[ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.250' (ECDSA) to the list of known hosts. 2020/06/16 07:46:09 fuzzer started 2020/06/16 07:46:09 dialing manager at 10.128.0.105:43759 2020/06/16 07:46:10 syscalls: 3085 2020/06/16 07:46:10 code coverage: enabled 2020/06/16 07:46:10 comparison tracing: enabled 2020/06/16 07:46:10 extra coverage: enabled 2020/06/16 07:46:10 setuid sandbox: enabled 2020/06/16 07:46:10 namespace sandbox: enabled 2020/06/16 07:46:10 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/16 07:46:10 fault injection: enabled 2020/06/16 07:46:10 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/16 07:46:10 net packet injection: enabled 2020/06/16 07:46:10 net device setup: enabled 2020/06/16 07:46:10 concurrency sanitizer: enabled 2020/06/16 07:46:10 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/16 07:46:10 USB emulation: enabled syzkaller login: [ 54.832669][ T8932] KCSAN: could not find function: '_find_next_bit' [ 57.842382][ T8932] KCSAN: could not find function: 'poll_schedule_timeout' 2020/06/16 07:46:17 suppressing KCSAN reports in functions: 'tick_nohz_idle_stop_tick' 'generic_update_time' 'echo_char' '__bpf_lru_node_move_in' 'do_nanosleep' 'fat16_ent_put' 'copy_process' 'io_sq_thread' 'ktime_get_seconds' 'ext4_writepages' 'find_get_pages_range_tag' 'ep_poll' 'kauditd_thread' '__get_user_pages' 'iptunnel_xmit' 'audit_log_start' 'wbt_done' 'do_exit' 'n_tty_receive_buf_common' 'ext4_free_inodes_count' '__bforget' 'snd_seq_check_queue' '__ext4_new_inode' 'generic_write_end' 'blk_mq_get_request' 'do_syslog' 'mod_timer' '_find_next_bit' '__x64_sys_ptrace' 'file_update_time' '__splice_from_pipe' 'do_wait' 'ext4_mark_iloc_dirty' '__dev_queue_xmit' 'dd_has_work' 'generic_file_read_iter' 'padata_find_next' 'run_timer_softirq' '__send_signal' 'kcm_rfree' 'fsnotify' 'xas_clear_mark' 'ktime_get_real_seconds' 'tick_nohz_next_event' 'ext4_ext_try_to_merge_right' 'futex_wait_queue_me' 'tick_sched_do_timer' 'generic_fillattr' 'page_counter_charge' 'af_alg_sendpage' 'poll_schedule_timeout' 'blk_mq_sched_dispatch_requests' 'blk_mq_dispatch_rq_list' 'add_timer' 'shmem_file_read_iter' 07:49:40 executing program 0: [ 261.405561][ T8934] IPVS: ftp: loaded support on port[0] = 21 [ 261.480129][ T8934] chnl_net:caif_netlink_parms(): no params data found 07:49:40 executing program 1: [ 261.522379][ T8934] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.530216][ T8934] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.538821][ T8934] device bridge_slave_0 entered promiscuous mode [ 261.548054][ T8934] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.555859][ T8934] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.563572][ T8934] device bridge_slave_1 entered promiscuous mode [ 261.596161][ T8934] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 261.626916][ T8934] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 261.666297][ T8934] team0: Port device team_slave_0 added [ 261.673842][ T8934] team0: Port device team_slave_1 added [ 261.709306][ T9080] IPVS: ftp: loaded support on port[0] = 21 [ 261.716329][ T8934] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 261.723281][ T8934] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 261.775424][ T8934] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 261.800753][ T8934] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 261.808118][ T8934] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 261.835524][ T8934] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 07:49:41 executing program 2: [ 261.907953][ T8934] device hsr_slave_0 entered promiscuous mode [ 261.965899][ T8934] device hsr_slave_1 entered promiscuous mode [ 262.049564][ T9124] IPVS: ftp: loaded support on port[0] = 21 07:49:41 executing program 3: [ 262.132657][ T9080] chnl_net:caif_netlink_parms(): no params data found [ 262.233135][ T9250] IPVS: ftp: loaded support on port[0] = 21 [ 262.286362][ T8934] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 262.330329][ T8934] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 262.397097][ T8934] netdevsim netdevsim0 netdevsim2: renamed from eth2 07:49:41 executing program 4: [ 262.456228][ T8934] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 262.488884][ T9080] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.505611][ T9080] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.517071][ T9080] device bridge_slave_0 entered promiscuous mode [ 262.545779][ T9080] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.552913][ T9080] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.576219][ T9080] device bridge_slave_1 entered promiscuous mode [ 262.583202][ T9124] chnl_net:caif_netlink_parms(): no params data found [ 262.651971][ T9080] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 262.682386][ T9415] IPVS: ftp: loaded support on port[0] = 21 [ 262.708185][ T9080] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 262.754857][ T9124] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.764302][ T9124] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.771988][ T9124] device bridge_slave_0 entered promiscuous mode [ 262.782776][ T9250] chnl_net:caif_netlink_parms(): no params data found [ 262.799740][ T9080] team0: Port device team_slave_0 added [ 262.817059][ T9080] team0: Port device team_slave_1 added [ 262.845957][ T9124] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.853017][ T9124] bridge0: port 2(bridge_slave_1) entered disabled state 07:49:42 executing program 5: [ 262.862819][ T9124] device bridge_slave_1 entered promiscuous mode [ 262.908155][ T9080] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 262.916813][ T9080] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 262.945825][ T9080] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 262.966729][ T9124] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 262.986164][ T9080] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 262.993131][ T9080] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 263.020600][ T9080] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 263.037986][ T9124] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 263.048731][ T8934] 8021q: adding VLAN 0 to HW filter on device bond0 [ 263.072867][ T9566] IPVS: ftp: loaded support on port[0] = 21 [ 263.075995][ T9124] team0: Port device team_slave_0 added [ 263.099811][ T9250] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.107703][ T9250] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.115674][ T9250] device bridge_slave_0 entered promiscuous mode [ 263.123285][ T9124] team0: Port device team_slave_1 added [ 263.144090][ T9124] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 263.151110][ T9124] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 263.177046][ T9124] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 263.217250][ T9080] device hsr_slave_0 entered promiscuous mode [ 263.255327][ T9080] device hsr_slave_1 entered promiscuous mode [ 263.306413][ T9080] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 263.313965][ T9080] Cannot create hsr debugfs directory [ 263.320128][ T9250] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.327257][ T9250] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.334786][ T9250] device bridge_slave_1 entered promiscuous mode [ 263.357871][ T9124] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 263.364833][ T9124] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 263.392058][ T9124] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 263.421831][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 263.429586][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.452386][ T9250] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 263.466581][ T8934] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.478944][ T9250] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 263.489963][ T9415] chnl_net:caif_netlink_parms(): no params data found [ 263.507611][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 263.515986][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.524377][ T8686] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.531569][ T8686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.543418][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 263.595610][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.604110][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.613693][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.620767][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.629269][ T9250] team0: Port device team_slave_0 added [ 263.687262][ T9124] device hsr_slave_0 entered promiscuous mode [ 263.735414][ T9124] device hsr_slave_1 entered promiscuous mode [ 263.775102][ T9124] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 263.782713][ T9124] Cannot create hsr debugfs directory [ 263.820834][ T9250] team0: Port device team_slave_1 added [ 263.841387][ T9250] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 263.849006][ T9250] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 263.875066][ T9250] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 263.886840][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 263.896309][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 263.921115][ T9415] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.928333][ T9415] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.937099][ T9415] device bridge_slave_0 entered promiscuous mode [ 263.944365][ T9250] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 263.951403][ T9250] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 263.979397][ T9250] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 263.997012][ T9624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 264.008152][ T9624] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 264.029168][ T9566] chnl_net:caif_netlink_parms(): no params data found [ 264.046177][ T9415] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.053215][ T9415] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.061069][ T9415] device bridge_slave_1 entered promiscuous mode [ 264.078368][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 264.157259][ T9250] device hsr_slave_0 entered promiscuous mode [ 264.205375][ T9250] device hsr_slave_1 entered promiscuous mode [ 264.265191][ T9250] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 264.272816][ T9250] Cannot create hsr debugfs directory [ 264.289629][ T9415] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 264.303601][ T9080] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 264.337088][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 264.345651][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 264.354025][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 264.362439][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 264.378636][ T8934] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 264.397933][ T8934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 264.407661][ T9415] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 264.423045][ T9080] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 264.467238][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 264.475880][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 264.509853][ T9080] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 264.558668][ T9080] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 264.638241][ T9566] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.646256][ T9566] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.654060][ T9566] device bridge_slave_0 entered promiscuous mode [ 264.677466][ T9415] team0: Port device team_slave_0 added [ 264.684364][ T9566] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.693651][ T9566] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.702157][ T9566] device bridge_slave_1 entered promiscuous mode [ 264.716152][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 