[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 56.103783][ T26] audit: type=1800 audit(1572481995.290:25): pid=8586 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 56.135250][ T26] audit: type=1800 audit(1572481995.290:26): pid=8586 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 56.176682][ T26] audit: type=1800 audit(1572481995.290:27): pid=8586 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.38' (ECDSA) to the list of known hosts. 2019/10/31 00:33:25 fuzzer started 2019/10/31 00:33:27 dialing manager at 10.128.0.26:32889 2019/10/31 00:33:27 syscalls: 2541 2019/10/31 00:33:27 code coverage: enabled 2019/10/31 00:33:27 comparison tracing: enabled 2019/10/31 00:33:27 extra coverage: extra coverage is not supported by the kernel 2019/10/31 00:33:27 setuid sandbox: enabled 2019/10/31 00:33:27 namespace sandbox: enabled 2019/10/31 00:33:27 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/31 00:33:27 fault injection: enabled 2019/10/31 00:33:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/31 00:33:27 net packet injection: enabled 2019/10/31 00:33:27 net device setup: enabled 2019/10/31 00:33:27 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 00:35:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) write(r1, &(0x7f0000000040)="06", 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) wait4(0x0, 0x0, 0x0, 0x0) 00:35:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088471fffffff00004000632177fb4e141414e9", 0x0, 0x100}, 0x28) syzkaller login: [ 183.685441][ T8751] IPVS: ftp: loaded support on port[0] = 21 [ 183.768216][ T8753] IPVS: ftp: loaded support on port[0] = 21 00:35:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') read$FUSE(r0, 0x0, 0x0) [ 183.887644][ T8751] chnl_net:caif_netlink_parms(): no params data found [ 184.023705][ T8753] chnl_net:caif_netlink_parms(): no params data found [ 184.047597][ T8751] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.054713][ T8751] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.075963][ T8751] device bridge_slave_0 entered promiscuous mode [ 184.099681][ T8751] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.114958][ T8751] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.123201][ T8751] device bridge_slave_1 entered promiscuous mode [ 184.168489][ T8751] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.170307][ T8757] IPVS: ftp: loaded support on port[0] = 21 [ 184.178422][ T8753] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.191409][ T8753] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.199478][ T8753] device bridge_slave_0 entered promiscuous mode [ 184.212296][ T8751] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.224709][ T8753] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.232573][ T8753] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.240751][ T8753] device bridge_slave_1 entered promiscuous mode 00:35:23 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9f61) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000080)='./file1\x00', 0x0) clone(0x100000000100010b, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuseblk(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) poll(0x0, 0x0, 0xffffffffffbffff8) [ 184.281626][ T8751] team0: Port device team_slave_0 added [ 184.315285][ T8753] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.333438][ T8751] team0: Port device team_slave_1 added [ 184.347067][ T8753] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.388991][ T8753] team0: Port device team_slave_0 added [ 184.448173][ T8751] device hsr_slave_0 entered promiscuous mode [ 184.485247][ T8751] device hsr_slave_1 entered promiscuous mode 00:35:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xf0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x401c5820, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}) openat$cgroup_ro(r0, &(0x7f0000000000)='\x00'/12, 0xf0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0xf0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x401c5820, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x401c5820, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0x0, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x3ff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2, 0xfff}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) r3 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x8, &(0x7f0000000200), 0x2e8) [ 184.526565][ T8753] team0: Port device team_slave_1 added [ 184.559359][ T8759] IPVS: ftp: loaded support on port[0] = 21 [ 184.708012][ T8753] device hsr_slave_0 entered promiscuous mode 00:35:23 executing program 5: open(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/147}, 0x9b, 0xd6d0c418f59fe7d0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) [ 184.765238][ T8753] device hsr_slave_1 entered promiscuous mode [ 184.815014][ T8753] debugfs: Directory 'hsr0' with parent '/' already present! [ 184.862973][ T8762] IPVS: ftp: loaded support on port[0] = 21 [ 184.889292][ T8764] IPVS: ftp: loaded support on port[0] = 21 [ 184.914939][ T8757] chnl_net:caif_netlink_parms(): no params data found [ 185.024118][ T8757] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.032509][ T8757] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.041007][ T8757] device bridge_slave_0 entered promiscuous mode [ 185.048777][ T8757] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.055984][ T8757] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.063794][ T8757] device bridge_slave_1 entered promiscuous mode [ 185.090322][ T8757] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.116395][ T8757] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.143886][ T8757] team0: Port device team_slave_0 added [ 185.152212][ T8757] team0: Port device team_slave_1 added [ 185.227797][ T8757] device hsr_slave_0 entered promiscuous mode [ 185.285135][ T8757] device hsr_slave_1 entered promiscuous mode [ 185.335042][ T8757] debugfs: Directory 'hsr0' with parent '/' already present! [ 185.439357][ T8764] chnl_net:caif_netlink_parms(): no params data found [ 185.451433][ T8759] chnl_net:caif_netlink_parms(): no params data found [ 185.568861][ T8764] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.577068][ T8764] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.585384][ T8764] device bridge_slave_0 entered promiscuous mode [ 185.620819][ T8764] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.631143][ T8764] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.639567][ T8764] device bridge_slave_1 entered promiscuous mode [ 185.657777][ T8757] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.665031][ T8757] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.672815][ T8757] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.680279][ T8757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.692161][ T8759] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.699793][ T8759] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.708143][ T8759] device bridge_slave_0 entered promiscuous mode [ 185.716528][ T8759] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.723806][ T8759] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.731720][ T8759] device bridge_slave_1 entered promiscuous mode [ 185.758269][ T8764] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.769288][ T8764] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.794148][ T8751] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.807433][ T8762] chnl_net:caif_netlink_parms(): no params data found [ 185.830602][ T8759] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.855078][ T8759] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.871725][ T8751] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.894144][ T8764] team0: Port device team_slave_0 added [ 185.910836][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.920441][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.933228][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.941843][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.950043][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.958827][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.967439][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.974564][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.991301][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.003176][ T8753] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.014462][ T8764] team0: Port device team_slave_1 added [ 186.040632][ T8762] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.049520][ T8762] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.058429][ T8762] device bridge_slave_0 entered promiscuous mode [ 186.067323][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.076366][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.084666][ T8769] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.091779][ T8769] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.104571][ T8759] team0: Port device team_slave_0 added [ 186.117818][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.125133][ T8762] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.132903][ T8762] device bridge_slave_1 entered promiscuous mode [ 186.151411][ T8759] team0: Port device team_slave_1 added [ 186.164490][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.186321][ T8753] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.268507][ T8764] device hsr_slave_0 entered promiscuous mode [ 186.325305][ T8764] device hsr_slave_1 entered promiscuous mode [ 186.355016][ T8764] debugfs: Directory 'hsr0' with parent '/' already present! [ 186.363822][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.371964][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.379962][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.400062][ T8762] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 186.422737][ T8757] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.432793][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.442222][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.450777][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.459761][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.468449][ T3023] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.475582][ T3023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.483195][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.492642][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.501140][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.511333][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.520077][ T3023] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.527156][ T3023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.535188][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.543031][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.553057][ T8762] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 186.657603][ T8759] device hsr_slave_0 entered promiscuous mode [ 186.695149][ T8759] device hsr_slave_1 entered promiscuous mode [ 186.745001][ T8759] debugfs: Directory 'hsr0' with parent '/' already present! [ 186.753505][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.761892][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.770766][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.779205][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.787965][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.795845][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.810231][ T8762] team0: Port device team_slave_0 added [ 186.818543][ T8751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.829899][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.848198][ T8762] team0: Port device team_slave_1 added [ 186.856475][ T8757] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.892986][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.902411][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.911667][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.918854][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.988741][ T8762] device hsr_slave_0 entered promiscuous mode [ 187.045411][ T8762] device hsr_slave_1 entered promiscuous mode [ 187.084918][ T8762] debugfs: Directory 'hsr0' with parent '/' already present! [ 187.113508][ T8751] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.122990][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.138342][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.148165][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.158417][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.167816][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.178131][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.185244][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.192874][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.202357][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.210878][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.219981][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.249550][ T8764] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.271175][ T8753] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 187.288370][ T8753] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 187.322592][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.331752][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.340281][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.350057][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.358914][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.369414][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.396522][ T8753] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.411114][ T8764] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.432800][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.452853][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.462330][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.471026][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.480802][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.489266][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.502765][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.510669][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.545726][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.554135][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.581552][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 00:35:26 executing program 0: [ 187.600024][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.613773][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.622615][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.630298][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.638312][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.648284][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.656901][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.663979][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.673068][ T8757] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.700228][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.740510][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 00:35:26 executing program 0: 00:35:27 executing program 0: [ 187.752885][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.791903][ T8757] 8021q: adding VLAN 0 to HW filter on device batadv0 00:35:27 executing program 0: [ 187.862112][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.895396][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.902352][ T8796] BPF:hdr_len not found [ 187.908799][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.935723][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.947980][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.957117][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.981400][ T8759] 8021q: adding VLAN 0 to HW filter on device bond0 00:35:27 executing program 1: 00:35:27 executing program 0: [ 188.012896][ T8764] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 188.027646][ T8764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.045413][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.053296][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 00:35:27 executing program 1: 00:35:27 executing program 0: socket(0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) clone(0x1fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000440)="3058020af10cb8b56c9606987fe808d672bd136840d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a939b4fd2672693a46c08df6616dd21be3453ecf73039a20f43acbc5376139a9070ae27dd847474d1e59b2697863e6ebd80f75cadcb79366256287fca97d6eb1", 0x6e, 0xfffffffffffffffd) [ 188.125835][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.161552][ T8759] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.212016][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.220870][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.273169][ C1] hrtimer: interrupt took 46064 ns [ 188.281659][ T8764] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.282417][ T8809] PKCS8: Unsupported PKCS#8 version [ 188.298679][ T8810] PKCS8: Unsupported PKCS#8 version [ 188.333844][ T8762] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.344738][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.383759][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.423619][ T5] bridge0: port 