d, @dev={0xfe, 0x80, [], 0x2b}, 0x401}, @in6={0xa, 0x4e20, 0x2, @mcast2, 0xff}, @in={0x2, 0x4e22, @local}], 0x64) socket$can_j1939(0x1d, 0x2, 0x7) 03:00:11 executing program 3: clone(0x28b84900, 0x0, 0x0, 0x0, 0x0) personality(0x0) [ 280.153709][ T8196] ecryptfs_parse_options: eCryptfs: unrecognized option [devtmpfs] 03:00:11 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) writev(0xffffffffffffffff, &(0x7f0000000b40), 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, r1, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000300)=@keyring={'\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f00000002c0)={0x1000, &(0x7f0000001040)=""/4096}) [ 280.227724][ T8196] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 280.254541][ C0] hrtimer: interrupt took 34817 ns 03:00:11 executing program 3: socket$inet6(0xa, 0x10000000003, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @udp={0x0, 0x0, 0x14, 0x0, [@guehdr={0x1}], "5610dc1d1ac879f9"}}}}}}, 0x0) [ 280.340606][ T8196] Error parsing options; rc = [-22] 03:00:11 executing program 4: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000200)={0x0, 0x7530}, 0x10) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x1f3) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) ftruncate(r2, 0x10099b3) sendfile(r0, r2, 0x0, 0x88000fc000000) [ 280.473355][ T8196] ecryptfs_parse_options: eCryptfs: unrecognized option [devtmpfs] [ 280.506060][ T8196] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 280.525856][ T8216] bond0: (slave bond_slave_1): Releasing backup interface 03:00:11 executing program 0: mlock2(&(0x7f0000bd8000/0x2000)=nil, 0x2000, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000015) [ 280.561812][ T8223] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 280.571954][ T8196] Error parsing options; rc = [-22] [ 280.648832][ T7939] libceph: connect (1)[d::]:6789 error -101 [ 280.677513][ T7939] libceph: mon0 (1)[d::]:6789 connect error 03:00:12 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000280)='f', 0x1, 0xfffffffffffffffd) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, 0x0) request_key(0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xd}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 03:00:12 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) recvfrom(0xffffffffffffffff, &(0x7f0000000140)=""/192, 0xc0, 0x160, &(0x7f0000000200)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x80) [ 280.697311][ T8225] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 280.716617][ T8225] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 03:00:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f00000000c0)=0x2000000000000071, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007bd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) [ 280.842388][ T27] audit: type=1800 audit(1577070012.195:31): pid=8223 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=16577 res=0 03:00:12 executing program 3: setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000140), 0x8) socket$inet6(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x10000, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) 03:00:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f00000000c0)=0x2000000000000071, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0805b5055e0bcfe8474071") sendto$inet(r0, 0x0, 0x0, 0x200007bd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) 03:00:12 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r1, &(0x7f0000000600)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x4000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)="0804b5055e0bcfe8474071") r2 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) 03:00:12 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000800)=ANY=[@ANYBLOB="7261770000000000f784ead5390b5afc000000000000000000000000000002000200000003000000a802000000000000d80000000000000000000000d80000001002000010020000100200001002000010020000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000002000000000000000000000000000000000001010000000000000000000000736e6d705f7472617000000000000000000000000000000000000005004000000000000c00000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004a254bd60352d630000000000000000000000000000000000000000000000000000000000000000000d800380100000000000000000000000000000000000000004000636f6e6e6c696d697400000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) 03:00:12 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) accept$packet(r0, 0x0, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCSERGETLSR(r3, 0x5459, 0x0) ftruncate(r1, 0x8200) socket$inet6(0xa, 0x800000000000002, 0x0) 03:00:12 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000180)={0x5}) 03:00:12 executing program 5: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0xed4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r1, &(0x7f0000000780)={'#! ', './file0', [], 0xa, "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"}, 0x13b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r7 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$read(0xb, r8, &(0x7f00000000c0)=""/151, 0x97) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000140)={r8, 0x19, 0x9e}, 0x0, &(0x7f0000000180)="3fd0b499ac748b7d596e86e605d7c00b96dd28635205e3cf6a", &(0x7f00000001c0)=""/158) ftruncate(r6, 0x0) sendfile(r5, r6, 0x0, 0x800000000024) getsockopt$inet6_mreq(r6, 0x29, 0x1d, &(0x7f0000000380)={@mcast1, 0x0}, &(0x7f0000000280)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000020292, r9}) sendto$packet(r3, &(0x7f00000000c0)="8fe4adc3986992e794a39013e6a35d334ad0939c3727725a47d333908e6d8613fd41f17cfadc7da92af62f71eafccac140c4d31a07a34d20f107152fb0624588401a67edc8803b99c20d557b347f5625ec5603dda28076f0d0b6f16c691eca094e6ece1a42816f39cd26539a", 0x6c, 0x4010, &(0x7f0000000000)={0x11, 0x1a, r9, 0x1, 0x4, 0x6, @dev={[], 0x1a}}, 0x14) [ 281.374141][ T8271] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 03:00:12 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) writev(0xffffffffffffffff, &(0x7f0000000b40), 0x0) add_key(0x0, &(0x7f0000000140)={'syz', 0x0}, &(0x7f00000002c0), 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, r1, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000300)=@keyring={'\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, 0x0) [ 281.492933][ T8280] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING 03:00:12 executing program 4: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$eventfd(r0, &(0x7f00000001c0), 0xffffff7f) r1 = open(&(0x7f0000000040)='./bus\x00', 0x10d000, 0x0) read$FUSE(r1, &(0x7f0000002200), 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x16d2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)) [ 281.571685][ T8286] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING [ 281.610952][ T8287] bond0: (slave bond_slave_1): Releasing backup interface 03:00:13 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) accept$packet(r0, 0x0, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCSERGETLSR(r3, 0x5459, 0x0) ftruncate(r1, 0x8200) socket$inet6(0xa, 0x800000000000002, 0x0) 03:00:13 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) accept$packet(r0, 0x0, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCSERGETLSR(r3, 0x5459, 0x0) ftruncate(r1, 0x8200) socket$inet6(0xa, 0x800000000000002, 0x0) 03:00:13 executing program 1: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) accept$packet(r0, 0x0, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCSERGETLSR(r3, 0x5459, 0x0) ftruncate(r1, 0x8200) socket$inet6(0xa, 0x800000000000002, 0x0) [ 281.819309][ T8290] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:00:13 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r1, &(0x7f0000000600)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x4000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)="0804b5055e0bcfe8474071") r2 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) [ 281.915560][ T8290] bond0: (slave bond_slave_1): Releasing backup interface 03:00:13 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) accept$packet(r0, 0x0, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCSERGETLSR(r3, 0x5459, 0x0) ftruncate(r1, 0x8200) socket$inet6(0xa, 0x800000000000002, 0x0) 03:00:13 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) accept$packet(r0, 0x0, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCSERGETLSR(r3, 0x5459, 0x0) ftruncate(r1, 0x8200) socket$inet6(0xa, 0x800000000000002, 0x0) [ 282.084720][ T8287] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:00:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000071, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007bd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0805b5055e0bcfe8474071") setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='scalable\x00', 0x9) sendto$inet(r0, &(0x7f0000000300)='\f', 0xc3f2, 0x11, 0x0, 0xfffffffffffffeb0) 03:00:13 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) writev(0xffffffffffffffff, &(0x7f0000000b40), 