Warning: Permanently added '10.128.0.74' (ECDSA) to the list of known hosts. 2019/10/30 20:44:55 fuzzer started 2019/10/30 20:44:57 dialing manager at 10.128.0.105:37477 2019/10/30 20:44:57 syscalls: 2540 2019/10/30 20:44:57 code coverage: enabled 2019/10/30 20:44:57 comparison tracing: enabled 2019/10/30 20:44:57 extra coverage: extra coverage is not supported by the kernel 2019/10/30 20:44:57 setuid sandbox: enabled 2019/10/30 20:44:57 namespace sandbox: enabled 2019/10/30 20:44:57 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/30 20:44:57 fault injection: enabled 2019/10/30 20:44:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/30 20:44:57 net packet injection: enabled 2019/10/30 20:44:57 net device setup: enabled 2019/10/30 20:44:57 concurrency sanitizer: enabled 2019/10/30 20:44:58 adding functions to KCSAN blacklist: 'tcp_add_backlog' '__tcp_select_window' '__hrtimer_run_queues' 'mod_timer' 'tomoyo_supervisor' 20:45:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x1, 0x0, r1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080), 0x4000}, 0x20) 20:45:00 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000040)={0x1, 0x0, 0x0, &(0x7f0000000180)=""/109, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000080)=""/97, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000480)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x5) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000004c0)) syzkaller login: [ 47.652801][ T7286] IPVS: ftp: loaded support on port[0] = 21 [ 47.761271][ T7286] chnl_net:caif_netlink_parms(): no params data found [ 47.799964][ T7286] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.820975][ T7286] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.841009][ T7286] device bridge_slave_0 entered promiscuous mode [ 47.848640][ T7286] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.870976][ T7286] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.878918][ T7286] device bridge_slave_1 entered promiscuous mode [ 47.902362][ T7286] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 47.906794][ T7289] IPVS: ftp: loaded support on port[0] = 21 [ 47.913895][ T7286] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 47.942895][ T7286] team0: Port device team_slave_0 added [ 47.949944][ T7286] team0: Port device team_slave_1 added 20:45:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) sendto$inet6(r0, &(0x7f0000ab4f8e)="97", 0x1, 0x0, &(0x7f0000aaa000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) sendmmsg$inet6(r1, &(0x7f0000006740)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="a7", 0x1}], 0x1}}, {{&(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c, &(0x7f00000023c0)=[{&(0x7f0000000380)="1f", 0x1}], 0x1}}], 0x2, 0x0) [ 48.084056][ T7286] device hsr_slave_0 entered promiscuous mode [ 48.172055][ T7286] device hsr_slave_1 entered promiscuous mode [ 48.262233][ T7291] IPVS: ftp: loaded support on port[0] = 21 [ 48.338569][ T7286] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.345759][ T7286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.353111][ T7286] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.360172][ T7286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.526753][ T7289] chnl_net:caif_netlink_parms(): no params data found 20:45:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) [ 48.721046][ T7289] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.728252][ T7289] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.761907][ T7289] device bridge_slave_0 entered promiscuous mode [ 48.799847][ T3007] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.832884][ T3007] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.865697][ T7289] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.881379][ T7289] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.911875][ T7289] device bridge_slave_1 entered promiscuous mode [ 49.035990][ T7289] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 49.063980][ T7286] 8021q: adding VLAN 0 to HW filter on device bond0 [ 49.110243][ T7289] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 49.163702][ T7286] 8021q: adding VLAN 0 to HW filter on device team0 [ 49.165595][ T7321] IPVS: ftp: loaded support on port[0] = 21 [ 49.212310][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.220211][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.268010][ T7291] chnl_net:caif_netlink_parms(): no params data found [ 49.302861][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.323370][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.351989][ T2838] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.359169][ T2838] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.428296][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.443806][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.471610][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.478681][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.537040][ T7289] team0: Port device team_slave_0 added [ 49.563594][ T7289] team0: Port device team_slave_1 added 20:45:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000300001e0e535fa79788c26b632969069f3a8a8ef5045565af4080000000000004eca030000000000001400010010000100000008000300000000"], 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924924924924f0, 0x0) [ 49.615503][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 49.643948][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 49.669706][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 49.703327][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.752836][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 49.792728][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 49.851884][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 49.964020][ T7289] device hsr_slave_0 entered promiscuous mode [ 49.991331][ T7289] device hsr_slave_1 entered promiscuous mode [ 50.030956][ T7289] debugfs: Directory 'hsr0' with parent '/' already present! [ 50.038619][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 50.052469][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.130964][ T7291] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.138149][ T7291] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.171907][ T7291] device bridge_slave_0 entered promiscuous mode [ 50.228098][ T7286] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 50.251926][ T7323] IPVS: ftp: loaded support on port[0] = 21 [ 50.292793][ T7286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 