264.723561][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 264.735376][ T8934] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 264.743510][ T9415] team0: Port device team_slave_1 added [ 264.749423][ T9124] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 264.799472][ T9124] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 264.859211][ T9566] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 264.870685][ T9566] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 264.891980][ T9124] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 264.937547][ T9124] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 264.984873][ T9566] team0: Port device team_slave_0 added [ 264.998738][ T9415] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 265.006124][ T9415] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 265.032730][ T9415] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 265.050783][ T9415] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 265.057805][ T9415] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 265.084539][ T9415] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 265.095791][ T9250] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 265.137787][ T9250] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 265.207645][ T9566] team0: Port device team_slave_1 added [ 265.230029][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 265.239133][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 265.250037][ T9250] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 265.329086][ T9250] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 265.393927][ T9566] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 265.401866][ T9566] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 265.428383][ T9566] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 265.443649][ T9566] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 265.451280][ T9566] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 265.478246][ T9566] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 265.537258][ T9415] device hsr_slave_0 entered promiscuous mode [ 265.585427][ T9415] device hsr_slave_1 entered promiscuous mode [ 265.635124][ T9415] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 265.642711][ T9415] Cannot create hsr debugfs directory [ 265.727204][ T9566] device hsr_slave_0 entered promiscuous mode [ 265.765526][ T9566] device hsr_slave_1 entered promiscuous mode [ 265.825293][ T9566] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 265.832850][ T9566] Cannot create hsr debugfs directory [ 265.869281][ T8934] device veth0_vlan entered promiscuous mode [ 265.878602][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 265.887384][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 265.922319][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.930254][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 265.962213][ T8934] device veth1_vlan entered promiscuous mode [ 265.980421][ T9080] 8021q: adding VLAN 0 to HW filter on device bond0 [ 266.010890][ T8934] device veth0_macvtap entered promiscuous mode [ 266.034998][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 266.044058][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 266.052503][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 266.061433][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 266.073625][ T8934] device veth1_macvtap entered promiscuous mode [ 266.081254][ T9566] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 266.138675][ T9566] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 266.198147][ T9566] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 266.252967][ T9080] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.261410][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 266.270472][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 266.279963][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 266.288621][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.301567][ T9124] 8021q: adding VLAN 0 to HW filter on device bond0 [ 266.311004][ T9566] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 266.374307][ T9250] 8021q: adding VLAN 0 to HW filter on device bond0 [ 266.382133][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.390742][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.401272][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.408334][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.421060][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.445168][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.454616][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.463292][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.470363][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.478529][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.487191][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 266.494949][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.514135][ T9250] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.529571][ T9124] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.536830][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 266.544426][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.552206][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.561089][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.569623][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.578120][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.585168][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.593133][ T9415] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 266.657880][ T8934] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 266.681363][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.689622][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 266.699979][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 266.709138][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 266.719787][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 266.728862][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.737769][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.746107][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.753113][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.761125][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 266.769697][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 266.778324][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.787061][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 266.795336][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 266.803640][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 266.812244][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 266.820777][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.829799][ T9415] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 266.888823][ T9415] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 266.965809][ T9415] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 267.011263][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 267.019475][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 267.029524][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.038178][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.046697][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.053724][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.061570][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.070317][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.078980][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.086072][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.094797][ T8934] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 267.127389][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 267.135696][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 267.144362][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 267.153015][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 267.161651][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 267.170404][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 267.179155][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 267.187826][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 267.196954][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 267.216143][ T9250] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 267.226636][ T9250] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 267.357493][ T9624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 267.366795][ T9624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 267.375022][ T9624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 267.383550][ T9624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 267.392120][ T9624] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 267.401046][ T9624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 267.409432][ T9624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 267.417879][ T9624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 267.426522][ T9624] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 267.444375][ T9124] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 267.455956][ T9124] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 267.478930][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 267.486858][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 267.494801][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 267.503848][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 267.512388][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 267.520826][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 267.573520][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 267.581325][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 267.589200][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 267.597121][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 267.604598][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 07:49:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000040)={0x80005}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000000)="ea0010e800440f20c066350e000000520f22c0d0c90f21c1c3f40f3803760f650f01c26a06ea00005600", 0x2a}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 267.636500][ T9080] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 267.648322][ T9566] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.665143][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 267.672580][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 267.708315][ T9250] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 267.738349][T10195] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 267.743281][ T9566] 8021q: adding VLAN 0 to HW filter on device team0 [ 267.770354][ T9124] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 267.783606][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 267.792577][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 267.809888][ T9415] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.849067][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 267.859898][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 267.870568][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.879992][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.889043][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.896147][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.908504][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.918729][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.929239][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.936342][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.948701][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 07:49:47 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) [ 267.984068][ T9415] 8021q: adding VLAN 0 to HW filter on device team0 [ 268.022813][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.034092][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 