0x0) add_key(0x0, &(0x7f0000000140)={'syz', 0x0}, &(0x7f00000002c0), 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, r1, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000300)=@keyring={'\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, 0x0) [ 282.357222][ T8323] bond0: (slave bond_slave_1): Releasing backup interface 03:00:13 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) accept$packet(r0, 0x0, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCSERGETLSR(r3, 0x5459, 0x0) ftruncate(r1, 0x8200) socket$inet6(0xa, 0x800000000000002, 0x0) 03:00:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000200)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 282.617238][ T27] audit: type=1804 audit(1577070013.965:32): pid=8296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir864399484/syzkaller.YxeR9l/19/bus" dev="sda1" ino=16584 res=1 03:00:14 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='X', 0x1, 0x0, &(0x7f0000000200)={0xa, 0x3, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f0000000100)=0x8) [ 282.668451][ T8324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 282.725101][ T27] audit: type=1804 audit(1577070013.965:33): pid=8298 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir864399484/syzkaller.YxeR9l/19/bus" dev="sda1" ino=16584 res=1 [ 282.827925][ T27] audit: type=1804 audit(1577070013.965:34): pid=8328 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir864399484/syzkaller.YxeR9l/19/bus" dev="sda1" ino=16584 res=1 03:00:14 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$eventfd(r0, &(0x7f00000001c0), 0xffffff7f) r1 = open(&(0x7f0000000040)='./bus\x00', 0x10d000, 0x0) read$FUSE(r1, &(0x7f0000002200), 0x1000) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fallocate(r3, 0x0, 0x0, 0x16d2) add_key$user(0x0, 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x5}) 03:00:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003f80)=[{{0x0, 0x0, 0x0}, 0x955}], 0x1, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x301, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0xffffffffffffffcc, 0x0, 0x0, 0x0}, 0x40) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8955, &(0x7f0000000000)=0x2) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r5, &(0x7f00000017c0), 0x315, 0x800000) 03:00:14 executing program 1: personality(0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x20) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x28104, 0x0) 03:00:14 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000040)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32, @ANYBLOB="10c8baffffff"], 0x2c, 0x0) close(0xffffffffffffffff) creat(&(0x7f0000000100)='./file0\x00', 0x0) 03:00:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, 0x0, 0x0) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0xc, &(0x7f0000000180)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6=@empty}}, 0xe8) 03:00:14 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) accept$packet(r0, 0x0, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCSERGETLSR(r3, 0x5459, 0x0) ftruncate(r1, 0x8200) 03:00:14 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) accept$packet(r0, 0x0, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, 0x0) 03:00:14 executing program 1: personality(0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x20) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x28104, 0x0) 03:00:14 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r1, 0x208200) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 03:00:14 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) accept$packet(r0, 0x0, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 03:00:14 executing program 1: r0 = socket$kcm(0x11, 0x8000000002, 0x300) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@dev}, {@in6=@mcast2, 0x0, 0x6c}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, 0x0, 0xb}}, 0xf8}}, 0x0) 03:00:14 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x2000000000000071, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007bd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000300)='\f', 0xc3f2, 0x11, 0x0, 0xfffffffffffffeb0) [ 283.910139][ T27] audit: type=1804 audit(1577070015.255:35): pid=8360 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir208002214/syzkaller.A9nOvX/18/bus" dev="sda1" ino=16582 res=1 [ 283.950991][ T27] audit: type=1804 audit(1577070015.285:36): pid=8362 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir208002214/syzkaller.A9nOvX/18/bus" dev="sda1" ino=16582 res=1 [ 284.019140][ T27] audit: type=1804 audit(1577070015.285:37): pid=8366 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir208002214/syzkaller.A9nOvX/18/bus" dev="sda1" ino=16582 res=1 03:00:15 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nvram\x00', 0x60080, 0x0) close(r0) 03:00:15 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) accept$packet(r0, 0x0, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) 03:00:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r2, &(0x7f0000008a80), 0x400000000000328, 0x0) 03:00:15 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000071, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007bd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) accept4(0xffffffffffffffff, &(0x7f0000000000)=@can, &(0x7f0000000080)=0x80, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)="0804b5055e0bcfe8474071") socket(0x0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) sendto$inet(r0, &(0x7f0000000300)='\f', 0x1, 0x0, 0x0, 0x0) 03:00:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x6800000e, &(0x7f0000000040)=[{&(0x7f0000000200)="e03f03001d008151e00f80ecdb4cb9047e48651628067e0003000000000000190e000600000000010000600153b4", 0x33fe0}], 0x1}, 0x0) getgroups(0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x0) 03:00:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@dev}, {@in6=@mcast2, 0x0, 0x6c}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, {}, {}, {}, 0x3000000}}}, 0xf8}}, 0x0) [ 284.054464][ T27] audit: type=1804 audit(1577070015.285:38): pid=8397 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir208002214/syzkaller.A9nOvX/18/bus" dev="sda1" ino=16582 res=1 [ 284.079217][ T27] audit: type=1804 audit(1577070015.285:39): pid=8398 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir208002214/syzkaller.A9nOvX/18/bus" dev="sda1" ino=16582 res=1 [ 284.185723][ T8414] netlink: 'syz-executor.1': attribute type 126 has an invalid length. 03:00:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x2000000000000071, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007bd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000300)='\f', 0xc3f2, 0x11, 0x0, 0xfffffffffffffeb0) 03:00:15 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) accept$packet(r0, 0x0, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) [ 284.320460][ T8426] netlink: 'syz-executor.1': attribute type 126 has an invalid length. 03:00:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x190) dup(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) 03:00:15 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) shmctl$IPC_INFO(0x0, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x914, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000180)={0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x0, 0x80, [], @ptr=0x5}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 03:00:15 executing program 2: personality(0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x20) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x28104, 0x0) 03:00:15 executing program 3: 03:00:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0xb00, &(0x7f0000000140)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@dev}, {@in6=@mcast2, 0x0, 0x6c}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, {}, {}, {}, 0x34000}}}, 0xf8}}, 0x0) 03:00:16 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) accept$packet(r0, 0x0, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) [ 284.703740][ T8453] md: Autodetecting RAID arrays. [ 284.731525][ T8453] md: autorun ... [ 284.735395][ T8453] md: ... autorun DONE. [ 284.743365][ T8459] md: Autodetecting RAID arrays. [ 284.748467][ T8459] md: autorun ... [ 284.755918][ T8459] md: ... autorun DONE. 03:00:16 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00', 0x0, 0x2}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:00:16 executing program 2: personality(0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x20) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x28104, 0x0) 03:00:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_xfrm(r0, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f0000000140)=@newsa={0x140, 0x10, 0x801, 0x0, 0x0, {{@in6=@mcast2, @in6=@mcast1}, {@in, 0x0, 0x6c}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\x00\x00\x00\x02\x00\x18\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\xf4\xff'}}}, @output_mark={0x8}]}, 0x140}}, 0x0) 03:00:16 executing program 1: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) openat$bsg(0xffffffffffffff9c, 