1(bridge_slave_0) entered blocking state 00:35:27 executing program 2: [ 188.430963][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.449608][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.458408][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.476072][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.484619][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.491761][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.506678][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.544998][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.552816][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.570553][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.587219][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.598589][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.607182][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.616685][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.626757][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.637253][ T8762] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.655317][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.663853][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.673332][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.682888][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.691641][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.698800][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.706509][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.715761][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.724066][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.731218][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.739259][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.753621][ T8759] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 188.766931][ T8759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.780495][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.789574][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.820767][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.830419][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.858899][ T8759] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.875949][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.888511][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.900280][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.910077][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.926900][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.936074][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.944470][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.953715][ T8769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.964579][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.975208][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.001690][ T8762] 8021q: adding VLAN 0 to HW filter on device batadv0 00:35:28 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9f61) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000080)='./file1\x00', 0x0) clone(0x100000000100010b, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuseblk(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) poll(0x0, 0x0, 0xffffffffffbffff8) 00:35:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/protocols\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 00:35:28 executing program 2: 00:35:28 executing program 5: 00:35:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) 00:35:28 executing program 0: 00:35:28 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @empty}, 0x10) connect$inet(r0, &(0x7f00009322c4)={0x2, 0x0, @initdev}, 0x10) 00:35:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000240)=@filename='./file0\x00', &(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xa02008, 0x0) read$FUSE(r0, &(0x7f0000000540), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x1}, 0x10) read$FUSE(r0, &(0x7f0000003000), 0x1150) write$FUSE_ENTRY(r0, &(0x7f0000000480)={0x90, 0x0, 0x2, {0x400000000004, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1bd4}}}, 0x90) 00:35:28 executing program 5: r0 = socket(0x18, 0x0, 0x0) getpeername$inet6(r0, 0x0, &(0x7f0000000200)) 00:35:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) 00:35:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/protocols\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 00:35:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x27e}, 0x48) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@deltaction={0x14, 0x31, 0x11}, 0x14}}, 0x0) 00:35:29 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9f61) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000080)='./file1\x00', 0x0) clone(0x100000000100010b, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuseblk(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) poll(0x0, 0x0, 0xffffffffffbffff8) 00:35:29 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x40080, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, 0x0) sysinfo(0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000140)) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000140)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r1) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f00000006c0)={0x43, 0x9, 0x2, {0x3, 0x0, 0x100, 0x0, 0x0, 0x9, 0x7, 0x8001}}, 0x43) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, 0x0, &(0x7f0000000440), 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000bc0)={0x92, 0x1, 0x3}, 0xc) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cachefiles\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000580)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, 0x0, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 00:35:29 executing program 0: ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="00667f0236f9aee60eb96fae31fb23475215dfeed169140c73d6f4486fbee6b035881dfec5525cfa"], 0x28) pipe(0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:35:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) 00:35:29 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000600)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @exp_fastopen={0xfe, 0xa}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0xc, 0xf989, "908fabfe9a69b583"}]}}}}}}}}, 0x0) [ 190.393054][ T8914] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 00:35:29 executing program 4: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@uid={'uid'}}]}) [ 190.515522][ T8916] syz-executor.4 (8916) used greatest stack depth: 22904 bytes left 00:35:29 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) 00:35:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) [ 190.643634][ T8927] hfs: can't find a HFS filesystem on dev loop4 [ 190.708414][ T8927] hfs: can't find a HFS filesystem on dev loop4 00:35:29 executing program 2: unshare(0x2040400) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) connect(r1, 0x0, 0x0) 00:35:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x40080, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, 0x0) sysinfo(0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000140)) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000140)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r1) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f00000006c0)={0x43, 0x9, 0x2, {0x3, 0x0, 0x100, 0x0, 0x0, 0x9, 0x7, 0x8001}}, 0x43) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, 0x0, &(0x7f0000000440), 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000bc0)={0x92, 0x1, 0x3}, 0xc) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cachefiles\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000580)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, 0x0, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 00:35:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x40080, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, 0x0) sysinfo(0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000140)) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000140)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r1) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f00000006c0)={0x43, 0x9, 0x2, {0x3, 0x0, 0x100, 0x0, 0x0, 0x9, 0x7, 0x8001}}, 0x43) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, 0x0, &(0x7f0000000440), 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000bc0)={0x92, 0x1, 0x3}, 0xc) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cachefiles\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000580)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, 0x0, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 00:35:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x40080, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, 0x0) sysinfo(0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000140)) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000140)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r1) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f00000006c0)={0x43, 0x9, 0x2, {0x3, 0x0, 0x100, 0x0, 0x0, 0x9, 0x7, 0x8001}}, 0x43) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, 0x0, &(0x7f0000000440), 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000bc0)={0x92, 0x1, 0x3}, 0xc) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cachefiles\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000580)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, 0x0, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 00:35:30 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9f61) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000080)='./file1\x00', 0x0) clone(0x100000000100010b, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuseblk(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) poll(0x0, 0x0, 0xffffffffffbffff8) 00:35:30 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) mlock2(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) 00:35:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) 00:35:30 executing program 4: syz_emit_ethernet(0x26, &(0x7f0000000000)={@local, @dev, [{}], {@ipv6={0x86dd, {0x0, 0x4, "db652b", 0x14, 0x0, 0x0, @rand_addr="014267eafe146283b528fecc41586959", @empty, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:35:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x8200) socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000009c0)=ANY=[@ANYBLOB="38000000100005070000", @ANYRES32, @ANYBLOB='\x00', @ANYRES32], 0x4}}, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000280)={0x0, 0x0}) sysinfo(&(0x7f0000000000)=""/50) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x20, 0x0, 0xfffffeff000) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000840)=0x401) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 00:35:30 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x200000ba) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)) 00:35:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) 00:35:30 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$netlink(0x10, 0x3, 0x10) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x400, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x62) wait4(0x0, 0x0, 0x0, 0x0) 00:35:30 executing program 4: syz_emit_ethernet(0x26, &(0x7f0000000000)={@local, @dev, [{}], {@ipv6={0x86dd, {0x0, 0x4, "db652b", 0x14, 0x0, 0x0, @rand_addr="014267eafe146283b528fecc41586959", @empty, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:35:30 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r0) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0800b5055e0bcfe87b0071") r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r2, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r2, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r2, 