268.043732][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 07:49:47 executing program 0: write$binfmt_script(0xffffffffffffffff, 0x0, 0x131) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 268.067586][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.082898][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.103206][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 268.112688][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 268.121600][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 268.130771][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 268.142000][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 268.151701][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 268.162874][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 268.184248][ T9080] device veth0_vlan entered promiscuous mode [ 268.212283][ T9124] device veth0_vlan entered promiscuous mode [ 268.227141][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 268.235098][ C0] hrtimer: interrupt took 36601 ns [ 268.236984][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 268.249696][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.260687][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.271730][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.281034][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.288150][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.299959][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.309154][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.320269][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.327352][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.338996][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 268.348228][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.364574][ T9080] device veth1_vlan entered promiscuous mode 07:49:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000001c0)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "fccefdff00"}) syz_open_pts(r0, 0x0) [ 268.380588][ T9566] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 268.392326][ T9566] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 268.414964][ T9124] device veth1_vlan entered promiscuous mode [ 268.429464][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.437967][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.446029][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 268.453964][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.463365][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.486124][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.493928][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 268.516055][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 268.524344][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.548558][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 268.565756][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.574134][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 268.590118][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 268.599259][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 268.607628][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.626414][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 268.634007][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.642611][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.657908][ T9250] device veth0_vlan entered promiscuous mode [ 268.711817][ T9250] device veth1_vlan entered promiscuous mode [ 268.745452][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 268.758792][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 268.772313][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 268.784062][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 268.793088][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 268.804820][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 268.814615][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 268.826060][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 268.834315][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.845048][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 268.854264][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.871342][ T9566] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 268.882508][ T9415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 268.924536][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 268.935906][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 268.944358][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 268.956083][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 268.996119][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 269.004646][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 269.032266][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 269.042807][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 269.056778][ T9080] device veth0_macvtap entered promiscuous mode [ 269.084417][ T9415] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 269.093891][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 269.107110][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 269.123184][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 269.132001][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 269.141475][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 269.156572][ T9124] device veth0_macvtap entered promiscuous mode [ 269.167730][ T9080] device veth1_macvtap entered promiscuous mode [ 269.179713][ T9250] device veth0_macvtap entered promiscuous mode [ 269.191694][ T9124] device veth1_macvtap entered promiscuous mode [ 269.209057][ T9250] device veth1_macvtap entered promiscuous mode [ 269.247856][ T9080] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 269.275477][ T9080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 269.292688][ T9080] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 269.320255][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 269.330823][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 269.351419][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 269.360145][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 07:49:48 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000000180)={&(0x7f00000001c0)=@nl=@unspec, 0x80, 0x0}, 0x0) [ 269.369148][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 269.381335][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 269.390804][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 269.406313][ T9080] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 269.435395][ T9080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 269.456538][ T9080] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 269.469463][ T9250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 269.482953][ T9250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 269.494233][ T9250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 269.507529][ T9250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 269.519433][ T9250] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 269.536645][ T9250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 269.547131][ T9250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 269.558190][ T9250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 269.569117][ T9250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 269.580425][ T9250] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 269.594186][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 269.604430][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 269.613919][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 269.623100][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 269.632328][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 269.641513][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 269.707470][ T9124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 269.717969][ T9124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 269.727914][ T9124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 269.738370][ T9124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:49:49 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x8) setsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000000080)=0x910, 0x4) [ 269.748306][ T9124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 269.758985][ T9124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 269.770498][ T9124] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 269.823628][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 269.839086][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 269.850395][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 269.862435][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 269.876365][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 269.887247][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 07:49:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2ea4000038000505d25a80648c63940d0324fc60100a0a400a000048053582c137153e370948018000f01700d1bd", 0x33fe0}], 0x1}, 0x7a000000) [ 269.969277][T10241] netlink: 23550 bytes leftover after parsing attributes in process `syz-executor.0'. [ 269.985533][T10241] netlink: zone id is out of range [ 269.990767][T10241] netlink: zone id is out of range [ 270.008420][T10242] netlink: 23550 bytes leftover after parsing attributes in process `syz-executor.0'. [ 270.028914][T10242] netlink: zone id is out of range [ 270.034138][T10242] netlink: zone id is out of range [ 270.084203][ T9124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 270.105215][ T9124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.119366][ T9124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 07:49:49 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x8010) write$binfmt_aout(r0, 0x0, 0x8a) [ 270.138320][ T9124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.160243][ T9124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 270.178036][ T9124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.205084][ T9124] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 270.246654][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 270.255482][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.264321][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 270.273958][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 270.298257][ T9415] device veth0_vlan entered promiscuous mode [ 270.311335][ T9566] device veth0_vlan entered promiscuous mode [ 270.341298][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.350839][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.359146][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 270.368738][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.383836][ T9415] device veth1_vlan entered promiscuous mode [ 270.403873][ T9566] device veth1_vlan entered promiscuous mode [ 270.426572][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.434811][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.443153][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 07:49:49 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1}, 0x6e) 07:49:49 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) [ 270.631798][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 270.643531][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 270.666465][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 270.696124][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 270.704766][ T4956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 270.720321][ T9415] device veth0_macvtap entered promiscuous mode [ 270.732048][ T9566] device veth0_macvtap entered promiscuous mode [ 270.744198][ T9415] device veth1_macvtap entered promiscuous mode [ 270.754863][ T9566] device veth1_macvtap entered promiscuous mode [ 270.783918][ T9415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.794766][ T9415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.805087][ T9415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.816046][ T9415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.826559][ T9415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.838136][ T9415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.848779][ T9415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.860206][ T9415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.871909][ T9415] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 270.882102][ T9566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.894534][ T9566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.904953][ T9566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.916191][ T9566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.927029][ T9566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.938107][ T9566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.949067][ T9566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.960293][ T9566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.973265][ T9566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.984324][ T9566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.996484][ T9566] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 271.010683][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 271.020776][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 271.029669][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 271.038670][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 271.048011][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 271.057394][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 271.066921][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 271.076553][ T9666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 271.088663][ T9415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 271.102603][ T9415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.113735][ T9415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 271.124286][ T9415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.134684][ T9415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 271.145563][ T9415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.156480][ T9415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 271.167210][ T9415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.178570][ T9415] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 271.188700][ T9566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 271.199754][ T9566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.210421][ T9566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 271.221155][ T9566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.231010][ T9566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 271.241556][ T9566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.251705][ T9566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 271.262169][ T9566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.272084][ T9566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 271.282689][ T9566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.294232][ T9566] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 271.302597][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 271.311888][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 271.323028][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 271.331860][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 07:49:50 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000004c0)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r1) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 07:49:50 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[@ANYBLOB="090000000000000000300000aab84352070000d3f1304926a2fe8022b3e67d76f8836bd52669adc684773e1994ad9252d5c05f91c50da03e0006000000c8f9385809cbe148b022d7e2f1017f1f7de10000658e6d1423fbcb31f67a206980c07cf718f47ef76a237cf4880c0b3a313416f005006bc52efa4ca0b5cdcbbcc51482d5e1b4c4e91aca734835a2f1e3170dada5fde3f58436c90391fc120fb281f4b7a15483e258864d1a09"]) 07:49:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_names\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 07:49:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000000)={0x1ff, 0x358, &(0x7f0000000380)="131ba92b823642a8390528222686cceb2cbbf6934013586e679ee2f32265dd3a76bc57d2b98353f8c328cb5236251e1f96658b43ffe763fc4ed441b1ca010ec9a2a0c300d510ab46baab6948a34b37c9b2bf9fbdc2f8561016c1a6550bd2ec38adbc73e4550faa9310c633207473111cbe9c2ec11af2736dc45899a3b2ea9ac3542d6acc7ea9157df5df38bed573730e2c", &(0x7f0000000480)="d68f1ddb2d3d4cdc26f25d2e1ebfd0a9c28e3357d79cc33bae78e914d8ae8bd2c85fa7e23a4355efb597dffb60c7c3568367630f97c869f111d81127be7eadd02a882637b15b22cb827e530075caff0ac394d2959e4011c69ba0cafc96bcbcd015f49f224b0c0690c7b39c5dd48d08cd2f455bd75ffd543f4131a460863782493cab7633fde7e3a132af02c034edb2b6a10a1aa9b6dea81ac23bba2ecd728e50fe2a03a5d1d93ba41604bf740d1b9771cd797ef5da80465163ceb92ccbee444b576b76dd48c19c253dab9763800928d5ee56ff3e1b9e31c510557788343a8bf7ae517b652ac3261681b452cbbb722e87291d96fa0161319f7809", 0x91, 0xfa}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:49:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:49:50 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000000)={0x80}) 07:49:50 executing program 4: unshare(0x40600) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x2, 0x4, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000e7ffffff851000000300000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000095000000000000009500003f000000000000005300094d5e3690e9a652125c3512eda0ba6704cc8cda606cc86a07f964db1b8a9a3f39d206f4620cb4619b39124d883d35dfefbee97fc2a674f09682e07f13f3f4c81b34a7d24fc5d11f61cb2a00a19725dd"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 271.775158][T10283] dns_resolver: Unsupported server list version (0) 07:49:51 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), 0x20) 07:49:51 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3, 0xd}, &(0x7f0000001fee)='R\trus\xac\x84cusgrVex:De', 0x0) 07:49:51 executing program 4: 07:49:51 executing program 0: 07:49:51 executing program 5: 07:49:51 executing program 0: 07:49:51 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x1) 07:49:51 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) 07:49:51 executing program 3: 07:49:51 executing program 2: 07:49:51 executing program 0: 07:49:51 executing program 5: 07:49:51 executing program 4: 07:49:51 executing program 2: 07:49:51 executing program 5: 07:49:52 executing program 0: 07:49:52 executing program 4: 07:49:52 executing program 3: 07:49:52 executing program 2: 07:49:52 executing program 1: 07:49:52 executing program 5: 07:49:52 executing program 0: 07:49:52 executing program 4: 07:49:52 executing program 3: 07:49:52 executing program 2: 07:49:52 executing program 3: 07:49:52 executing program 5: 07:49:52 executing program 0: 07:49:52 executing program 4: 07:49:52 executing program 2: 07:49:52 executing program 1: 07:49:52 executing program 4: 07:49:52 executing program 0: 07:49:52 executing program 2: 07:49:52 executing program 3: 07:49:52 executing program 5: 07:49:52 executing program 1: 07:49:52 executing program 4: 07:49:52 executing program 2: 07:49:52 executing program 0: 07:49:52 executing program 3: 07:49:52 executing program 5: 07:49:52 executing program 1: 07:49:52 executing program 3: 07:49:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_opts(r2, 0x29, 0x1600bd74, 0x0, &(0x7f0000000080)) 07:49:52 executing program 2: 07:49:52 executing program 0: 07:49:52 executing program 5: 07:49:52 executing program 3: 07:49:52 executing program 1: 07:49:52 executing program 2: 07:49:52 executing program 4: 07:49:53 executing program 0: 07:49:53 executing program 5: 07:49:53 executing program 2: 07:49:53 executing program 1: 07:49:53 executing program 3: 07:49:53 executing program 4: 07:49:53 executing program 2: 07:49:53 executing program 0: 07:49:53 executing program 5: 07:49:53 executing program 1: 07:49:53 executing program 4: 07:49:53 executing program 3: 07:49:53 executing program 0: 07:49:53 executing program 5: 07:49:53 executing program 2: 07:49:53 executing program 4: 07:49:53 executing program 1: 07:49:53 executing program 0: 07:49:53 executing program 3: 07:49:53 executing program 5: 07:49:53 executing program 2: 07:49:53 executing program 4: 07:49:53 executing program 3: 07:49:53 executing program 1: 07:49:53 executing program 0: 07:49:53 executing program 2: 07:49:53 executing program 5: 07:49:53 executing program 4: 07:49:53 executing program 3: 07:49:53 executing program 0: 07:49:53 executing program 1: 07:49:53 executing program 2: 07:49:53 executing program 3: 07:49:53 executing program 5: 07:49:53 executing program 4: 07:49:53 executing program 1: 07:49:53 executing program 0: 07:49:54 executing program 3: 07:49:54 executing program 2: 07:49:54 executing program 5: 07:49:54 executing program 0: 07:49:54 executing program 4: 07:49:54 executing program 1: 07:49:54 executing program 3: 07:49:54 executing program 2: 07:49:54 executing program 5: 07:49:54 executing program 1: 07:49:54 executing program 4: 07:49:54 executing program 0: 07:49:54 executing program 5: 07:49:54 executing program 3: 07:49:54 executing program 2: 07:49:54 executing program 4: 07:49:54 executing program 1: 07:49:54 executing program 0: 07:49:54 executing program 5: 07:49:54 executing program 3: 07:49:54 executing program 2: 07:49:54 executing program 1: 07:49:54 executing program 4: 07:49:54 executing program 0: 07:49:54 executing program 5: 07:49:54 executing program 3: 07:49:54 executing program 2: 07:49:54 executing program 0: 07:49:54 executing program 1: 07:49:54 executing program 5: 07:49:54 executing program 4: 07:49:54 executing program 3: 07:49:54 executing program 2: 07:49:54 executing program 1: 07:49:54 executing program 4: 07:49:55 executing program 0: 07:49:55 executing program 5: 07:49:55 executing program 3: 07:49:55 executing program 4: 07:49:55 executing program 1: 07:49:55 executing program 2: 07:49:55 executing program 0: 07:49:55 executing program 5: 07:49:55 executing program 3: 07:49:55 executing program 4: 07:49:55 executing program 1: 07:49:55 executing program 2: 07:49:55 executing program 5: 07:49:55 executing program 0: 07:49:55 executing program 3: 07:49:55 executing program 5: 07:49:55 executing program 2: 07:49:55 executing program 4: 07:49:55 executing program 1: 07:49:55 executing program 0: 07:49:55 executing program 3: 07:49:55 executing program 1: 07:49:55 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000001a00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x1, 0x4, 0x1, 0x0, [0x0]}}, 0x29) 07:49:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) 07:49:55 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3400000026000106"], 0x34}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000027c0), 0x344, 0x10122, 0x0) 07:49:55 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x0, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x8001, 0xf9, 0xff, 0x0, 0x89, 0xe000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20001, 0x2, @perf_config_ext={0x1, 0xa}, 0x0, 0x0, 0x7fff, 0x6, 0x0, 0xfffffffe, 0x4}, r0, 0xfffffffffffffff7, r3, 0x0) io_submit(0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, 0xffffffffffffffff, 0x81e6c000) clone(0x64200105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:49:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x0, 0xf8, 0x0, 0xffffffff, 0xffffffff, 0x300, 0x300, 0x300, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@loopback, @empty, [], [], 'nr0\x00', 'vlan0\x00', {}, {}, 0x0, 0x0, 0xa}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "85833887a58e3b405e15159fd32cd5ff968d54b500993cd0f776cc4ebb19"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 07:49:55 executing program 1: syz_open_pts(0xffffffffffffffff, 0x2c4140) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, 0x0, 0x0) request_key(0x0, &(0x7f00000012c0)={'syz', 0x3}, &(0x7f0000001300)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0x7, 0x4) syz_emit_ethernet(0x15, &(0x7f0000000040)={@link_local, @dev, @val={@void}, {@llc={0x4, {@llc={0x0, 0x0, "b3"}}}}}, 0x0) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f0000000b00)=@rc, 0x80, 0x0, 0x0, &(0x7f0000001e40)=""/239, 0xef}}, {{&(0x7f0000003300)=@tipc=@id, 0x80, &(0x7f00000049c0)=[{&(0x7f0000003380)=""/83, 0x53}, {0x0}, {0x0}, {&(0x7f0000004580)=""/203, 0xcb}, {0x0}, {&(0x7f00000048c0)=""/218, 0xda}], 0x6, &(0x7f0000004a40)=""/243, 0xf3}}], 0x20004582, 0x2, 0x0) [ 276.633301][T10491] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 276.659590][T10491] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 07:49:55 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x44) 07:49:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000640)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86\x06\x00\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\x02j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x02\x00\x00\x00\x00\x00\x00\x00_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2\x03\x00\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU=.