0x0, 0x28104, 0x0) 03:00:16 executing program 3: personality(0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) open(0x0, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:00:16 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) accept$packet(r0, 0x0, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) 03:00:16 executing program 4: 03:00:16 executing program 2: 03:00:16 executing program 1: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) openat$bsg(0xffffffffffffff9c, 0x0, 0x28104, 0x0) 03:00:16 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) accept$packet(r0, 0x0, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) 03:00:16 executing program 3: personality(0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) open(0x0, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:00:16 executing program 4: [ 285.718917][ T8481] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 285.737143][ T8481] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 1, start bb1414ac) [ 285.747759][ T8481] FAT-fs (loop5): Filesystem has been set read-only 03:00:17 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00', 0x0, 0x2}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:00:17 executing program 1: 03:00:17 executing program 2: 03:00:17 executing program 3: 03:00:17 executing program 4: 03:00:17 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) accept$packet(r0, 0x0, 0x0) 03:00:17 executing program 2: 03:00:17 executing program 4: 03:00:17 executing program 1: 03:00:17 executing program 3: 03:00:17 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) listen(r0, 0x0) 03:00:17 executing program 1: [ 286.518057][ T8531] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 286.528170][ T8531] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 1, start bb1414ac) [ 286.541015][ T8531] FAT-fs (loop5): Filesystem has been set read-only 03:00:18 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00', 0x0, 0x2}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:00:18 executing program 2: 03:00:18 executing program 3: 03:00:18 executing program 4: 03:00:18 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) listen(r0, 0x0) 03:00:18 executing program 1: 03:00:18 executing program 2: 03:00:18 executing program 4: 03:00:18 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) listen(0xffffffffffffffff, 0x0) 03:00:18 executing program 3: 03:00:18 executing program 1: 03:00:18 executing program 2: [ 287.270746][ T8562] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 287.280140][ T8562] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 1, start bb1414ac) [ 287.290508][ T8562] FAT-fs (loop5): Filesystem has been set read-only 03:00:18 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00', 0x0, 0x2}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:00:18 executing program 4: 03:00:18 executing program 1: 03:00:18 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) listen(0xffffffffffffffff, 0x0) 03:00:18 executing program 3: 03:00:18 executing program 2: 03:00:18 executing program 3: 03:00:18 executing program 1: 03:00:18 executing program 2: 03:00:18 executing program 4: 03:00:18 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) listen(0xffffffffffffffff, 0x0) 03:00:19 executing program 3: [ 288.076321][ T8593] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 288.092786][ T8593] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 1, start bb1414ac) [ 288.106244][ T8593] FAT-fs (loop5): Filesystem has been set read-only 03:00:19 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) listen(r0, 0x0) 03:00:19 executing program 1: 03:00:19 executing program 4: 03:00:19 executing program 2: 03:00:19 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00', 0x0, 0x2}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) 03:00:19 executing program 3: 03:00:19 executing program 3: 03:00:19 executing program 4: 03:00:19 executing program 1: 03:00:19 executing program 2: 03:00:19 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) listen(r0, 0x0) 03:00:19 executing program 2: 03:00:19 executing program 4: 03:00:19 executing program 3: 03:00:20 executing program 1: 03:00:20 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) listen(r0, 0x0) [ 289.079785][ T8625] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 289.091683][ T8625] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 1, start bb1414ac) [ 289.103520][ T8625] FAT-fs (loop5): Filesystem has been set read-only 03:00:20 executing program 4: 03:00:20 executing program 2: 03:00:20 executing program 3: 03:00:20 executing program 1: 03:00:20 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00', 0x0, 0x2}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) 03:00:20 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) listen(r0, 0x0) 03:00:20 executing program 2: 03:00:20 executing program 4: 03:00:20 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) listen(r0, 0x0) 03:00:20 executing program 3: 03:00:20 executing program 1: 03:00:20 executing program 2: 03:00:21 executing program 4: 03:00:21 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) listen(r0, 0x0) 03:00:21 executing program 1: 03:00:21 executing program 3: [ 289.962180][ T8666] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 289.971737][ T8666] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 1, start bb1414ac) [ 289.983113][ T8666] FAT-fs (loop5): Filesystem has been set read-only 03:00:21 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00', 0x0, 0x2}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) 03:00:21 executing program 2: 03:00:21 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) listen(r0, 0x0) 03:00:21 executing program 3: 03:00:21 executing program 1: 03:00:21 executing program 4: 03:00:21 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) listen(r0, 0x0) 03:00:21 executing program 4: 03:00:21 executing program 1: 03:00:21 executing program 2: 03:00:21 executing program 3: 03:00:21 executing program 4: [ 290.637790][ T8706] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 290.691848][ T8706] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 1, start bb1414ac) [ 290.724617][ T8706] FAT-fs (loop5): Filesystem has been set read-only 03:00:22 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00', 0x0, 0x2}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 03:00:22 executing program 2: 03:00:22 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) listen(r0, 0x0) 03:00:22 executing program 3: 03:00:22 executing program 1: 03:00:22 executing program 4: 03:00:22 executing program 4: 03:00:22 executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) listen(0xffffffffffffffff, 0x0) 03:00:22 executing program 2: 03:00:22 executing program 1: 03:00:22 executing program 3: 03:00:22 executing program 4: 03:00:22 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00', 0x0, 0x2}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 03:00:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:22 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "29a600", 0x38, 0x3a, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @icmpv6=@param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "fbd1b1", 0x0, 0x88, 0x0, @local, @ipv4={[], [], @multicast2}, [], "07ef2f1f28834556"}}}}}}}, 0x0) 03:00:22 executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) listen(0xffffffffffffffff, 0x0) 03:00:22 executing program 2: personality(0x589a9a09b8de9eb4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x3, &(0x7f00000000c0)) 03:00:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @local={0xac, 0x14, 0xffffffffffffffff}, {[@timestamp={0x44, 0x4}]}}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "618cba", 0x0, "b602b8"}}}}}}, 0x0) [ 291.555406][ T8737] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 291.580241][ T8737] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 1, start bb1414ac) [ 291.595342][ T8737] FAT-fs (loop5): Filesystem has been set read-only 03:00:23 executing program 3: 03:00:23 executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) listen(0xffffffffffffffff, 0x0) 03:00:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:23 executing program 4: 03:00:23 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x1}, 0x1c) recvmmsg(r0, &(0x7f0000002c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x182, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x438, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) shutdown(r0, 0x0) 03:00:23 executing program 3: clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f0000000840)={0x0, &(0x7f0000000480), 0x0, 0x0, {}, &(0x7f00000006c0)=""/139, 0x8b, 0x0, 0x0}, 0x50) [ 292.314847][ T8772] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 292.335793][ T8772] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 1, start bb1414ac) [ 292.346194][ T8772] FAT-fs (loop5): Filesystem has been set read-only 03:00:23 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00', 