50.326349][ T7291] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.343690][ T7291] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.352930][ T7291] device bridge_slave_1 entered promiscuous mode [ 50.412911][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 50.426957][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.607461][ T7286] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 50.655018][ T7291] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.766012][ T7291] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.867695][ T7321] chnl_net:caif_netlink_parms(): no params data found [ 50.931792][ T7291] team0: Port device team_slave_0 added [ 50.944037][ T7289] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.016068][ T7291] team0: Port device team_slave_1 added [ 51.051719][ T7289] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.106349][ T7312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.125148][ T7312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:45:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) [ 51.228702][ T7321] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.265756][ T7321] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.334063][ T7321] device bridge_slave_0 entered promiscuous mode [ 51.424232][ T7291] device hsr_slave_0 entered promiscuous mode [ 51.447923][ T7291] device hsr_slave_1 entered promiscuous mode [ 51.494841][ T7291] debugfs: Directory 'hsr0' with parent '/' already present! [ 51.531381][ T7312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 20:45:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x1, 0x0, r1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080), 0x4000}, 0x20) [ 51.553378][ T7312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.611421][ T7312] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.618513][ T7312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.681847][ T7312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.694248][ T7312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.731441][ T7312] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.739588][ T7312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.778777][ T7312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 51.815627][ T7321] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.826384][ T7321] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.845757][ T7321] device bridge_slave_1 entered promiscuous mode [ 51.884143][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.900250][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 20:45:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x1, 0x0, r1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080), 0x4000}, 0x20) [ 51.947522][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.034722][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.069180][ T7369] IPVS: ftp: loaded support on port[0] = 21 [ 52.088941][ T7289] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 52.171409][ T7289] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 52.228547][ T7323] chnl_net:caif_netlink_parms(): no params data found [ 52.252733][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.270085][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 20:45:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x1, 0x0, r1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080), 0x4000}, 0x20) [ 52.305498][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.372381][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.420559][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.482085][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.490664][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.629349][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 52.643737][ T7321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.712854][ T7289] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.813185][ T7321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.897916][ T7323] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.015231][ T7323] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.051874][ T7323] device bridge_slave_0 entered promiscuous mode [ 53.131255][ T7323] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.138446][ T7323] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.171162][ T7323] device bridge_slave_1 entered promiscuous mode [ 53.264444][ T7321] team0: Port device team_slave_0 added [ 53.296013][ T7291] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.380446][ T7321] team0: Port device team_slave_1 added [ 53.413032][ T7291] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.429044][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.450256][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.475761][ T7323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.507694][ T7323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.621972][ T7323] team0: Port device team_slave_0 added [ 53.637384][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.661966][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.691347][ T2838] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.698472][ T2838] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.726964][ T7369] chnl_net:caif_netlink_parms(): no params data found [ 53.759175][ T7323] team0: Port device team_slave_1 added [ 53.792154][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.810467][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.831217][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.839876][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.847196][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.907063][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.994489][ T7321] device hsr_slave_0 entered promiscuous mode [ 54.041313][ T7321] device hsr_slave_1 entered promiscuous mode [ 54.060939][ T7321] debugfs: Directory 'hsr0' with parent '/' already present! [ 54.086152][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.102407][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.121633][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.141748][ T2838] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.158514][ T7291] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 54.189263][ T7291] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 20:45:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x1, 0x0, r1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080), 0x4000}, 0x20) [ 54.251970][ T7363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.272293][ T7363] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.291862][ T7363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 54.341978][ T7363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.363492][ T7363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 54.373045][ T7363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.474658][ T7323] device hsr_slave_0 entered promiscuous mode [ 54.561419][ T7323] device hsr_slave_1 entered promiscuous mode [ 54.601003][ T7323] debugfs: Directory 'hsr0' with parent '/' already present! [ 54.674742][ T7291] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.774885][ T7369] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.820930][ T7369] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.829106][ T7369] device bridge_slave_0 entered promiscuous mode [ 54.879576][ T7363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.931325][ T7369] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.938500][ T7369] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.972390][ T7369] device bridge_slave_1 entered promiscuous mode 20:45:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x1, 0x0, r1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080), 0x4000}, 0x20) 20:45:08 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000040)={0x1, 0x0, 0x0, &(0x7f0000000180)=""/109, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000080)=""/97, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000480)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x5) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000004c0)) [ 55.241645][ T7369] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.357907][ T7369] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 20:45:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x1, 0x0, r1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080), 0x4000}, 0x20) [ 55.691155][ T7321] 8021q: adding VLAN 0 to HW filter on device bond0 20:45:08 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000040)={0x1, 0x0, 0x0, &(0x7f0000000180)=""/109, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000080)=""/97, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000480)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x5) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000004c0)) [ 55.734038][ T7369] team0: Port device team_slave_0 added [ 55.791363][ T7369] team0: Port device team_slave_1 added [ 55.809377][ T7323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.931560][ T7312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.962960][ T7312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.973860][ T7321] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.048039][ T7323] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.160463][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.180647][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.261954][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.321694][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.376174][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.383333][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.434579][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 56.496927][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.546221][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.553333][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.601788][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.677273][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.736809][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 56.818500][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 56.983969][ T7369] device hsr_slave_0 entered promiscuous mode [ 57.015643][ T7369] device hsr_slave_1 entered promiscuous mode [ 57.130932][ T7369] debugfs: Directory 'hsr0' with parent '/' already present! [ 57.164923][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.181619][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 57.222291][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.271429][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.335853][ T3007] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.342968][ T3007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.406790][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 57.456672][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.495880][ T3007] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.503061][ T3007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.531764][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 57.582205][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.632171][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.686292][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.722213][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 57.766723][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 57.796713][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 20:45:10 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000040)={0x1, 0x0, 0x0, &(0x7f0000000180)=""/109, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000080)=""/97, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000480)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x5) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000004c0)) [ 57.841853][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 57.884818][ T7321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 57.946053][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.992845][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.015380][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.065497][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.115664][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.184722][ T7321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 58.240020][ T7323] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 58.304105][ T7323] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 58.440310][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 58.449596][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 58.517816][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 58.592278][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 58.600820][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 58.751531][ T7323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 58.805688][ T7312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.279974][ T7369] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.364514][ T7530] sp0: Synchronizing with TNC [ 59.396681][ T7363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.415169][ T7363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.496694][ T7369] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.581198][ T7363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.610636][ T7363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.689898][ T7363] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.697111][ T7363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.800391][ T7363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.856325][ T7363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.921689][ T7363] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.928797][ T7363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.023021][ T7363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.096196][ T7541] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 60.137256][ T7365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.157428][ T7365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.241167][ T7531] sp0: Synchronizing with TNC [ 60.242162][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.302421][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.360627][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.422949][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.475595][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 60.515790][ T7558] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 60.584631][ T7365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 60.607658][ T7365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.666444][ T7365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.722186][ T7365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.782308][ T7369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.872509][ T7369] 8021q: adding VLAN 0 to HW filter on device batadv0 20:45:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000300001e0e535fa79788c26b632969069f3a8a8ef5045565af4080000000000004eca030000000000001400010010000100000008000300000000"], 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924924924924f0, 0x0) 20:45:14 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000040)={0x1, 0x0, 0x0, &(0x7f0000000180)=""/109, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000080)=""/97, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000480)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x5) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000004c0)) [ 61.748074][ T7583] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 61.771476][ C0] hrtimer: interrupt took 41022 ns 20:45:15 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000040)={0x1, 0x0, 0x0, &(0x7f0000000180)=""/109, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000080)=""/97, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000480)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x5) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000004c0)) 20:45:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000300001e0e535fa79788c26b632969069f3a8a8ef5045565af4080000000000004eca030000000000001400010010000100000008000300000000"], 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924924924924f0, 0x0) 20:45:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:15 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) sendto$inet6(r0, &(0x7f0000ab4f8e)="97", 0x1, 0x0, &(0x7f0000aaa000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) sendmmsg$inet6(r1, &(0x7f0000006740)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="a7", 0x1}], 0x1}}, {{&(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c, &(0x7f00000023c0)=[{&(0x7f0000000380)="1f", 0x1}], 0x1}}], 0x2, 0x0) 20:45:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) [ 62.485906][ T7598] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 62.567839][ T7601] sp0: Synchronizing with TNC 20:45:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:16 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000040)={0x1, 0x0, 0x0, &(0x7f0000000180)=""/109, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000080)=""/97, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000480)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x5) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000004c0)) 20:45:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) 20:45:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) sendto$inet6(r0, &(0x7f0000ab4f8e)="97", 0x1, 0x0, &(0x7f0000aaa000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) sendmmsg$inet6(r1, &(0x7f0000006740)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="a7", 0x1}], 0x1}}, {{&(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c, &(0x7f00000023c0)=[{&(0x7f0000000380)="1f", 0x1}], 0x1}}], 0x2, 0x0) [ 63.492706][ T7627] sp0: Synchronizing with TNC 20:45:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000300001e0e535fa79788c26b632969069f3a8a8ef5045565af4080000000000004eca030000000000001400010010000100000008000300000000"], 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924924924924f0, 0x0) 20:45:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) [ 64.056169][ T7656] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 20:45:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) [ 64.559586][ T7665] sp0: Synchronizing with TNC [ 64.708202][ T7667] sp0: Synchronizing with TNC 20:45:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) 20:45:18 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) 20:45:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) sendto$inet6(r0, &(0x7f0000ab4f8e)="97", 0x1, 0x0, &(0x7f0000aaa000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) sendmmsg$inet6(r1, &(0x7f0000006740)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="a7", 0x1}], 0x1}}, {{&(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c, &(0x7f00000023c0)=[{&(0x7f0000000380)="1f", 0x1}], 0x1}}], 0x2, 0x0) 20:45:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) 20:45:18 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) [ 65.752922][ T7712] sp0: Synchronizing with TNC [ 65.810422][ T7715] sp1: Synchronizing with TNC [ 65.822669][ T7713] sp2: Synchronizing with TNC [ 66.052648][ T7720] sp0: Synchronizing with TNC 20:45:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) 20:45:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) 20:45:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) 20:45:19 