\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf1J\xd9\x13Q\x94R/\xdf\x1e\x9e\xe57\xda{\xe1D\x00\x00\x00\x00H\xe6\x0f\xe0]\xef\x8b\xcdk\xfe\xf6\xcc+rp\xd5\b~\xf6\xa2\x87\xed<\xc2bO\x88\x03n% ', 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0xc00) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setopts(0x4206, r1, 0x0, 0x0) r4 = gettid() tkill(r4, 0x1000000000016) [ 276.688385][T10491] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 276.735712][T10491] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 276.767629][T10491] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 07:49:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 07:49:56 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}, {}, {}, 0x10000000}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002"], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x4000000) [ 276.853263][T10507] ERROR: Domain ' /sbin/init /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.2 proc:/self/fd/3' not defined. [ 276.878993][T10510] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:49:56 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getrlimit(0x1, &(0x7f0000000100)) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) syz_mount_image$nfs(&(0x7f0000000140)='nfs\x00', &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x9, &(0x7f00000008c0)=[{0x0, 0x0, 0x4}, {&(0x7f0000000480)="4fde9ac51d507b4cac0e0ce0c71db1e6972f21baf3efeb1bbb3c32e790e7681aeaf9bc39c394beaaaf1e87418af78df61b48f20cca4f672a6e2381d3ebbb12dfaf018cf88ecc31908278b037736b6a5335fd302426b27f253f3b4dc1a404697937ae718454c8a35ed5fc9b38e71a9ab01fcdab19cf", 0x75, 0x1800000000}, {&(0x7f0000000500)="98fd87f9a0dee8360099b53aceeeaa54c278db964aa93b48782dcd4422bd014bf4e3490abdb617ec711e82b8468b45b972d29e5b6c3f786b8474d3a2178edc1a9bea289e4df97f", 0x47, 0x30}, {&(0x7f0000000180), 0x0, 0xe852}, {&(0x7f00000005c0)="5a9a0740fce8fb44ef9544269a9bbb3b0ae4e86503760a516c94ace479ab9596c3a5c91efb465be25c9c8904955e26be3bf3bae28e9fd47dd55d25", 0x3b, 0xe70}, {&(0x7f00000006c0)="c7fa9517c6f9e1338341ca6c1baa9490ed03ff1f27080533acb46cf988db39", 0x1f, 0x913}, {0x0, 0x0, 0x81}, {&(0x7f0000000780)="e2581434be22525f964eac9b0d198e8000de1b202ae369062400ba7fc0c76486b8f590bf32969280ab9baef3f6342966439a0f2d0863a0be79f24b33033355017d30bbb3dc7041e817e5a5b67a21938c4c39256c9623a27bbb709d6a7e0dfc4d0eecbc81bbfa2b3ff4dbd3ef92339a9db6137118570f32d5c0c5e44af526923db2be99fd427b976d4afdd3ef79fde9b956a590", 0x93, 0x100000000}, {&(0x7f0000000840)="bdc9ceea06b594d861d50fc1016b1bec4e3d6a6b83e6fafabbae874422f0e14436b0b6febbcb99347ee812278f098acba1103bfc90256745d37f6faecc4644b297d7071eeb54964cd8d1dbae1770cd7ae2b539f958cc13f36732bb7afad7adec55b2c9c3dadb8e1abe5c39", 0x6b, 0xffffffff}], 0x110d041, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffd000/0x1000)=nil) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000000c0)='./file0\x00') mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xee33, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) [ 276.943302][T10515] IPVS: ftp: loaded support on port[0] = 21 07:49:56 executing program 3: request_key(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0x7, 0x4) syz_emit_ethernet(0x15, &(0x7f0000000040)={@link_local, @dev, @val={@void}, {@llc={0x4, {@llc={0x0, 0x0, "b3"}}}}}, 0x0) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f0000000b00)=@rc, 0x80, 0x0, 0x0, &(0x7f0000001e40)=""/239, 0xef}}, {{&(0x7f0000003300)=@tipc=@id, 0x80, &(0x7f00000049c0)=[{&(0x7f0000003380)=""/83, 0x53}, {0x0}, {0x0}, {&(0x7f0000004580)=""/203, 0xcb}, {0x0}, {&(0x7f00000048c0)=""/218, 0xda}], 0x6, &(0x7f0000004a40)=""/243, 0xf3}}], 0x20004582, 0x2, 0x0) 07:49:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getrlimit(0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) syz_mount_image$nfs(&(0x7f0000000140)='nfs\x00', &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x8, &(0x7f00000008c0)=[{&(0x7f00000003c0)="b10bb5ac740f9045cf578c16a294a1771a2064bf541ce61585876ddee3835d404eb858ac15d7685eb2cf2197d1c72738c78ef20036d130821aef0d57a5f85876b21b71f9f3aa6a007574758f46dc61364f389615722aedbfa43a8fbc962c51c7fc649aa2ffee5c5596497a96b92566b84db7229d05c68ae7c94f134d48897bf2932bccb05aa16f5b66bb2e830102492a8ab642acc67f6eee86c7f6957017bc78110abcc19d749948bcc9c45dcdd9db", 0xaf, 0x4}, {&(0x7f0000000480)="4fde9ac51d507b4cac0e0ce0c71db1e6972f21baf3efeb1bbb3c32e790e7681aeaf9bc39c394beaaaf1e87418af78df61b48f20cca4f672a6e2381d3ebbb12dfaf018cf88ecc31908278b037736b6a5335fd302426b27f253f3b4dc1a404697937ae718454c8a35ed5fc9b38e71a9ab01fcdab19cf", 0x75, 0x1800000000}, {&(0x7f0000000500)="98fd87f9a0dee8360099b53aceeeaa54c278db964aa93b48782dcd4422bd014bf4e3490abdb617ec711e82b8468b45b972d29e5b6c3f786b8474d3a2178edc1a9bea289e4df97f", 0x47, 0x30}, {&(0x7f0000000180), 0x0, 0xe852}, {&(0x7f00000005c0)="5a9a0740fce8fb44ef9544269a9bbb3b0ae4e86503760a516c94ace479ab9596c3a5c91efb465be25c9c8904955e26be3bf3bae28e9fd47dd55d255de30998289742cbc405a5a477595f981bb445", 0x4e, 0xe70}, {&(0x7f00000006c0)="c7fa9517c6f9e1338341ca6c1baa9490ed03ff1f27080533", 0x18, 0x913}, {0x0, 0x0, 0x81}, {&(0x7f0000000840)="bdc9ceea06b594d861d50fc1016b1bec4e3d6a6b83e6fafabbae874422f0e14436b0b6febbcb99347ee812278f098acba1103bfc90256745d37f6faecc4644b297d7071eeb54964cd8d1dbae1770cd7a", 0x50}], 0x110d041, &(0x7f00000009c0)='.$%}/*$^/\xc2/@\x00') vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffd000/0x1000)=nil) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f00000000c0)='./file0\x00') mkdirat(r3, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0xee33, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0x1, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 07:49:56 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x0, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x8001, 0xf9, 0xff, 0x0, 0x89, 0xe000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20001, 0x2, @perf_config_ext={0x1, 0xa}, 0x0, 0x0, 0x7fff, 0x6, 0x0, 0xfffffffe, 0x4}, r0, 0xfffffffffffffff7, r3, 0x0) io_submit(0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, 0xffffffffffffffff, 0x81e6c000) clone(0x64200105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:49:56 executing program 1: syz_open_pts(0xffffffffffffffff, 0x2c4140) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, 0x0, 0x0) request_key(0x0, &(0x7f00000012c0)={'syz', 0x3}, &(0x7f0000001300)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0x7, 0x4) syz_emit_ethernet(0x15, &(0x7f0000000040)={@link_local, @dev, @val={@void}, {@llc={0x4, {@llc={0x0, 0x0, "b3"}}}}}, 0x0) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f0000000b00)=@rc, 0x80, 0x0, 0x0, &(0x7f0000001e40)=""/239, 0xef}}, {{&(0x7f0000003300)=@tipc=@id, 0x80, &(0x7f00000049c0)=[{&(0x7f0000003380)=""/83, 0x53}, {0x0}, {0x0}, {&(0x7f0000004580)=""/203, 0xcb}, {0x0}, {&(0x7f00000048c0)=""/218, 0xda}], 0x6, &(0x7f0000004a40)=""/243, 0xf3}}], 0x20004582, 0x2, 0x0) 07:49:56 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000001a00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) [ 277.295366][ T421] tipc: TX() has been purged, node left! 07:49:56 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000040c0), 0x29b) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x1}, 0x50) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x2000) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff4b65}}}, 0x78) 07:49:56 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x8) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) [ 277.374368][T10578] IPVS: ftp: loaded support on port[0] = 21 07:49:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getrlimit(0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) syz_mount_image$nfs(&(0x7f0000000140)='nfs\x00', &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x8, &(0x7f00000008c0)=[{&(0x7f00000003c0)="b10bb5ac740f9045cf578c16a294a1771a2064bf541ce61585876ddee3835d404eb858ac15d7685eb2cf2197d1c72738c78ef20036d130821aef0d57a5f85876b21b71f9f3aa6a007574758f46dc61364f389615722aedbfa43a8fbc962c51c7fc649aa2ffee5c5596497a96b92566b84db7229d05c68ae7c94f134d48897bf2932bccb05aa16f5b66bb2e830102492a8ab642acc67f6eee86c7f6957017bc78110abcc19d749948bcc9c45dcdd9db", 0xaf, 0x4}, {&(0x7f0000000480)="4fde9ac51d507b4cac0e0ce0c71db1e6972f21baf3efeb1bbb3c32e790e7681aeaf9bc39c394beaaaf1e87418af78df61b48f20cca4f672a6e2381d3ebbb12dfaf018cf88ecc31908278b037736b6a5335fd302426b27f253f3b4dc1a404697937ae718454c8a35ed5fc9b38e71a9ab01fcdab19cf", 0x75, 0x1800000000}, {&(0x7f0000000500)="98fd87f9a0dee8360099b53aceeeaa54c278db964aa93b48782dcd4422bd014bf4e3490abdb617ec711e82b8468b45b972d29e5b6c3f786b8474d3a2178edc1a9bea289e4df97f", 0x47, 0x30}, {&(0x7f0000000180), 0x0, 0xe852}, {&(0x7f00000005c0)="5a9a0740fce8fb44ef9544269a9bbb3b0ae4e86503760a516c94ace479ab9596c3a5c91efb465be25c9c8904955e26be3bf3bae28e9fd47dd55d255de30998289742cbc405a5a477595f981bb445", 0x4e, 0xe70}, {&(0x7f00000006c0)="c7fa9517c6f9e1338341ca6c1baa9490ed03ff1f27080533", 0x18, 0x913}, {0x0, 0x0, 0x81}, {&(0x7f0000000840)="bdc9ceea06b594d861d50fc1016b1bec4e3d6a6b83e6fafabbae874422f0e14436b0b6febbcb99347ee812278f098acba1103bfc90256745d37f6faecc4644b297d7071eeb54964cd8d1dbae1770cd7a", 0x50}], 0x110d041, &(0x7f00000009c0)='.