0x0, 0x2}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 03:00:23 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000004000)=0x81, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 03:00:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB="07000000000000000a004e2200000001fe8000000000000000000000000000aa05000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010057174dee146d000000000000000000000000000000000000000000000000000000000001000000020000000a004e2100000002fe800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009227000000000000000000000000920000000000000a004e21000000ddfe800000000000000000000000000015ff0100000000971c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/406], 0x190) 03:00:23 executing program 2: unshare(0x2040400) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000001c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) writev(0xffffffffffffffff, &(0x7f0000000b40), 0x0) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f00000002c0), 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000001000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000040)=@secondary='builtin_and_secondary_trusted\x00') keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf1\x0e\x00\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000300)=@keyring={'\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) keyctl$clear(0x7, r2) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) 03:00:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x840000000002, 0x3, 0x6) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r2, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) [ 292.506896][ T8809] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 292.532969][ T8816] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:00:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) [ 292.568528][ T8809] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 03:00:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) r3 = dup(r2) sendfile(r3, r0, 0x0, 0x4000000000d9) 03:00:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x2, 0x3, 0x310, 0x0, 0x0, 0x90, 0x0, 0x90, 0x278, 0x278, 0x278, 0x278, 0x278, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x90, 0x0, {0x6020000}}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0x1c0, 0x1e8, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'vlan0\x00', {0x0, 0xff5, 0x0, 0x0, 0x0, 0x3, 0x3}}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0xfd7b) 03:00:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x168, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="fdffffff0000000008000a0014000000"], 0x28}}, 0x0) 03:00:24 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:24 executing program 2: unshare(0x2040400) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000001c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) writev(0xffffffffffffffff, &(0x7f0000000b40), 0x0) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f00000002c0), 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000001000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000040)=@secondary='builtin_and_secondary_trusted\x00') keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf1\x0e\x00\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000300)=@keyring={'\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) keyctl$clear(0x7, r2) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) [ 292.959951][ T8833] xt_NFQUEUE: number of total queues is 0 [ 292.994618][ T8817] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 293.020235][ T8817] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 1, start bb1414ac) [ 293.030655][ T8817] FAT-fs (loop5): Filesystem has been set read-only [ 293.073829][ T8838] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 293.132552][ T8841] device veth3 entered promiscuous mode [ 293.215367][ T8841] batman_adv: batadv0: Adding interface: veth3 [ 293.267010][ T8841] batman_adv: batadv0: The MTU of interface veth3 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 293.314915][ T8841] batman_adv: batadv0: Interface activated: veth3 [ 293.333788][ T8844] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 293.361763][ T8838] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:24 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00', 0x0, 0x2}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:00:24 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x9040, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) 03:00:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) r3 = dup(r2) sendfile(r3, r0, 0x0, 0x4000000000d9) 03:00:24 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:24 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nvram\x00', 0x0, 0x0) lseek(r0, 0x85ff, 0x3) 03:00:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x168, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="fdffffff0000000008000a0014000000"], 0x28}}, 0x0) [ 293.566498][ T8864] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 293.572781][ T8860] BFS-fs: bfs_fill_super(): loop4 is unclean, continuing 03:00:25 executing program 3: close(0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) 03:00:25 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000380)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 293.621572][ T8864] device veth5 entered promiscuous mode [ 293.651934][ T8864] batman_adv: batadv0: Adding interface: veth5 [ 293.721341][ T8864] batman_adv: batadv0: The MTU of interface veth5 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 03:00:25 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) [ 293.805529][ T8864] batman_adv: batadv0: Interface activated: veth5 03:00:25 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 03:00:25 executing program 4: rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f00000001c0)={0x0, 0x3e, 0x4, @tid=r0}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000500)={{0x0, r2+30000000}, {0x77359400}}, 0x0) read(r1, &(0x7f0000000080)=""/128, 0xae3f1a6) [ 294.245910][ T8868] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 294.284735][ T8868] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 1, start bb1414ac) [ 294.309434][ T8868] FAT-fs (loop5): Filesystem has been set read-only 03:00:25 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00', 0x0, 0x2}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:00:25 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:25 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nvram\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 03:00:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000280)=@ccm_128={{0x303}, "9a3d00e58949ec8d", "eec88444929090c9abea243c72571d73", "9f7743d6", "f3299dcda8ab2b36"}, 0x28) sendto$inet6(r0, &(0x7f0000000300)=']', 0x1, 0x0, 0x0, 0x0) 03:00:25 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000004c0)={0x4, 0x0, {0x0, 0x0, 0x4}, 0x4}) r0 = socket$inet(0x2, 0x2, 0x2000000088) bind(r0, &(0x7f0000e79ff0)=@in={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)=""/125}, {&(0x7f0000000180)=""/241}, {&(0x7f0000000600)=""/4096}, {&(0x7f0000000100)=""/58}, {&(0x7f00000003c0)=""/46}, {&(0x7f00000002c0)=""/236}], 0x10d, 0x0, 0xfffffe6a}, 0x0) sendto$inet(r0, &(0x7f0000000000)="9ba72b3db7ec018900ca721a20582f12e4807da20b99507a007f28916cf600000000000040000d724b75cc0600000005cfb28e44f4775eca053cfd714372c22ea62162339d", 0x45, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) 03:00:25 executing program 4: mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x4000000000000032, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x201, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"/513]}, 0x279) 03:00:25 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nvram\x00', 0x0, 0x0) close(r0) 03:00:25 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:26 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) r1 = dup(r0) sendto$inet6(r0, 0x0, 0xffffffffffffff92, 0x24000089, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) 03:00:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 03:00:26 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000071, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007bd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x108) readv(r0, &(0x7f0000000740)=[{&(0x7f0000000180)=""/224, 0xe0}], 0x1) sendto$inet(r0, &(0x7f0000000300)='\f', 0xc3f2, 0x11, 0x0, 0xfffffffffffffeb0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0805b5055e0bcfe8474071") 03:00:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) [ 294.860161][ T27] audit: type=1800 audit(1577070026.205:40): pid=8934 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16675 res=0 [ 295.170953][ T8924] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 295.186336][ T8924] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 1, start bb1414ac) [ 295.211403][ T8924] FAT-fs (loop5): Filesystem has been set read-only 03:00:26 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00', 0x0, 