0x80}, {r2}], 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f000000ab80)={0x0, 0xfffffffffffffd57, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@remote, @in=@empty, 0x0, 0x6, 0x0, 0x0, 0xa, 0x190, 0x80, 0x0, 0x0, r3}, {0x1c993630, 0x1000, 0x7, 0x0, 0x3, 0x7ff, 0x0, 0x4}, {0x6}, 0x6, 0x6e6bba, 0x0, 0x0, 0x0, 0x2}, {{@in6=@remote, 0x4d4}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0xa7f8935fca5fa15b, 0x3cef14a422163db1, 0x0, 0x7, 0x0, 0xd2}}, 0xe8) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f00000000c0), 0x4) r5 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='htcp\x00', 0x5) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000040)=0xe8) r7 = getgid() setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000003c0)={0x0, r6, r7}, 0xc) r8 = socket$inet_tcp(0x2, 0x1, 0x0) writev(r8, 0x0, 0xfffffffffffffde2) connect$l2tp(r8, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r8, 0x1, 0x3, 0x0, 0x4, {0xa, 0x0, 0x0, @local, 0x7}}}, 0x32) setsockopt$inet_tcp_int(r8, 0x6, 0x18, &(0x7f0000000100), 0x4) bind$inet(r8, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r8, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @sack_perm], 0x5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r8, 0x6, 0x1d, 0x0, 0x0) shutdown(r8, 0x1) getsockopt$sock_cred(r8, 0x1, 0x11, 0x0, &(0x7f0000000100)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) openat$cgroup_ro(r9, &(0x7f00000001c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) connect$rds(r9, &(0x7f0000000280)={0x2, 0x4e22, @multicast1}, 0x10) getpid() r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x19, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b965ac087ecd8645ab029395eb39974ae562cbe55909b8f1f99b9b939000c4bb63a84e2ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2b733273edb89b06945b3ba545513b0f358d4553053807f609db7928b73b6"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r14}, 0xc) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r15, &(0x7f0000000000)=ANY=[], 0xfffffcbe) ioctl$EXT4_IOC_SWAP_BOOT(r15, 0x6611) 00:35:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) 00:35:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000180)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0/file1\x00', 0x0, 0x4241000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file1\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000540), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x1}, 0x10) read$FUSE(r0, &(0x7f0000003000), 0x1150) write$FUSE_ENTRY(r0, &(0x7f0000000480)={0x90, 0x0, 0x2, {0x400000000004, 0x0, 0x0, 0x0, 0x20, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1bd4}}}, 0x90) 00:35:31 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9f61) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000080)='./file1\x00', 0x0) clone(0x100000000100010b, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuseblk(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) poll(0x0, 0x0, 0xffffffffffbffff8) 00:35:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x8200) socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000009c0)=ANY=[@ANYBLOB="38000000100005070000", @ANYRES32, @ANYBLOB='\x00', @ANYRES32], 0x4}}, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000280)={0x0, 0x0}) sysinfo(&(0x7f0000000000)=""/50) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x20, 0x0, 0xfffffeff000) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000840)=0x401) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 00:35:31 executing program 4: syz_emit_ethernet(0x26, &(0x7f0000000000)={@local, @dev, [{}], {@ipv6={0x86dd, {0x0, 0x4, "db652b", 0x14, 0x0, 0x0, @rand_addr="014267eafe146283b528fecc41586959", @empty, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:35:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) 00:35:31 executing program 4: syz_emit_ethernet(0x26, &(0x7f0000000000)={@local, @dev, [{}], {@ipv6={0x86dd, {0x0, 0x4, "db652b", 0x14, 0x0, 0x0, @rand_addr="014267eafe146283b528fecc41586959", @empty, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:35:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) 00:35:31 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) [ 192.685727][ T9031] syz-executor.5 (9031) used greatest stack depth: 21832 bytes left 00:35:31 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r0) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0800b5055e0bcfe87b0071") r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r2, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r2, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r2, 0x80}, {r2}], 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f000000ab80)={0x0, 0xfffffffffffffd57, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@remote, @in=@empty, 0x0, 0x6, 0x0, 0x0, 0xa, 0x190, 0x80, 0x0, 0x0, r3}, {0x1c993630, 0x1000, 0x7, 0x0, 0x3, 0x7ff, 0x0, 0x4}, {0x6}, 0x6, 0x6e6bba, 0x0, 0x0, 0x0, 0x2}, {{@in6=@remote, 0x4d4}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0xa7f8935fca5fa15b, 0x3cef14a422163db1, 0x0, 0x7, 0x0, 0xd2}}, 0xe8) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f00000000c0), 0x4) r5 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='htcp\x00', 0x5) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000040)=0xe8) r7 = getgid() setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000003c0)={0x0, r6, r7}, 0xc) r8 = socket$inet_tcp(0x2, 0x1, 0x0) writev(r8, 0x0, 0xfffffffffffffde2) connect$l2tp(r8, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r8, 0x1, 0x3, 0x0, 0x4, {0xa, 0x0, 0x0, @local, 0x7}}}, 0x32) setsockopt$inet_tcp_int(r8, 0x6, 0x18, &(0x7f0000000100), 