$%}/*$^/\xc2/@\x00') vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffd000/0x1000)=nil) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f00000000c0)='./file0\x00') mkdirat(r3, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0xee33, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0x1, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 07:49:56 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000180)=""/96, 0x60}], 0x1, 0x3ffffff) 07:49:56 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x0, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x8001, 0xf9, 0xff, 0x0, 0x89, 0xe000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20001, 0x2, @perf_config_ext={0x1, 0xa}, 0x0, 0x0, 0x7fff, 0x6, 0x0, 0xfffffffe, 0x4}, r0, 0xfffffffffffffff7, r3, 0x0) io_submit(0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, 0xffffffffffffffff, 0x81e6c000) clone(0x64200105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 277.588960][T10612] buggy seq_file .next function proc_keys_next did not updated position index 07:49:56 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) connect$inet(r3, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, 0xffffffffffffffff, 0x81e6c000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) clone(0x64200105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x803, 0x2) [ 277.779487][T10630] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 277.803000][T10630] IPVS: ftp: loaded support on port[0] = 21 [ 277.949915][T10657] IPVS: ftp: loaded support on port[0] = 21 07:49:57 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040), 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r1, r2, 0x0, 0x1000003) 07:49:57 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x8) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) 07:49:57 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) 07:49:57 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000180)=""/96, 0x60}], 0x1, 0x3ffffff) 07:49:57 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x0, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x8001, 0xf9, 0xff, 0x0, 0x89, 0xe000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20001, 0x2, @perf_config_ext={0x1, 0xa}, 0x0, 0x0, 0x7fff, 0x6, 0x0, 0xfffffffe, 0x4}, r0, 0xfffffffffffffff7, r3, 0x0) io_submit(0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, 0xffffffffffffffff, 0x81e6c000) clone(0x64200105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:49:57 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x80081272, 0x0) [ 278.266152][T10700] IPVS: ftp: loaded support on port[0] = 21 07:49:57 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0), 0x0, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, 0xffffffffffffffff, 0x81e6c000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) clone(0x64200105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x803, 0x2) 07:49:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f00000005c0)=""/214, 0xd6}], 0x1, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 07:49:57 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040), 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r1, r2, 0x0, 0x1000003) 07:49:57 executing program 4: r0 = getpid() sched_setattr(r0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x64200105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) 07:49:57 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000040)=0x8604240) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 07:49:57 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[], 0x0) request_key(0x0, &(0x7f00000012c0)={'syz', 0x3}, &(0x7f0000001300)='\x00', 0x0) add_key(&(0x7f0000002000)='logon\x00', &(0x7f0000001000), &(0x7f0000001000)="2e989cc9f58ec796be4720e6160291a2fb7c6445e84b8e9e349ead029fe38d5810bf992b5d51f406a51cc339021268aed6f767582af42dbc8ea1110e4353fcf30b20f1f27ed3b44bef6444f8ca6a808e34ded636ef55e151c11b4ef7a5384f4a0ceb885759dfeeca5aaa540de461d2130755897533032f5639c4ba79988a49d63084f2cbed0a84e5e733146f15192fdabd", 0x91, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000000)=0x7, 0x4) syz_emit_ethernet(0x15, &(0x7f0000000040)={@link_local, @dev, @val={@void}, {@llc={0x4, {@llc={0x0, 0x0, "b3"}}}}}, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x49, 0x0, 0x0, "14aaab34171ee1ab69e2aa2b92429dba", "614a86f2d876d47f0234672f8d1db53af2813368027978dedb56341a7aab85983ee6ba26acbdf461fde42fe3f9096e7bb9354674"}, 0x49, 0x0) recvmmsg(r1, &(0x7f0000004b40)=[{{&(0x7f0000000b00)=@rc, 0x80, 0x0, 0x0, &(0x7f0000001e40)=""/239, 0xef}}, {{&(0x7f0000003300)=@tipc=@id, 0x80, &(0x7f00000049c0)=[{&(0x7f0000003380)=""/83, 0x53}, {0x0}, {0x0}, {&(0x7f0000004580)=""/203, 0xcb}, {0x0}, {&(0x7f00000048c0)=""/218, 0xda}], 0x6, &(0x7f0000004a40)=""/243, 0xf3}}], 0x20004582, 0x2, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) 07:49:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/429], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 278.558017][T10734] IPVS: ftp: loaded support on port[0] = 21 [ 278.673247][T10764] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 278.703259][T10764] IPVS: ftp: loaded support on port[0] = 21 07:49:58 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0), 0x0, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, 0xffffffffffffffff, 0x81e6c000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) clone(0x64200105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x803, 0x2) 07:49:58 executing program 1: ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000340)='|'}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f00000002c0)=""/218) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 07:49:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000001a00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) read$FUSE(r0, &(0x7f0000001a80), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x0, 0x0, 0x8001}}, 0x50) 07:49:58 executing program 4: 07:49:58 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[], 0x0) request_key(0x0, &(0x7f00000012c0)={'syz', 0x3}, &(0x7f0000001300)='\x00', 0x0) add_key(&(0x7f0000002000)='logon\x00', &(0x7f0000001000), &(0x7f0000001000)="2e989cc9f58ec796be4720e6160291a2fb7c6445e84b8e9e349ead029fe38d5810bf992b5d51f406a51cc339021268aed6f767582af42dbc8ea1110e4353fcf30b20f1f27ed3b44bef6444f8ca6a808e34ded636ef55e151c11b4ef7a5384f4a0ceb885759dfeeca5aaa540de461d2130755897533032f5639c4ba79988a49d63084f2cbed0a84e5e733146f15192fdabd", 0x91, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000000)=0x7, 0x4) syz_emit_ethernet(0x15, &(0x7f0000000040)={@link_local, @dev, @val={@void}, {@llc={0x4, {@llc={0x0, 0x0, "b3"}}}}}, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x49, 0x0, 0x0, "14aaab34171ee1ab69e2aa2b92429dba", "614a86f2d876d47f0234672f8d1db53af2813368027978dedb56341a7aab85983ee6ba26acbdf461fde42fe3f9096e7bb9354674"}, 0x49, 0x0) recvmmsg(r1, &(0x7f0000004b40)=[{{&(0x7f0000000b00)=@rc, 0x80, 0x0, 0x0, &(0x7f0000001e40)=""/239, 0xef}}, {{&(0x7f0000003300)=@tipc=@id, 0x80, &(0x7f00000049c0)=[{&(0x7f0000003380)=""/83, 0x53}, {0x0}, {0x0}, {&(0x7f0000004580)=""/203, 0xcb}, {0x0}, {&(0x7f00000048c0)=""/218, 0xda}], 0x6, &(0x7f0000004a40)=""/243, 0xf3}}], 0x20004582, 0x2, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 278.961623][T10806] IPVS: ftp: loaded support on port[0] = 21 07:49:58 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 07:49:58 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x3) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x81e6c000) clone(0x64200105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x803, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in6=@private2, 0x0, 0x4000, 0x0, 0x60, 0xa, 0x0, 0x0, 0x11}, {0xfffffffffffffffc, 0x9b, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x10}, {0x0, 0x0, 0x2, 0x5}, 0x0, 0x80000000}, {{@in6=@remote, 0x0, 0x3c}, 0x0, @in=@multicast2, 0x100000, 0x0, 0x1, 0x1, 0x0, 0x0, 0xffffffff}}, 0xe8) socket$inet_udplite(0x2, 0x2, 0x88) 07:49:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000001a00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) read$FUSE(r0, &(0x7f0000001a80), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x0, 0x0, 0x8001}}, 0x50) 07:49:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0) r1 = dup(r0) r2 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\xae\x05<\xb4M!\xdc\xc6nh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x8b\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write(r2, &(0x7f00000004c0)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) lstat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) [ 279.333180][T10851] IPVS: ftp: loaded support on port[0] = 21 07:49:58 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3400000026000106"], 0x34}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000027c0), 0x344, 0x10122, 0x0) 07:49:58 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 07:49:58 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x2000020004f27c, 0x197f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f0000000000)) 07:49:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f00000005c0)=""/214, 0xd6}], 0x1, 0x0) [ 279.554973][T10885] NFS: Device name not specified [ 279.560829][T10886] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 279.589232][T10886] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 279.626076][T10886] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 279.661291][T10886] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 279.709020][T10886] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 07:49:59 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)) 07:49:59 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000400)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x0, 0x900880}}, 0x50) 07:49:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getrlimit(0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) syz_mount_image$nfs(&(0x7f0000000140)='nfs\x00', &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x6, &(0x7f00000008c0)=[{0x0, 0x0, 0x1800000000}, {0x0, 0x0, 0x30}, {0x0}, {&(0x7f00000005c0)="5a9a0740fce8fb44ef9544269a9bbb3b0ae4e86503760a516c94ace479ab9596c3a5c91efb465be25c9c8904955e26be3bf3bae28e9fd47dd55d255de30998289742cb", 0x43, 0xe70}, {&(0x7f00000006c0)="c7fa9517c6f9e1338341ca6c1baa9490ed03", 0x12, 0x913}, {0x0, 0x0, 0x81}], 0x110d041, &(0x7f00000009c0)='.$%}/*$^/\xc2/@\x00') vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffd000/0x1000)=nil) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000000c0)='./file0\x00') mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee33, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0x1, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 07:49:59 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x64200105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:49:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3400000066000106"], 0x34}}, 0x0) 07:49:59 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r3 = gettid() tkill(r3, 0x33) r4 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8)={[0xfffffffffffffffc]}, 0x8) read(r4, &(0x7f0000000740)=""/384, 0x200008c0) [ 279.910808][T10906] IPVS: ftp: loaded support on port[0] = 21 [ 279.935798][ T421] tipc: TX() has been purged, node left! [ 279.941803][ T421] tipc: TX() has been purged, node left! 07:49:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002"], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x4000000) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 07:49:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002"], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x4000000) [ 280.001976][ T421] tipc: TX() has been purged, node left! 07:49:59 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000dc0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f0000000080)=0x6, 0x1b) recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 280.119624][ T421] tipc: TX() has been purged, node left! 07:49:59 executing program 0: getpid() sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) clone(0x64200105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:49:59 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_GSO_MAX_SIZE={0x8}]}, 0x38}}, 0x0) [ 280.189265][ T421] tipc: TX() has been purged, node left! [ 280.209363][ T421] tipc: TX() has been purged, node left! 07:49:59 executing program 3: [ 280.325266][T10954] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:49:59 executing program 2: 07:49:59 executing program 4: 07:49:59 executing program 1: 07:49:59 executing program 3: 07:49:59 executing program 5: [ 280.445414][ T421] tipc: TX() has been purged, node left! [ 280.471638][T10956] IPVS: ftp: loaded support on port[0] = 21 07:49:59 executing program 2: [ 280.545470][ T421] tipc: TX() has been purged, node left! 07:49:59 executing program 4: 07:49:59 executing program 1: 07:49:59 executing program 0: 07:50:00 executing program 3: 07:50:00 executing program 2: 07:50:00 executing program 1: 07:50:00 executing program 5: 07:50:00 executing program 4: 07:50:00 executing program 0: 07:50:00 executing program 1: 07:50:00 executing program 3: 07:50:00 executing program 2: 07:50:00 executing program 5: 07:50:00 executing program 1: 07:50:00 executing program 4: 07:50:00 executing program 0: 07:50:00 executing program 3: 07:50:00 executing program 2: 07:50:00 executing program 5: 07:50:00 executing program 0: 07:50:00 executing program 4: 07:50:00 executing program 1: 07:50:00 executing program 3: 07:50:00 executing program 5: 07:50:00 executing program 2: 07:50:00 