0x2}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:00:26 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x4001, 0x0) 03:00:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@tails_off='tails=off'}]}) 03:00:26 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x0, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r0, 0x401}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x11700, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f00000003c0)="753b7c676110ff1048ccbf4abb2ef4ee4015f5ac8032e82666ab889c1a62cc27743ab1fa6e9061cf4a39e15e74c5e23421eda4c6b5641e510d7d19f250898b68723fbda08f643682a85c236173f0b39af54af4354e25beb9d472e25da1326201e7c02b3056b2e23c9274e1026f13eb0df17e8013e4e47ab023", &(0x7f0000000740)=""/177, 0x4}, 0x20) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000002c0)=r2) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 03:00:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) 03:00:26 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)={0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@typed={0x8, 0x0, @str='\x00'}, @generic="deb622aa079e6a5f277afc53c45c56e546cf63706bd9f296092858ae4e37256a1d7bf25c7a7dc44a94ab8cef03918c6b6845eab2c5aacdeab6731d74392a216c3e5b2b1bcc23d4f18be63aa19fd82808846ccdc5081b4b292a2c0f4468fd0efc1da854f2f20263ee9080505e2649fbfd4da001177f0d7760f19b68fd5301a535ba61d7ee837bb45e0247ae61f0c9a6fb1625987fe74bf6926e4e18241f4f62ccc73e95"]}, 0xc0}}, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001500)={0xc44, 0x0, "aa5df4eff80867eb4aea845deaac7e2a168ee9b84f5538e7cc784241ac6d8167adc38cffbb1067efca5ea552cd9cd5b3c56509ee382c03fde7097e7399258139a813ff81149f6c9dec097097ab6e7b4e7733da60a45577d338c707c0cdb4647ff98dd0834a44fd714d6dc376ecdb0f344d19aa6acae4d333462138d8e2422783bd10c46af9f3b11a5fa26c90aa2a660c731360a5f1df27169b2c198fc24f4b59eca301c983a39450539efccf5d3298c7b95747acb9f726e4b538520db8ce0082bd82640cf174442691b30e9c853aeed50839dbace30119075b9e984134f00bf107282ee8c95f5a57d67bd2c618ba684963749ee6ea926d3954e39067ea5abef0c9d24e12f87ef6e5733af8f237faffab8a148cff258acac86a0d7354d9c9961bc25ff96d689d7a8f3cad1678722bc70c0bb6989214d39e83a292a44b0552b17628c4da973b4ab28341d0da7bb108182ded1d87f70188fd0317913ae81ec68eca3022f43804e819a820a001b51ccc1f117735927f5f2dd40dc3f3171ea0b2bd901a7db67889ca087ea42fc7aa397a2b4c75ad4c4dfcef9f3be3f15e205ccac5da3f24e499f086236e76c060ce523f67b25c56284136fda9a0191c2fb96a8518413137c4365e38ca74a606c5a2fbf792c89b6ec088ee0928f284ed90ea09165dc1c22b63002b00868680ba96fcd251c08e7640bd41d6e88a2874e0f2329c5fcdcf5516510c96a487a068e0b27c283b24cedbcda5def373331f047640c450cda77951eb36364998e1f6f284dbdd9b39c53df48d8f4f604ae517038cac051ee598114f6784a103cecda72c7dfbecba6aa88db3cda9ab52ce3c4b2d8875de692caec38ae10c7f00687447ed9bef25949cf0a55919da438d3dcfe52062e2ad229d34ccd404344d90c61c9f6b6846e4ba756683f5236ceea48cc8ef8723a360cfbbb4d360752f61ed698c8b4454880a8fd8183d0e1a8489ef68595b357d812d82b6bf603f2cd97286346ef60edc931c947aba655adca28e1b316b1195dfdea7e4237a4fd95fd9b97c9f238794f17e3a156f23d1d422d154e0521622b2994a594c1eabac32780a40e46a38dec770b05065352786279dc30a03bd893cd9bbee6b4a28bde1513fd996523899c4d21213c6ff3fa2afb22c981937639f3d958bc510cda62bcd65227559aebaa2bc93d653c4c0872ffb85ed4d6e347007218abde4e547795a725f01e0a22948b3af85267bacd969d739d816e1310aca30de5461efc8ee2bb7b204538643e008cc0c9337db54d9eaa93f836c9649202e4abf3210b44b376cec8f47d0bba83956100ac0629f5469e8e9a1f0e76c30eaea6ca31d7f3ca7d01ea3495f02528971081079fc37339dfaa1c73795d1ac38a05b4132e925fb33cf520ad4e310542b5923af10405d8918220f6ff0fd26add6a91bdb0778f311db04db4a62f5b9bcc2db04c08de313679c99b3d007025bba413e8e0a51faf6291bd57d7658beebd42143cd3230429e5de962dcf1585012c8c8a07b2a1db162fd1cdd5d0065db162dc31abee91ff82b8797628e35a10d22634b4139e3169d8509ef238e568412d6f9e413bb1170023d390c206b47353f05e0d4155c67b826c6eacb7980e328250e4c2bc9ebc02362303e8b02b468ab3f94a3e78ec620d0983f3df93971fbf9a6080e9a18eed5773c2dfc6fb6e0f99f5cf17b0e7675a23d923540098018ac7482fd676c995e315a3f0da4d143c1c3fc633a45e0c640ed31dcdee5563a2e6e9c3bca1f3cffbdfaac9b300ab6a935d500f84ffef8b722133734e3be58d4d6e3cf652d879a3f35a71f5b01fda0b31d18587c7a42ab2a3460f60a6441ea5358130f34dcce4075ad84192e8d12be958fe2d034607aef53afdec70f2146410ddc2ccab82acb4467c303bf0e2f9c138c002ed588ac6b0e1631e09cb94284d3b50d3a671a176348b57917aa864dd56e244b157d21d5e1fca19cf8ea2bf0a88335de4c9975199c330caf2039cb398cea0b1c2f9655bd28848e692956ae28410c312d81cdceb5ed51a23082b3a7ec03fd80696d81e6f376430b1f106034211243e8105259a13c93a5562a2427640de219725752848a632f7136ca3d86bc2fd593fcfb74c850ea7e26e9934c8069b733be40e46df208d213406a497c2dbd4f7b422295c41dd0b4f8374fc72cd399d3382741bd78d4b7d15e7184acd9c59f98a8cebf5666785acf03b3b33bae5c2e3d013b8c1b8fa9e1e0156e9cb6e06d3e29c1e111a064c6e0898bd41203c01f24983969517ccc29f06500746043ca7cb2200aa1eed663238e446f4613d7bec3b021df1d8686153dc3d458a1d6c0cb12a1b068abec9aa3d369f5f725c9d3cd3a8988da0a6026379dab3de13cae36cdd29cc85669470b810aad838042427789218135c0a39a66cf8ef031012e8b86472039b1db278bd7ed8057e0d889fe1c8f129e6d2e33af3046915e8111a902bee24bee4ed95c9956807792d78ef95df7eda0b6fabad84764a7b35cf3d10ced0a64e5c0a6b16d303bdd14fa176c2b2e40c1b95ababe32221c35210f4cc26facf105bf09dadcb840ed31fad11e3df7d0b50719d24369ec908253c9b3a0b0caf4a16d8b3b13933c69fbb7cb74001c152b97637b9e48df6a17e7a15d16df8143f6263af402e3f10d3f354c325778ff40aa0862257db0c1bdbf072fdf9ed0f0997b73cdc928f10b32769a954a1a9115ce4f5adaf9a0b36ffe3ace6ad833e3e54ad5a89bdc5bcfc9e7e78cf0efc7778249ffb1f6dc0239dce26a75e10ab71891967423144363060976b0d5cee9a6537ab6a7a231cd6d0f1f0072a1550f5539dc7a26f607ba0347f16311fcc9bbabfab41d5923f8ad857a39e478c9ecd534ba5c1c62864d9bc8f707ec06c83275694945743d70bd0bd1c3a432d69ebdc408715a774b3ea1f5da6dfea7427575d75ea2f11999d11969ccebf34f109271bc5e008f74c10d3bc348a8d766e7044aa3b331c7995d4121d6426ed1d421d7edc09d8840875ea7c421cb198b0200dc0571110e16d10b22f9d4c83a0b32cbb8090303b5e984ed84ce02bd267f801325808aafa284a3d529cffb06292d974e0544772a2fffb1852fc818236195809e9e944b61bfb7f84e95c7c07595381b64b4b6e154c8ebe38cca2ea8fd0cdbcab9cd996f4e265ea46e32e7c464432490fcc61391befff5507773b5d27dd5ba0b9a1674be054d5ea64ef4319043dd525189499975f98c37635427f59476dbe480f0fad49958b5fd9f94eca7cfd1899ba152d65722a66a77d0fb8490f6bcadeb3009c31e14a4e0fb5994db513f6208a0add78807d4586f4cf3d77c1d07b8a6478da6910a0494edf9ed6cafaef2bd02811eca8fb8a696853eb5a3c127e27df4db020fffece8d70ab46fc720611edb8a4bad1e36fd14bed47dc3c310e203aea5f34b20fcb2db2141acba39f49da04627130f0367ef332b5f6c784543b50b0f9a66979205d0b87847442b48e8aa666102ccac683ffbaa2ae302ad1e898acaa367a27850b0e60d59540896ebefefab59beca9ad2e8ad37403ec0d9183bfb0fb670759a2a92102d22d3cd45ab516c5586ecd3f5da05eea8a1ea98344fe9d08d600dc439de7a3860ec7bd536154a03f7cd52bd4ef5d1048cb2ea4c71c2a92f0bd5daff4c7621c0fd7620211f722c51fd05dcad5dd15fd3744e815a22509c965486536cb2a9a144b2cf0d8da617cf2aa282f18ac05792663fbff00a5c73ba4b76eac5ee87e7fd0421f0dbfa7b2561cdf8a52126b1a1ccc3f5593282ffae68153b8bd9318e22940d5cb7afed1695dc7aaeeea2f504de91b911dcb1b66ec875b7e5491d8dfa134e0aa365f2f9caba661af779e16e876e80c56e40b9cea3d30c097680ec04cd886db10db941b40dd0175d5305ae9a6d315ab4eac243d8f61ab9f1add2d93fdebf52735cd9c5e29603e7370239e307c4a06f093b5d22845274736a8fb71b6d72936f51506859e2e6c916a94622992828ee945c8d28d85e610043f30004a81d771c8e4153b2108fbaa3aa6d944ef96afb128ab37efc6c71989228ffcfd3c0e84874451dd8c1ad27a816822dd931d8a5f5fb42163d3e0671e1cd0c63a07d67717aba2b2cbff4bc8f9e491b891d008566415e3e20ab8b68abf500b6578aa691513075bfe168d5548b17dbffa878442c870917296866cc03a3c593b2e4325436309b95e8954dfed69e221d766775e8ca3c588acbf4a028a3a79c8ce14997eb55e37e865b689c78f42896c3342be500cc9a230485816fe13605771eb31b0cf8f8faba6ae336d62c6efd12eab85a37d4e5e84245af869ebb463e27d9b8f3479d9f7a9ac971278283a24dcd3b1fd9cc9284c7d5b28f1a7c336a07016f54e14dadc51279d9d4a1b6e1316e4a51f0ef4dbfcf42f060c9c6829273eaa7f69fb92404c49495"}, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="07010000060000000000"], 0xa) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:00:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) 03:00:26 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000400)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 295.499905][ T8960] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 03:00:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:27 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f00000000c0)={0xc, r4}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, &(0x7f00000000c0)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, 0x0, 0x0) 03:00:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000380)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 03:00:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0xffffff7f0e000000}, 0x0) [ 295.941275][ T27] audit: type=1804 audit(1577070027.285:41): pid=8990 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir864399484/syzkaller.YxeR9l/54/memory.events" dev="sda1" ino=16685 res=1 [ 296.031557][ T8972] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 296.041539][ T8972] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 1, start bb1414ac) [ 296.064453][ T27] audit: type=1800 