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) 20:45:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) 20:45:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) [ 67.241103][ T7765] sp0: Synchronizing with TNC 20:45:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) 20:45:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) [ 67.753722][ T7782] sp0: Synchronizing with TNC 20:45:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) 20:45:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) 20:45:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) [ 68.338997][ T7800] sp0: Synchronizing with TNC 20:45:21 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) [ 68.779434][ T7810] sp0: Synchronizing with TNC [ 69.168506][ T7824] sp0: Synchronizing with TNC 20:45:22 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:22 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) 20:45:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20842) fcntl$setstatus(r1, 0x4, 0x102800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000000)="d5", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) dup3(r1, r0, 0x0) 20:45:23 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) [ 70.755140][ T7861] sp0: Synchronizing with TNC 20:45:23 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:24 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:24 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:24 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:28 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:28 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:28 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:28 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:28 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:29 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:29 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 20:45:29 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='*!md5sum\x00', 0x0) ptrace$peek(0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, 0x0) getpgid(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, &(0x7f0000000040)=0x99) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x4e434f81eac6e506) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="0a207a0ea4af", 0x6}, {&(0x7f00000000c0)="f59c4b2cb838d40bcbdd26671b43752b7a46363b97e7ff982007a33be3835b4b3151a0cdc47dcbfbaea74799b2e248d4bbb441602c41321c6df59d397f31657b74b516ba3c7d03915a3201dc0006cbbd3f0f860989798b8831530a0c402de223c4aeafaeac2865e16fddaf65d51797265fd6f977dabf529a99b5ecd57f27ffb1911e32a8a4445e79f95babb8656807d4d08980ee33d04516ab18eacadf301ec2f63f7ed32646ef1b39554cb0ae50391c61", 0xb1}], 0x2, 0x81805) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='md5sumtrusted([[\x00', 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) [ 76.988147][ T7805] ================================================================== [ 76.996465][ T7805] BUG: KCSAN: data-race in do_nanosleep / do_task_stat [ 77.003301][ T7805] [ 77.005626][ T7805] write to 0xffff888122cb8024 of 4 bytes by task 7321 on cpu 0: [ 77.013284][ T7805] do_nanosleep+0x14d/0x320 [ 77.017784][ T7805] hrtimer_nanosleep+0x191/0x320 [ 77.022717][ T7805] __x64_sys_nanosleep+0x106/0x150 [ 77.027824][ T7805] do_syscall_64+0xcc/0x370 [ 77.032322][ T7805] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 77.038196][ T7805] [ 77.040555][ T7805] read to 0xffff888122cb8024 of 4 bytes by task 7805 on cpu 1: [ 77.048103][ T7805] do_task_stat+0x131/0x1370 [ 77.052774][ T7805] proc_tgid_stat+0x3d/0x60 [ 77.057279][ T7805] proc_single_show+0x89/0xe0 [ 77.062128][ T7805] seq_read+0x350/0x960 [ 77.066290][ T7805] __vfs_read+0x67/0xc0 [ 77.070439][ T7805] vfs_read+0x143/0x2c0 [ 77.074588][ T7805] ksys_read+0xd5/0x1b0 [ 77.078829][ T7805] __x64_sys_read+0x4c/0x60 [ 77.083434][ T7805] do_syscall_64+0xcc/0x370 [ 77.087932][ T7805] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 77.093805][ T7805] [ 77.096119][ T7805] Reported by Kernel Concurrency Sanitizer on: [ 77.102275][ T7805] CPU: 1 PID: 7805 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 77.109025][ T7805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.119068][ T7805] ================================================================== [ 77.127119][ T7805] Kernel panic - not syncing: panic_on_warn set ... [ 77.133706][ T7805] CPU: 1 PID: 7805 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 77.140473][ T7805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.150524][ T7805] Call Trace: [ 77.153816][ T7805] dump_stack+0xf5/0x159 [ 77.158067][ T7805] panic+0x210/0x640 [ 77.161981][ T7805] ? do_syscall_64+0xcc/0x370 [ 77.166655][ T7805] ? vprintk_func+0x8d/0x140 [ 77.171252][ T7805] kcsan_report.cold+0xc/0x10 [ 77.175930][ T7805] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 77.181478][ T7805] __tsan_read4+0x2c/0x30 [ 77.185814][ T7805] do_task_stat+0x131/0x1370 [ 77.190405][ T7805] ? __tsan_write4+0x32/0x40 [ 77.195011][ T7805] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 77.200641][ T7805] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 77.206276][ T7805] ? __tsan_read8+0x2c/0x30 [ 77.210802][ T7805] ? __rcu_read_unlock+0x66/0x3c0 [ 77.215832][ T7805] proc_tgid_stat+0x3d/0x60 [ 77.220341][ T7805] proc_single_show+0x89/0xe0 [ 77.225019][ T7805] seq_read+0x350/0x960 [ 77.229183][ T7805] __vfs_read+0x67/0xc0 [ 77.233361][ T7805] ? seq_hlist_start_head_rcu+0x60/0x60 [ 77.238904][ T7805] vfs_read+0x143/0x2c0 [ 77.243064][ T7805] ksys_read+0xd5/0x1b0 [ 77.247218][ T7805] __x64_sys_read+0x4c/0x60 [ 77.251720][ T7805] do_syscall_64+0xcc/0x370 [ 77.256315][ T7805] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 77.262201][ T7805] RIP: 0033:0x7fdb7668e310 [ 77.266620][ T7805] Code: 73 01 c3 48 8b 0d 28 4b 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d e5 a2 2b 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e 8a 01 00 48 89 04 24 [ 77.286309][ T7805] RSP: 002b:00007ffd9e5ce9f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 77.294725][ T7805] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007fdb7668e310 [ 77.302820][ T7805] RDX: 0000000000000fff RSI: 00007fdb76b5bd00 RDI: 0000000000000006 [ 77.310883][ T7805] RBP: 0000000000000fff R08: 0000000000000000 R09: 00007fdb76956a10 [ 77.318858][ T7805] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdb76b5bd00 [ 77.326934][ T7805] R13: 000000000248d1c0 R14: 0000000000000005 R15: 0000000000000000 [ 77.336259][ T7805] Kernel Offset: disabled [ 77.340584][ T7805] Rebooting in 86400 seconds..