executing program 0: 07:50:00 executing program 4: 07:50:00 executing program 3: 07:50:00 executing program 1: 07:50:00 executing program 5: 07:50:00 executing program 3: 07:50:00 executing program 2: 07:50:00 executing program 4: 07:50:00 executing program 3: 07:50:00 executing program 1: 07:50:00 executing program 2: 07:50:00 executing program 0: 07:50:01 executing program 5: 07:50:01 executing program 3: 07:50:01 executing program 0: 07:50:01 executing program 4: 07:50:01 executing program 2: 07:50:01 executing program 1: 07:50:01 executing program 5: 07:50:01 executing program 3: 07:50:01 executing program 0: 07:50:01 executing program 4: 07:50:01 executing program 2: 07:50:01 executing program 1: 07:50:01 executing program 5: 07:50:01 executing program 3: 07:50:01 executing program 4: 07:50:01 executing program 0: 07:50:01 executing program 1: 07:50:01 executing program 2: 07:50:01 executing program 3: 07:50:01 executing program 5: 07:50:01 executing program 0: 07:50:01 executing program 1: 07:50:01 executing program 4: 07:50:01 executing program 2: 07:50:01 executing program 3: 07:50:01 executing program 5: 07:50:01 executing program 1: 07:50:01 executing program 0: 07:50:01 executing program 4: 07:50:02 executing program 2: 07:50:02 executing program 3: 07:50:02 executing program 1: 07:50:02 executing program 5: 07:50:02 executing program 0: 07:50:02 executing program 4: 07:50:02 executing program 3: 07:50:02 executing program 2: 07:50:02 executing program 5: 07:50:02 executing program 1: 07:50:02 executing program 0: 07:50:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet(0x2, 0x3, 0x2) bind$inet(r0, 0x0, 0x0) 07:50:02 executing program 3: getpid() getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="aa6ce8f5a12a1310398eb45049c1a1a5fdd484864b44e4ec0e796f48892424283ba9b3e91cad1e7cad7dfffc75d0b0827abc0c6184df17b2151022bf"], 0x8) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000500)={'veth1_vlan\x00', @broadcast}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x3) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000240)="459a247c755ef6d090406d504af1c77c3f50a089e2bc0a0274661b8f2a7029a0016862505f4761b165ec3603aec7a16157bc7c8a4f83e8f84032b48ef007dc7fc3795e8711e2b308bb2532fd639e0deb446606b662c2c948b2a088b906c8975fba7f8e0c61231ca7593e893fa1c122b9cb9a55e7e795f3b4e9", 0x79, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000380)) getpid() r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) 07:50:02 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000), &(0x7f0000000040)=0x18) 07:50:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) alarm(0x1) 07:50:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7, 0x0, "5831dd911f9e61c2b48ec10153026bd906cf0f"}) 07:50:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x801, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x4000000000005e3, 0x0, 0x0) 07:50:02 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x801, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000140)={0x7}, 0x7) [ 283.343873][T11092] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 07:50:02 executing program 2: getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='trusted.overlay.upper\x00') [ 283.407238][T11092] team0: Device ipvlan1 failed to register rx_handler 07:50:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5422, 0x0) 07:50:02 executing program 0: getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='trusted.overlay.upper\x00') 07:50:02 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000040)={0x0, 0xa, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0bf794b8"}, 0x0, 0x0, @planes=&(0x7f0000000000)={0x0, 0x0, @userptr}, 0x1}) 07:50:02 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f00000001c0)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0) write$binfmt_misc(r1, 0x0, 0x37cb1133) [ 283.643689][T11092] syz-executor.3 (11092) used greatest stack depth: 10360 bytes left 07:50:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) semtimedop(0x0, &(0x7f0000000180)=[{}], 0x1, 0x0) 07:50:03 executing program 3: getpid() getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="aa6ce8f5a12a1310398eb45049c1a1a5fdd484864b44e4ec0e796f48892424283ba9b3e91cad1e7cad7dfffc75d0b0827abc0c6184df17b2151022bf"], 0x8) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000500)={'veth1_vlan\x00', @broadcast}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x3) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000240)="459a247c755ef6d090406d504af1c77c3f50a089e2bc0a0274661b8f2a7029a0016862505f4761b165ec3603aec7a16157bc7c8a4f83e8f84032b48ef007dc7fc3795e8711e2b308bb2532fd639e0deb446606b662c2c948b2a088b906c8975fba7f8e0c61231ca7593e893fa1c122b9cb9a55e7e795f3b4e9", 0x79, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000380)) getpid() r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) 07:50:03 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'veth1\x00', &(0x7f0000000180)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "a27eca"}}) 07:50:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3, 0x0, 0x8}, 0x40) 07:50:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) 07:50:03 executing program 0: getrusage(0xffffffffffffffff, &(0x7f0000001380)) 07:50:03 executing program 5: sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, 0x0, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) [ 283.932948][T11137] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 07:50:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x22, 0x0, 0x0) [ 284.010192][T11137] team0: Device ipvlan1 failed to register rx_handler 07:50:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$MAP_DELETE_ELEM(0xc, &(0x7f0000000000)={r0, 0x0}, 0x20) 07:50:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 07:50:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5428, 0x0) [ 284.337176][T11137] syz-executor.3 (11137) used greatest stack depth: 9976 bytes left 07:50:03 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000280)) ppoll(&(0x7f0000000140)=[{r1, 0x100}, {r1}, {}, {}, {r3}, {r0}], 0x6, 0x0, 0x0, 0x0) 07:50:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) 07:50:03 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x0) 07:50:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000140)={0x0, 0x0, 0xfff}, 0xc) 07:50:03 executing program 4: socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) 07:50:03 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffff0000) 07:50:03 executing program 3: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000580)={{0x2}}) [ 284.577968][ T27] audit: type=1804 audit(1592293803.818:2): pid=11164 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir777701891/syzkaller.oNRgnV/54/bus" dev="sda1" ino=15868 res=1 07:50:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) write$binfmt_aout(r3, &(0x7f0000000240)=ANY=[], 0xfffffd2d) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:50:03 executing program 0: getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x114, 0x0) 07:50:03 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x3, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x38}}, 0x0) 07:50:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x7d, 0x0, 0x0) [ 284.677371][ T27] audit: type=1804 audit(1592293803.848:3): pid=11164 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir777701891/syzkaller.oNRgnV/54/bus" dev="sda1" ino=15868 res=1 07:50:03 executing program 4: socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) 07:50:04 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000010}, 0x0) setxattr$trusted_overlay_opaque(0x0, &(0x7f0000001680)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 07:50:04 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x1) 07:50:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 07:50:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x6, 0x0, 0x0) 07:50:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={r0, 0x0}, 0x20) 07:50:04 executing program 4: socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) 07:50:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fdatasync(0xffffffffffffffff) [ 285.245828][ T421] tipc: TX() has been purged, node left! [ 285.415528][ T421] tipc: TX() has been purged, node left! 07:50:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000003c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$bt_l2cap(r0, 0x0, 0x0, 0x0) 07:50:04 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x1) 07:50:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r3 = dup2(r2, r2) poll(&(0x7f00000000c0)=[{r3}], 0x1, 0x5) 07:50:04 executing program 2: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x0) 07:50:04 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_hsr\x00', 0x0}) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000001c0)) 07:50:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELRULE={0x14, 0x8, 0xa, 0x301}], {0x14}}, 0x3c}}, 0x0) 07:50:04 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000000)={0x0, 0x0, "7d44f0fcb3554b3be54fa1e43d01f8290a03741d76bfc8f185a15732457b9ab9"}) 07:50:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) write$binfmt_aout(r0, 0x0, 0xfffffd2d) 07:50:05 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x3) ioctl$TIOCNXCL(r1, 0x540d) 07:50:05 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r0, 0x29, 0x15, &(0x7f0000000000), 0x70db2da734432a8e) 07:50:05 executing program 0: r0 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) r1 = socket(0x11, 0x2, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080), 0x4) 07:50:05 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x801, 0x0) 07:50:05 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 07:50:05 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 285.976340][ T27] audit: type=1800 audit(1592293805.218:4): pid=11241 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=0 res=0 07:50:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000003c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfd53) 07:50:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x5, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 286.106980][ T27] audit: type=1800 audit(1592293805.318:5): pid=11241 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=1 res=0 07:50:05 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:50:05 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x5c695259d67f5df6) 07:50:05 executing program 3: getpid() getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="aa6ce8f5a12a1310398eb45049c1a1a5fdd484864b44e4ec0e796f48892424283ba9b3e91cad1e7cad7dfffc75d0b0827abc0c6184df17b2151022bf"], 0x8) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000500)={'veth1_vlan\x00', @broadcast}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x3) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000240)="459a247c755ef6d090406d504af1c77c3f50a089e2bc0a0274661b8f2a7029a0016862505f4761b165ec3603aec7a16157bc7c8a4f83e8f84032b48ef007dc7fc3795e8711e2b308bb2532fd639e0deb446606b662c2c948b2a088b906c8975fba7f8e0c61231ca7593e893fa1c122b9cb9a55e7e795f3b4e9", 0x79, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000380)) getpid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000200), 0x6}, 0x0, 0x100000000000003, 0x401, 0x6, 0x8000000000000000, 0x3ccd, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xe43) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) 07:50:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) waitid$P_PIDFD(0x3, r1, &(0x7f0000000100), 0x4, 0x0) 07:50:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6}, 0x8000000200036150, 0x800007b, 0x0, 0x0, 0x2401, 0x10000001, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) stat(0x0, &(0x7f0000000600)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000000c0)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYRESHEX, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000018000000000000000100", @ANYRES32], 