audit(1577070027.325:42): pid=8990 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16685 res=0 [ 296.099425][ T8972] FAT-fs (loop5): Filesystem has been set read-only [ 296.121862][ T27] audit: type=1804 audit(1577070027.325:43): pid=8990 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir864399484/syzkaller.YxeR9l/54/memory.events" dev="sda1" ino=16685 res=1 [ 296.147092][ T27] audit: type=1804 audit(1577070027.405:44): pid=8997 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir864399484/syzkaller.YxeR9l/54/memory.events" dev="sda1" ino=16685 res=1 03:00:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:00:27 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x0, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r0, 0x401}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x11700, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f00000003c0)="753b7c676110ff1048ccbf4abb2ef4ee4015f5ac8032e82666ab889c1a62cc27743ab1fa6e9061cf4a39e15e74c5e23421eda4c6b5641e510d7d19f250898b68723fbda08f643682a85c236173f0b39af54af4354e25beb9d472e25da1326201e7c02b3056b2e23c9274e1026f13eb0df17e8013e4e47ab023", &(0x7f0000000740)=""/177, 0x4}, 0x20) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000002c0)=r2) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 03:00:27 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)="0804b5055e0bcfe8474071") r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@type={'type', 0x3d, "90583cf0"}}, {@force='force'}]}) 03:00:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:27 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup\x00\x8a@\xd2e\xb4W\xab\x99\xac\xb4\x9a\a\xea\x1c\xc5\xf9\xfd(2+mTS\xbc\xd0F\x88\x10\xd2\x11\xdc\x81q_\xc0Q\x1bE\x970Wv\xbeKN\tV\xb0\x01\x15\x18\x9c\x8b\xea\xe9 \x19\x0e\xfc8M\xb1 \x05\x82\xccW \x06\xe2\x06\xd5\xb3\aTbK\xd9\xa1DY\xbeZ5\x85\x04!\x90_\xfb\xa5\xfaX\xe8R\xe1\r\x1b\xa1\xb6\xd2)\x8bM\xe2\xb6\xac^\xe5\x84\xa9\x8fE{o\xb8\b\xb6\xd7P\xa3\x1a\x01\x8b{\x10J o\xeb\xb2|\x1d\xdb\xf2n@\x83\xeae\xbf\x9b\xcb\xbdj\x02\x8e\xa09\xbfo;\xce\x85\xea%\xe8\x84\xd8\xc6\xdfI\xe6\xa8\xf1\x00\x19kN\xce', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x16d2) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r2, 0x4000004000}) 03:00:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0xffffff7f0e000000}, 0x0) [ 296.611918][ T9021] hfsplus: unable to find HFS+ superblock 03:00:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000514ff0), 0x10) madvise(&(0x7f00003ec000/0x400000)=nil, 0x400000, 0x1000000000008) [ 296.721499][ T27] audit: type=1804 audit(1577070028.075:45): pid=8997 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir864399484/syzkaller.YxeR9l/54/memory.events" dev="sda1" ino=16685 res=1 03:00:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) creat(&(0x7f0000000400)='./bus\x00', 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/53, 0xfe77) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f00000004c0)={0xc2f, {{0xa, 0x4e22, 0x7, @mcast2, 0x10001}}}, 0x88) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000640)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) prctl$PR_SET_FPEXC(0xc, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x6, @ANYRES32], 0x5}}, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000632000)='./file0\x00', 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 296.826397][ T27] audit: type=1804 audit(1577070028.105:46): pid=8999 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir864399484/syzkaller.YxeR9l/54/memory.events" dev="sda1" ino=16685 res=1 03:00:28 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f00000000c0)={0xc, r4}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, &(0x7f00000000c0)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, 0x0, 0x0) 03:00:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0xffffff7f0e000000}, 0x0) [ 296.954680][ T27] audit: type=1804 audit(1577070028.105:47): pid=8997 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir864399484/syzkaller.YxeR9l/54/memory.events" dev="sda1" ino=16685 res=1 03:00:28 executing program 3: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa000000000300000000000000e000000000000000"], 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_mreqn(r0, 0x0, 0x100000000000025, &(0x7f0000000380)={@multicast2, @local}, 0xc) [ 297.130386][ T27] audit: type=1804 audit(1577070028.475:48): pid=9043 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir864399484/syzkaller.YxeR9l/55/memory.events" dev="sda1" ino=16678 res=1 03:00:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0xffffff7f0e000000}, 0x0) [ 297.187997][ T9040] autofs4:pid:9040:autofs_fill_super: called with bogus options [ 297.205364][ T27] audit: type=1800 audit(1577070028.505:49): pid=9043 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16678 res=0 03:00:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:00:28 executing program 2: socket$kcm(0x2, 0x3, 0x84) 03:00:28 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x0, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r0, 0x401}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x11700, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f00000003c0)="753b7c676110ff1048ccbf4abb2ef4ee4015f5ac8032e82666ab889c1a62cc27743ab1fa6e9061cf4a39e15e74c5e23421eda4c6b5641e510d7d19f250898b68723fbda08f643682a85c236173f0b39af54af4354e25beb9d472e25da1326201e7c02b3056b2e23c9274e1026f13eb0df17e8013e4e47ab023", &(0x7f0000000740)=""/177, 0x4}, 0x20) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000002c0)=r2) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) 03:00:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_proto_private(r0, 0x89e1, &(0x7f0000000200)="8333df947203") 03:00:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x1000000000000a}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') sendfile(r0, r1, 0x0, 0xedc0) 03:00:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x0, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nvram\x00', 0x60080, 0x0) close(r3) 03:00:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x0, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 03:00:29 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000071, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007bd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) readv(r0, &(0x7f0000000740)=[{&(0x7f0000000180)=""/224, 0xe0}], 0x1) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0805b5055e0bcfe8474071") getsockopt$sock_buf(r1, 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000300)='\f', 0xc3f2, 0x11, 0x0, 0xfffffffffffffeb0) 03:00:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}, 0xf0ff7f}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00), 0xe6}}], 0x3fffffffffffe0d, 0x0) 03:00:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000e79ff0)=@in={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) 03:00:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:00:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x0, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:29 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100280) close(r0) 03:00:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x17, &(0x7f0000000040)=[@mss, @sack_perm, @mss, @timestamp], 0x4) 03:00:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @rand_addr="0bcbe0ea70221dbb37f271264ecb9b95"}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x4c066c43}, 0x14) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r2, 0x29, 0x40, &(0x7f0000001fde), 0x4) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 03:00:29 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000380)="800000003804000019000300e60100006c000000000000000104000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 03:00:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x0, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:30 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x9040, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) [ 298.657925][ T9122] EXT4-fs (loop4): Invalid log block size: 1025 03:00:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x0, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:30 executing program 0: 03:00:30 executing program 4: 03:00:30 executing program 3: [ 298.980490][ T9136] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 03:00:30 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:00:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x0, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffffffffffffe3, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="500000001000010600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000000800250000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0100010000f800e603f98ff1a22d5123b819cfe6671a99b8bd692c8431c7ef3808acc38a1253ab533ae2bd937ce25f94e2a7a9e49174776364d3987bb7d58d892fd6cdf72bceee7d55e73e2d41d3e8d69aac36a30f6bcbf413524fcd55fefd81d5e3e2dd8b532d07cb77f06d32570fd45da1dd72ec6ce7453a1f83a5fcc8503265968e7adf2951d52bc0ace24505db8cd193b692e1c55b472394b78b25def11f6806081a437ecc4f95623140640e6d0fd52efde0a5a49b462ad8fa0f6e6a5448d90c3748f14b6b806d2393af9e28384ad837b359804f17"], 