0x4) bind$inet(r8, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r8, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @sack_perm], 0x5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r8, 0x6, 0x1d, 0x0, 0x0) shutdown(r8, 0x1) getsockopt$sock_cred(r8, 0x1, 0x11, 0x0, &(0x7f0000000100)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) openat$cgroup_ro(r9, &(0x7f00000001c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) connect$rds(r9, &(0x7f0000000280)={0x2, 0x4e22, @multicast1}, 0x10) getpid() r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x19, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b965ac087ecd8645ab029395eb39974ae562cbe55909b8f1f99b9b939000c4bb63a84e2ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2b733273edb89b06945b3ba545513b0f358d4553053807f609db7928b73b6"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r14}, 0xc) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r15, &(0x7f0000000000)=ANY=[], 0xfffffcbe) ioctl$EXT4_IOC_SWAP_BOOT(r15, 0x6611) 00:35:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf000}, 0x334, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r2, @ANYBLOB="000003000a000200000000f57d000000"], 0x42e}}, 0x0) 00:35:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) 00:35:32 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000340)=ANY=[@ANYBLOB='.'], &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) 00:35:32 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 00:35:32 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9f61) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000080)='./file1\x00', 0x0) clone(0x100000000100010b, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuseblk(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) poll(0x0, 0x0, 0xffffffffffbffff8) 00:35:32 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 00:35:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x2fa) 00:35:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf000}, 0x334, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r2, @ANYBLOB="000003000a000200000000f57d000000"], 0x42e}}, 0x0) 00:35:32 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) 00:35:32 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x4, "db652b", 0x14, 0x0, 0x0, @rand_addr="014267eafe146283b528fecc41586959", @empty, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:35:32 executing program 5: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x108000400000003a) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:35:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000180)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0/file1\x00', 0x0, 0x4241000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file1\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000540), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x1}, 0x10) read$FUSE(r0, &(0x7f0000003000), 0x1150) write$FUSE_ENTRY(r0, &(0x7f0000000480)={0x90, 0x0, 0x2, {0x400000000004, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1bd4}}}, 0x90) 00:35:33 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) shutdown(r0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x100000000000012) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e23, @loopback=0xac1414e0}]}, &(0x7f0000000080)=0x10) 00:35:33 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) 00:35:33 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x4, "db652b", 0x14, 0x0, 0x0, @rand_addr="014267eafe146283b528fecc41586959", @empty, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:35:33 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x4, "db652b", 0x14, 0x0, 0x0, @rand_addr="014267eafe146283b528fecc41586959", @empty, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 194.006294][ T9143] kasan: CONFIG_KASAN_INLINE enabled [ 194.011948][ T9143] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 194.020123][ T9143] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 194.025066][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 194.027067][ T9143] CPU: 1 PID: 9143 Comm: syz-executor.4 Not tainted 5.4.0-rc5-next-20191030 #0 [ 194.027082][ T9143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.033039][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 194.041999][ T9143] RIP: 0010:ip6_sublist_rcv+0x5c9/0x930 [ 194.042015][ T9143] Code: 0f 85 73 01 00 00 e8 66 44 23 fb 48 8b 85 00 ff ff ff 48 8d b8 10 0f 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 44 03 00 00 48 8b 85 00 ff ff ff 4c 8b a0 10 0f [ 194.042023][ T9143] RSP: 0018:ffff888057cbf3c0 EFLAGS: 00010206 [ 194.042034][ T9143] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000e7b5000 [ 194.042042][ T9143] RDX: 00000000000001e2 RSI: ffffffff86501fea RDI: 0000000000000f10 [ 194.042050][ T9143] RBP: ffff888057cbf4f0 R08: ffff888057cb2240 R09: ffffed1015d26b7d [ 194.042063][ T9143] R10: ffffed1015d26b7c R11: ffff8880ae935be3 R12: 0000000000000001 [ 194.121163][ T9143] R13: ffff888057cbf4c8 R14: ffff888057cbf558 R15: ffff888057cbf680 [ 194.129405][ T9143] FS: 00007f2712b1e700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 194.138472][ T9143] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 194.145055][ T9143] CR2: 0000000000960004 CR3: 00000000a947f000 CR4: 00000000001406e0 [ 194.151580][ T9145] kobject: '0:46' (00000000030156ac): kobject_add_internal: parent: 'bdi', set: 'devices' [ 194.153461][ T9143] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 194.153476][ T9143] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 194.179451][ T9143] Call Trace: [ 194.182757][ T9143] ? ip6_rcv_finish+0x310/0x310 [ 194.187616][ T9143] ? kfree_skbmem+0xca/0x150 [ 194.192215][ T9143] ? kfree_skb+0x10e/0x3c0 [ 194.196641][ T9143] ? ip6_rcv_core.isra.0+0x1047/0x1c30 [ 194.202401][ T9143] ipv6_list_rcv+0x373/0x4b0 00:35:33 