0x50}}, 0x0) 03:00:30 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f00000000c0)='X', 0x1, 0x0, &(0x7f0000000200)={0xa, 0x3, 0x0, @loopback}, 0x1c) 03:00:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:30 executing program 2: 03:00:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) [ 299.421494][ T9161] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 299.443516][ T9161] syz-executor.3 (9161) used greatest stack depth: 9664 bytes left 03:00:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x0, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:30 executing program 2: 03:00:30 executing program 4: 03:00:30 executing program 0: 03:00:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x0, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:31 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:00:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:31 executing program 0: 03:00:31 executing program 4: 03:00:31 executing program 2: 03:00:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x0, 0x1000000, 0x1000000}, [@typed={0x8, 0x17, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:31 executing program 0: 03:00:31 executing program 4: 03:00:31 executing program 2: 03:00:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:32 executing program 4: 03:00:32 executing program 2: 03:00:32 executing program 0: 03:00:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:32 executing program 4: 03:00:32 executing program 2: 03:00:32 executing program 0: 03:00:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:32 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:00:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:32 executing program 4: 03:00:32 executing program 2: 03:00:32 executing program 0: 03:00:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x0, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:32 executing program 4: 03:00:33 executing program 2: 03:00:33 executing program 0: 03:00:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:33 executing program 4: 03:00:33 executing program 2: 03:00:33 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00'}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:00:33 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/psched\x00') 03:00:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x7, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x100, 0x0, 0x8, 0x0, 0x100000, 0x9, 0xfc9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000200)={0x2, 0x4, 0x1}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffed3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000400), 0x10}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x100000000) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x2, 0x36995c8315586529, 0x1}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000380)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1) umount2(&(0x7f0000000540)='./file0\x00', 0x0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001a80)={&(0x7f00000000c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x7fe1ee5465ac0f0c}, 0x4) syz_genetlink_get_family_id$tipc2(0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0xdaf5766652ee0ed1) r3 = socket$inet6(0xa, 0x2, 0x0) close(r3) socket$inet6(0xa, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) 03:00:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) 03:00:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x0, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:33 executing program 4: 03:00:33 executing program 0: 03:00:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:34 executing program 0: 03:00:34 executing program 4: 03:00:34 executing program 0: 03:00:34 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00'}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:00:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:34 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000, 0x1000000}, [@typed={0x8, 0x0, @uid}]}, 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) 03:00:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x7, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x100, 0x0, 0x8, 0x0, 0x100000, 0x9, 0xfc9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000200)={0x2, 0x4, 0x1}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffed3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000400), 0x10}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x100000000) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x2, 0x36995c8315586529, 0x1}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000380)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1) umount2(&(0x7f0000000540)='./file0\x00', 0x0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001a80)={&(0x7f00000000c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x7fe1ee5465ac0f0c}, 0x4) syz_genetlink_get_family_id$tipc2(0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0xdaf5766652ee0ed1) r3 = socket$inet6(0xa, 0x2, 0x0) close(r3) socket$inet6(0xa, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) 03:00:34 executing program 4: 03:00:34 executing program 0: 03:00:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:34 executing program 1: 03:00:34 executing program 0: 03:00:34 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, 0xffffffffffffffff}) r2 = dup(r1) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, 0xffffffffffffffff}) r6 = dup(r5) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r6}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000280)={0x0, 0x0, r2}) 03:00:35 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(0xffffffffffffffff, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:35 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0xfffffffffffffeee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}, 0x7}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() write$FUSE_LSEEK(r2, &(0x7f00000001c0)={0xfffffdb3, 0x0, 0x1, {0xfffffffffffffffe}}, 0x18) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x50101, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x30, 0x2, 0x1, 0x1, 0x3, 0x0, 0xaa6}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x174) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r4 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_mreqsrc(r4, 0x0, 0x53, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) syz_open_dev$binderN(0x0, 0x0, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) connect$llc(r5, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x9}, 0x10) sendmmsg(r5, &(0x7f0000001380), 0x40003ad, 0x2000000) dup2(r5, r2) creat(&(0x7f0000000340)='./file0\x00', 0x0) 03:00:35 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00'}, {@remote}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:00:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000080)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='V', 0x1, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000080)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='V', 0x1, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) 03:00:35 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, 0x0, 0x0) 03:00:35 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") sendmsg(r0, &(0x7f00000000c0)={0x0, 0xfffffe6a, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000190007041dfffd946f610500020000e8fe02000000010800080007000a00ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 03:00:35 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(0xffffffffffffffff, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) [ 304.030028][ T9377] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 03:00:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000000040)={0x7, 'veth1_to_hsr\x00', {0x2}, 0x6}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x0, 0x0, 0x0, {{{@in6=@loopback, @in=@dev}, {@in6=@mcast2, 0x0, 0x6c}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0xf8}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) [ 304.140491][ T9386] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:00:35 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(0xffffffffffffffff, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000d3e000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000111ff8)='./file0\x00', &(0x7f0000ad7000)='bpf\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00002bcfd4)={0x9, 0x7, 0x5, 0x2}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000e32ff4)={&(0x7f0000dfaff2)='./file0/file0\x00', r2}, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f0000b08ff0)={&(0x7f00004caff2)='./file0/file0\x00'}, 0x10) 03:00:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 03:00:35 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getitimer(0x0, &(0x7f0000000000)) 03:00:35 executing program 2: r0 = socket$inet(0x2, 0x3, 0x7f) r1 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) write$eventfd(r1, &(0x7f0000000080)=0x20000100000094, 0x8) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) 03:00:35 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:36 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00', 0x0, 0x2}, {@remote}}, 0x44) syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0x16}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:00:36 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000001c0)={0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x7fffffff}}) 03:00:36 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x8000000000004, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x10) recvfrom$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 03:00:36 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:36 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fstat(r0, &(0x7f0000000080)) 03:00:36 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 305.024738][ C0] IPv4: Oversized IP packet from 127.0.0.1 03:00:36 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x2, 0x17a) sendto$inet(r0, 0x0, 0xfffffffffffffeb2, 0x200007fd, &(0x7f0000000180)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696e65300a8d222a1d2bd087c3e77d6bf2362f25dd9a30e398efe2801a380699c7590142129d5bf13d091a4b03000000eb7c20898d53ea4e55da452017b8f39563865c462cfc88d223371ce4fac2c496caac413954a20e2107f39e808a0fdacd5f93d508e3a97e5ceebafd8d37ae714da1b60b182bc30d6c975bfc4e1c5be30000"], 0x1a6) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0xfffffffffffffff0, 0x84b511ad2c6622d0, 0x0, 0x0) 03:00:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="56d163"], 0x3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) inotify_init() [ 305.083248][ C1] IPv4: Oversized IP packet from 127.0.0.1 03:00:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000100)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_aout(r0, &(0x7f0000000940)=ANY=[], 0xffffffef) shutdown(r0, 0x1) 03:00:36 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:00:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) sendto(0xffffffffffffff9c, 0x0, 0x0, 0x5, &(0x7f00000000c0)=@x25={0x9, @remote={[], 0x1}}, 0x80) 03:00:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000100)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_aout(r0, &(0x7f0000000940)=ANY=[], 0xffffffef) shutdown(r0, 0x1) 03:00:37 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, '\x00o\x00', 0x0, 0x2}, {@remote}}, 0x44) syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000804010002000270fff8", 0x16}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:00:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x3f}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:00:37 executing program 0: r0 = socket(0x10, 0x800000000000803, 0x0) sendto(r0, &(0x7f0000000140)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) [ 305.876396][ T9475] ================================================================== [ 305.884817][ T9475] BUG: KCSAN: data-race in ipip_tunnel_xmit / ipip_tunnel_xmit [ 305.892371][ T9475] [ 305.894805][ T9475] write to 0xffff8880a7048130 of 8 bytes by task 9477 on cpu 0: [ 305.902728][ T9475] ipip_tunnel_xmit+0x28f/0x310 [ 305.907957][ T9475] dev_hard_start_xmit+0xef/0x430 [ 305.913133][ T9475] __dev_queue_xmit+0x14e9/0x1ba0 [ 305.918688][ T9475] dev_queue_xmit+0x21/0x30 [ 305.923308][ T9475] neigh_direct_output+0x1f/0x30 [ 305.928469][ T9475] ip6_finish_output2+0x717/0xf60 [ 305.933995][ T9475] __ip6_finish_output+0x2d7/0x330 [ 305.939924][ T9475] ip6_finish_output+0x41/0x160 [ 305.945179][ T9475] ip6_output+0x108/0x290 [ 305.949534][ T9475] ip6_local_out+0x74/0x90 [ 305.954254][ T9475] ip6_send_skb+0x53/0x110 [ 305.959524][ T9475] udp_v6_send_skb.isra.0+0x3ec/0xa70 [ 305.965133][ T9475] udpv6_sendmsg+0x19dc/0x1d30 [ 305.969920][ T9475] inet6_sendmsg+0x6d/0x90 [ 305.974369][ T9475] sock_sendmsg+0x9f/0xc0 [ 305.979138][ T9475] ____sys_sendmsg+0x212/0x4d0 [ 305.984031][ T9475] ___sys_sendmsg+0xb5/0x100 [ 305.988829][ T9475] __sys_sendmmsg+0x123/0x350 [ 305.993655][ T9475] __x64_sys_sendmmsg+0x64/0x80 [ 305.998698][ T9475] do_syscall_64+0xcc/0x3a0 [ 306.003245][ T9475] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 306.009143][ T9475] [ 306.011515][ T9475] read to 0xffff8880a7048130 of 8 bytes by task 9475 on cpu 1: [ 306.019110][ T9475] ipip_tunnel_xmit+0x27c/0x310 [ 306.023995][ T9475] dev_hard_start_xmit+0xef/0x430 [ 306.029053][ T9475] __dev_queue_xmit+0x14e9/0x1ba0 [ 306.034102][ T9475] dev_queue_xmit+0x21/0x30 [ 306.038718][ T9475] neigh_direct_output+0x1f/0x30 [ 306.043810][ T9475] ip6_finish_output2+0x717/0xf60 [ 306.048860][ T9475] __ip6_finish_output+0x2d7/0x330 [ 306.054074][ T9475] ip6_finish_output+0x41/0x160 [ 306.058973][ T9475] ip6_output+0x108/0x290 [ 306.063365][ T9475] ip6_local_out+0x74/0x90 [ 306.067879][ T9475] ip6_send_skb+0x53/0x110 [ 306.072329][ T9475] udp_v6_send_skb.isra.0+0x3ec/0xa70 [ 306.077708][ T9475] udpv6_sendmsg+0x19dc/0x1d30 [ 306.082536][ T9475] inet6_sendmsg+0x6d/0x90 [ 306.087006][ T9475] sock_sendmsg+0x9f/0xc0 [ 306.091342][ T9475] ____sys_sendmsg+0x212/0x4d0 [ 306.096196][ T9475] ___sys_sendmsg+0xb5/0x100 [ 306.100994][ T9475] __sys_sendmmsg+0x123/0x350 [ 306.105688][ T9475] __x64_sys_sendmmsg+0x64/0x80 [ 306.110557][ T9475] do_syscall_64+0xcc/0x3a0 [ 306.115166][ T9475] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 306.122347][ T9475] [ 306.124761][ T9475] Reported by Kernel Concurrency Sanitizer on: [ 306.131803][ T9475] CPU: 1 PID: 9475 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 306.142333][ T9475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.154287][ T9475] ================================================================== [ 306.163299][ T9475] Kernel panic - not syncing: panic_on_warn set ... [ 306.170092][ T9475] CPU: 1 PID: 9475 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 306.179099][ T9475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.189463][ T9475] Call Trace: [ 306.192932][ T9475] dump_stack+0x11d/0x181 [ 306.197522][ T9475] panic+0x210/0x640 [ 306.201438][ T9475] ? vprintk_func+0x8d/0x140 [ 306.206058][ T9475] kcsan_report.cold+0xc/0xd [ 306.210679][ T9475] kcsan_setup_watchpoint+0x3fe/0x460 [ 306.216247][ T9475] __tsan_read8+0xc6/0x100 [ 306.220675][ T9475] ipip_tunnel_xmit+0x27c/0x310 [ 306.225857][ T9475] dev_hard_start_xmit+0xef/0x430 [ 306.230902][ T9475] __dev_queue_xmit+0x14e9/0x1ba0 [ 306.235959][ T9475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.242290][ T9475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.248604][ T9475] ? netif_rx_ni+0xb7/0x290 [ 306.253168][ T9475] dev_queue_xmit+0x21/0x30 [ 306.257816][ T9475] neigh_direct_output+0x1f/0x30 [ 306.262859][ T9475] ip6_finish_output2+0x717/0xf60 [ 306.267951][ T9475] ? __rcu_read_unlock+0x66/0x3d0 [ 306.272990][ T9475] ? netif_rx_ni+0x290/0x290 [ 306.277592][ T9475] __ip6_finish_output+0x2d7/0x330 [ 306.282772][ T9475] ip6_finish_output+0x41/0x160 [ 306.287634][ T9475] ip6_output+0x108/0x290 [ 306.292062][ T9475] ? __ip6_finish_output+0x330/0x330 [ 306.298130][ T9475] ip6_local_out+0x74/0x90 [ 306.302926][ T9475] ip6_send_skb+0x53/0x110 [ 306.307377][ T9475] udp_v6_send_skb.isra.0+0x3ec/0xa70 [ 306.313033][ T9475] udpv6_sendmsg+0x19dc/0x1d30 [ 306.318154][ T9475] ? ip_reply_glue_bits+0xb0/0xb0 [ 306.323307][ T9475] ? __schedule+0x30e/0x690 [ 306.328202][ T9475] inet6_sendmsg+0x6d/0x90 [ 306.332714][ T9475] ? inet6_sendmsg+0x6d/0x90 [ 306.337490][ T9475] ? inet6_ioctl+0x140/0x140 [ 306.342099][ T9475] sock_sendmsg+0x9f/0xc0 [ 306.346442][ T9475] ____sys_sendmsg+0x212/0x4d0 [ 306.351411][ T9475] ___sys_sendmsg+0xb5/0x100 [ 306.356184][ T9475] ? __fget+0xb8/0x1d0 [ 306.360268][ T9475] ? __fget_light+0xaf/0x190 [ 306.364867][ T9475] ? __fdget+0x2c/0x40 [ 306.368947][ T9475] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 306.375210][ T9475] __sys_sendmmsg+0x123/0x350 [ 306.379899][ T9475] ? __read_once_size+0x5a/0xe0 [ 306.384759][ T9475] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 306.390487][ T9475] ? _copy_to_user+0x84/0xb0 [ 306.395090][ T9475] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 306.401340][ T9475] ? put_timespec64+0x94/0xc0 [ 306.406026][ T9475] __x64_sys_sendmmsg+0x64/0x80 [ 306.410891][ T9475] do_syscall_64+0xcc/0x3a0 [ 306.415425][ T9475] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 306.421322][ T9475] RIP: 0033:0x45a919 [ 306.425228][ T9475] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.444838][ T9475] RSP: 002b:00007ff1ff80fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 306.453259][ T9475] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a919 [ 306.461237][ T9475] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000003 [ 306.469387][ T9475] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 306.477431][ T9475] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff1ff8106d4 [ 306.485481][ T9475] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 00000000ffffffff [ 306.495876][ T9475] Kernel Offset: disabled [ 306.500381][ T9475] Rebooting in 86400 seconds..