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9f61) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000080)='./file1\x00', 0x0) clone(0x100000000100010b, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuseblk(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) poll(0x0, 0x0, 0xffffffffffbffff8) 00:35:33 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) [ 194.207189][ T9143] ? ipv6_rcv+0x420/0x420 [ 194.211533][ T9143] ? ipv6_rcv+0x420/0x420 [ 194.215877][ T9143] __netif_receive_skb_list_core+0x5fc/0x9d0 [ 194.221893][ T9143] ? ktime_get_with_offset+0x135/0x360 [ 194.222716][ T9145] kobject: '0:46' (00000000030156ac): kobject_uevent_env [ 194.227358][ T9143] ? ktime_get_with_offset+0x135/0x360 [ 194.227374][ T9143] ? process_backlog+0x750/0x750 [ 194.227386][ T9143] ? lock_acquire+0x190/0x410 [ 194.227400][ T9143] ? __kasan_check_read+0x11/0x20 [ 194.227413][ T9143] netif_receive_skb_list_internal+0x7eb/0xe50 [ 194.227428][ T9143] ? __netif_receive_skb_list_core+0x9d0/0x9d0 [ 194.227442][ T9143] ? ipv6_gro_receive+0x96f/0x14f0 [ 194.227465][ T9143] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 194.259367][ T9145] kobject: '0:46' (00000000030156ac): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 194.260936][ T9143] ? eth_type_trans+0x3a5/0x760 [ 194.260952][ T9143] gro_normal_list.part.0+0x1e/0xb0 [ 194.260972][ T9143] gro_normal_one+0x184/0x1d0 [ 194.286297][ T3921] kobject: 'loop3' (000000008111d856): kobject_uevent_env [ 194.288658][ T9143] napi_gro_frags+0x915/0xd00 [ 194.293637][ T3921] kobject: 'loop3' (000000008111d856): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 194.299337][ T9143] tun_get_user+0x2eba/0x4010 [ 194.299350][ T9143] ? __kasan_check_read+0x11/0x20 [ 194.299367][ T9143] ? tun_build_skb.isra.0+0x1380/0x1380 [ 194.299385][ T9143] ? rcu_read_lock_held+0x9c/0xb0 [ 194.299398][ T9143] ? __kasan_check_read+0x11/0x20 [ 194.299412][ T9143] tun_chr_write_iter+0xbd/0x156 [ 194.299424][ T9143] do_iter_readv_writev+0x5f8/0x8f0 [ 194.299442][ T9143] ? no_seek_end_llseek_size+0x70/0x70 [ 194.367279][ T9143] ? apparmor_file_permission+0x25/0x30 [ 194.372843][ T9143] ? rw_verify_area+0x126/0x360 [ 194.378321][ T9143] do_iter_write+0x184/0x610 [ 194.383017][ T9143] ? dup_iter+0x260/0x260 [ 194.387368][ T9143] vfs_writev+0x1b3/0x2f0 [ 194.391713][ T9143] ? vfs_iter_write+0xb0/0xb0 [ 194.396404][ T9143] ? __kasan_check_read+0x11/0x20 [ 194.401449][ T9143] ? ksys_dup3+0x3e0/0x3e0 [ 194.405893][ T9143] ? _raw_spin_unlock_irq+0x59/0x80 [ 194.411892][ T9143] ? finish_task_switch+0x147/0x750 [ 194.417116][ T9143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.423373][ T9143] ? __fget_light+0x1a9/0x230 [ 194.428081][ T9143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.434341][ T9143] do_writev+0x15b/0x330 [ 194.438685][ T9143] ? vfs_writev+0x2f0/0x2f0 [ 194.443231][ T9143] ? do_syscall_64+0x26/0x760 [ 194.447930][ T9143] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.454026][ T9143] ? do_syscall_64+0x26/0x760 00:35:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000180)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0/file1\x00', 0x0, 0x4241000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file1\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000540), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x1}, 0x10) read$FUSE(r0, &(0x7f0000003000), 0x1150) write$FUSE_ENTRY(r0, &(0x7f0000000480)={0x90, 0x0, 0x2, {0x400000000004, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1bd4}}}, 0x90) [ 194.458721][ T9143] __x64_sys_writev+0x75/0xb0 [ 194.463424][ T9143] do_syscall_64+0xfa/0x760 [ 194.467967][ T9143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.473871][ T9143] RIP: 0033:0x459e01 [ 194.477865][ T9143] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 194.497478][ T9143] RSP: 002b:00007f2712b1dba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 194.505901][ T9143] RAX: ffffffffffffffda RBX: 000000000000004a RCX: 0000000000459e01 [ 194.513886][ T9143] RDX: 0000000000000001 RSI: 00007f2712b1dc00 RDI: 00000000000000f0 [ 194.521865][ T9143] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 194.529858][ T9143] R10: 00007f2712b1e9d0 R11: 0000000000000293 R12: 00007f2712b1e6d4 [ 194.537861][ T9143] R13: 00000000004c936a R14: 00000000004e0c48 R15: 00000000ffffffff [ 194.545849][ T9143] Modules linked in: [ 194.549869][ T9143] ---[ end trace 26b9bccb2af0254a ]--- [ 194.555375][ T9143] RIP: 0010:ip6_sublist_rcv+0x5c9/0x930 [ 194.561020][ T9143] Code: 0f 85 73 01 00 00 e8 66 44 23 fb 48 8b 85 00 ff ff ff 48 8d b8 10 0f 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 44 03 00 00 48 8b 85 00 ff ff ff 4c 8b a0 10 0f [ 194.580669][ T9143] RSP: 0018:ffff888057cbf3c0 EFLAGS: 00010206 [ 194.586774][ T9143] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000e7b5000 [ 194.594788][ T9143] RDX: 00000000000001e2 RSI: ffffffff86501fea RDI: 0000000000000f10 [ 194.602771][ T9143] RBP: ffff888057cbf4f0 R08: ffff888057cb2240 R09: ffffed1015d26b7d [ 194.610809][ T9143] R10: ffffed1015d26b7c R11: ffff8880ae935be3 R12: 0000000000000001 [ 194.618854][ T9143] R13: ffff888057cbf4c8 R14: ffff888057cbf558 R15: ffff888057cbf680 [ 194.627559][ T9143] FS: 00007f2712b1e700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 194.633115][ T9130] sctp: failed to load transform for md5: -4 [ 194.636522][ T9143] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 194.636531][ T9143] CR2: 0000000000960004 CR3: 00000000a947f000 CR4: 00000000001406e0 [ 194.636541][ T9143] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 194.636548][ T9143] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 194.636557][ T9143] Kernel panic - not syncing: Fatal exception in interrupt [ 194.644061][ T9143] Kernel Offset: disabled [ 194.686298][ T9143] Rebooting in 86400 seconds..