0x68}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 07:50:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x3, 0x0, &(0x7f0000000280)) [ 286.382288][T11261] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 07:50:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1e) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x2000aab8) [ 286.433719][T11261] team0: Device ipvlan1 failed to register rx_handler [ 286.540839][T11270] NFS: Device name not specified [ 286.556939][T11274] NFS: Device name not specified 07:50:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5415, 0x0) 07:50:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000003c0)={0x2, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffb}, {0x6}]}) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400) 07:50:06 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000400)="806e554068d95910af4ef90091fe8dd82d0a1fe4033209ace443876e259f24811b3163a0c1f77d52e2885f93b344c9c28a1e4cd6b88b75dc7edf52bd7cd93636dddbe00d15bcc7d0b4b9e099a61b4503b4eea989d18c069f4e841998babb452084534c806ce3328694b7b591472d972f3fcc4bbff67d9fe447ccc86f34d3b0a8be9a4a2a8c51d2199b") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000100)={0x0}) 07:50:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000003c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) clock_gettime(0x0, &(0x7f0000000080)) 07:50:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000000c0), 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:50:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000003c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) 07:50:06 executing program 3: getpid() getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="aa6ce8f5a12a1310398eb45049c1a1a5fdd484864b44e4ec0e796f48892424283ba9b3e91cad1e7cad7dfffc75d0b0827abc0c6184df17b2151022bf"], 0x8) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000500)={'veth1_vlan\x00', @broadcast}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x3) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000240)="459a247c755ef6d090406d504af1c77c3f50a089e2bc0a0274661b8f2a7029a0016862505f4761b165ec3603aec7a16157bc7c8a4f83e8f84032b48ef007dc7fc3795e8711e2b308bb2532fd639e0deb446606b662c2c948b2a088b906c8975fba7f8e0c61231ca7593e893fa1c122b9cb9a55e7e795f3b4e9", 0x79, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000380)) getpid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000200), 0x6}, 0x0, 0x100000000000003, 0x401, 0x6, 0x8000000000000000, 0x3ccd, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xe43) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) 07:50:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@huge_within_size={'huge=within_size'}}]}) [ 287.042059][T11289] sctp: [Deprecated]: syz-executor.1 (pid 11289) Use of int in maxseg socket option. [ 287.042059][T11289] Use struct sctp_assoc_value instead [ 287.061433][T11291] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 287.090064][T11293] tmpfs: Bad value for 'huge' [ 287.099649][T11291] team0: Device ipvlan1 failed to register rx_handler 07:50:06 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 07:50:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x4b, &(0x7f0000000300)=ANY=[@ANYBLOB="a9"], 0x78) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b76795008000537287bb000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r2}}}], 0x28}}], 0x1, 0x0) [ 287.184512][T11306] sctp: [Deprecated]: syz-executor.1 (pid 11306) Use of int in maxseg socket option. [ 287.184512][T11306] Use struct sctp_assoc_value instead [ 287.215312][T11305] tmpfs: Bad value for 'huge' 07:50:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x28, 0x0, &(0x7f0000000280)) [ 287.248656][T11310] NFS: Device name not specified 07:50:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000003000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400), 0x8) 07:50:06 executing program 0: 07:50:06 executing program 5: 07:50:07 executing program 2: 07:50:07 executing program 3: 07:50:07 executing program 4: 07:50:07 executing program 1: 07:50:07 executing program 5: 07:50:07 executing program 0: 07:50:07 executing program 3: 07:50:07 executing program 1: 07:50:07 executing program 0: 07:50:07 executing program 2: 07:50:07 executing program 5: 07:50:07 executing program 4: 07:50:07 executing program 1: 07:50:07 executing program 3: 07:50:07 executing program 2: 07:50:07 executing program 0: 07:50:07 executing program 1: 07:50:07 executing program 5: 07:50:07 executing program 4: 07:50:07 executing program 3: 07:50:07 executing program 2: 07:50:07 executing program 1: 07:50:07 executing program 5: 07:50:07 executing program 0: 07:50:07 executing program 3: 07:50:07 executing program 4: 07:50:07 executing program 2: 07:50:07 executing program 0: 07:50:07 executing program 1: 07:50:07 executing program 5: 07:50:07 executing program 4: 07:50:07 executing program 3: 07:50:07 executing program 2: 07:50:08 executing program 5: 07:50:08 executing program 4: 07:50:08 executing program 1: 07:50:08 executing program 3: 07:50:08 executing program 0: 07:50:08 executing program 2: 07:50:08 executing program 5: 07:50:08 executing program 1: 07:50:08 executing program 3: 07:50:08 executing program 4: 07:50:08 executing program 0: 07:50:08 executing program 5: 07:50:08 executing program 2: 07:50:08 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000001a00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30}, 0x30) 07:50:08 executing program 4: 07:50:08 executing program 0: 07:50:08 executing program 3: 07:50:08 executing program 2: 07:50:08 executing program 5: 07:50:08 executing program 1: 07:50:08 executing program 4: 07:50:08 executing program 0: 07:50:08 executing program 3: 07:50:08 executing program 5: 07:50:08 executing program 3: 07:50:08 executing program 1: 07:50:08 executing program 2: 07:50:08 executing program 0: 07:50:08 executing program 4: 07:50:08 executing program 3: 07:50:08 executing program 1: 07:50:08 executing program 5: 07:50:08 executing program 2: 07:50:08 executing program 0: 07:50:08 executing program 4: 07:50:08 executing program 3: 07:50:08 executing program 1: 07:50:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="c00000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2b03000000000000300012800b00010067656e657665000020000280060005004e23"], 0xc0}}, 0x0) 07:50:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 07:50:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) getsockopt$sock_buf(r3, 0x1, 0x1a, 0x0, &(0x7f0000000300)) 07:50:09 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0xb4, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000001c80)=[{&(0x7f0000001780)="a45d4e26c6fadcbd663ccd6c0aca006b802c18d131b5427b3d4515dee8f10570a5923f3f543435278f94c3f8f0d4c35488ecfb1bd630b2e1e0e4247bb44938f03d603b27e44942ddcd3f11f086e6bf39ab074b690284b6d6aff6cc1e736b32f7d781c315bad312c6e8062089abe9838cd011d5227aa050589d2e5f34e10165336747bc2156f8e2570a4a76d4af1ef57edb31f57834ba2486c9f253a1737d59d15a11571414ec61c17dc20d9974e58cf2925c7c6e56216d4e35e39a9977e27e21450596008761c86e216667c6f72b64fdcad802718d16b390d4b4dc05bffb838b7e6831cc53b65b1de0bbf6af1311a722a80065913d37bea8c988e3b3f05ab1eb02d6b52a11191f1ced75b0200502e5f2881204104e152b5644da9d26301ed8905156a069c61444d44d82c135ff4f20574247a4a5cc963e3c395a029125ccae1f1564a3e28e06b1a08e47bd1a9621edf1003d167cbdfc0be2a4914908198575a688a38d24bdc9881ced9fe04e119a87b9286ea15aa168163a9650a26a926c571f2f0e0b2102de1fd1a6920cb71d846f02b2c23f80a3c0116b48d14925e69c4a65126e544995e0cb5fefaa870ddd66e8eb47a3be8f07fcd361dcf144c865fe355e3b98e6d4694d74aa6d3d75c7c568feabdcb483c5c22ca40782cd2dea789dc677c603227878c369a3b7a3204bf1bc9b1fdb1e00447152e854095b9527d6e980b1bac1b1ec6e9706084ac77b383bd4e555a11410f6a830966ec9b0fa58abf22238638ea06bad5baa2b55174b0db5108d79849c1028550fb3c713875478805f961b04f94a70dcde91c0d2ea2bcd0d2dd83b09cd6a0975db4257bf599f7d82462f914e4e641aa399ba721e72fd53d21af1f5d2a075bfd90044c562027ec840170b2d4b67adf68ed790a5ce5a49933f55c0df0b2a2ae252b5bf00b5ca0ec0005674ac62eee923cae59edeab59c1d00ca6d6f56c5ed757ce4cb67a55bcc9fb79105dbf6d0bb978631ac3bb68fc7bf0b2e88a056f10ba6174b9a511d8cd7257c82a9c66f399d5d9bda583af51f9a2dc086e1ca1a9bc7c57329d4932960b4594c94a8ef63132321531d313651616f40a0d63dc130d362f080edce63bece561f21bb9f52b5a37149757709eb8d43076f18410f0ed1166ff2d8260ec7edf321d0b08389b0be1b66863deb02d93830955688928813f1b698a87a79b865a48b59d1b28bf18db12bff87b2395f830cc705002", 0x36c}, {&(0x7f0000000080)="132419b3d35b8af26552785e69b97c1d6aa4d97ec22836c5db91d23988a3a977", 0x20}, {&(0x7f0000000300)="0ebbb218be8d3954e135df5f396071992eaf48c6be4575b2cd72c05da2dcf622ab81bfb5e04f14d17c07fe83b1e0455bfd319b6812e89ad48e9467125948fbe0fd43d11c277ad671710da0a26430c907ece20848c55cb51bd29bc11e20d0f35708eed18d4b01c01ce4e7011ca4b6766288", 0x71}, {&(0x7f0000001400)="297e4f428a5bd25fc5e181b8323b4bab1662f81f3b492c550a8c23ef6b05668596ff29a3eb3e577ba6ba7d198e818a2e35358d03aac15218c8c9abb1cc225873b8435c3cb24254ccbb69f18a633497c3918affcfb40fecf3f8683734d04c6e2cfe8996c10e579fe8e99d7b61c072c6264a9ac56240fb360adadfdb9676112b97cbbde5da4398b54453305b4edcf380f9045db6b6daa0338c24d7c3dd9df16585c59864b5cc149c7a92deb6693d95f60b3cb254807b0de39a083a5cfa572faea4c08263050199bd993d0d8eb47f82e93a4538aec3b563b0d17d370d3e70386dcfddad8514f4ad17b3ebe28210b4b7d2fbcc56caff50cd4995fdeea69e367c6dccdfa8418c7d44d14712a93130fc6976c4ad1de215d408ff32f1cd0ea5bc300151f3dd8e271214b8f5c24e445e354b7f9a78e56a48c5f5597917b586299e5ba0932a51ac4c0788e2ebf6b848d9cb7076af3d927d6b317a57e9efbe263327c77b0ce4060935129ce380eb73455b93e6680b81c56a193a346f86fec50b78469b991c3bfa20a2173a720beaf3ffcffdfe7347aceb86ade2015a5e894871ab47fc0e4489260c74d24296e5e6b56d6b1ee0deef0d00f057922790925de9fdfcbedf4675098c5e6a01285fc98d781994e973a6b284d6fcfc6d939e3336a1567bf794394c72e1874175ed197ccf9b13b4dd58a93aee31202146d9626d671ab5d9dd065181", 0x200}], 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xfff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 07:50:09 executing program 1: capget(0x0, &(0x7f0000000040)) 07:50:09 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)={0x24, r3, 0xd5bf98d0fc1ca92f, 0x0, 0x0, {{}, {}, {0xebc}}}, 0x24}}, 0x0) [ 289.836002][T11413] __nla_validate_parse: 1 callbacks suppressed [ 289.836015][T11413] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 289.874496][T11413] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 289.906844][T11413] device geneve2 entered promiscuous mode [ 289.930665][ T27] audit: type=1400 audit(1592293809.168:6): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=11415 comm="syz-executor.0" 07:50:09 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) 07:50:09 executing program 0: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) r1 = socket(0x1e, 0x4, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r1, &(0x7f00000030c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 07:50:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001040)=ANY=[@ANYBLOB="020a000007000000b6f1ffff0000854105001a"], 0x38}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x3ef, 0x0) 07:50:09 executing program 3: unshare(0x2000080) 07:50:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sysfs$1(0x1, &(0x7f00000000c0)='#\x00') 07:50:09 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 07:50:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000040)={'gre0\x00', @ifru_addrs=@sco}}) 07:50:09 executing program 0: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) r1 = socket(0x1e, 0x4, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r1, &(0x7f00000030c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 07:50:09 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000040)) 07:50:09 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0xb4, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000001c80)=[{&(0x7f0000001780)="a45d4e26c6fadcbd663ccd6c0aca006b802c18d131b5427b3d4515dee8f10570a5923f3f543435278f94c3f8f0d4c35488ecfb1bd630b2e1e0e4247bb44938f03d603b27e44942ddcd3f11f086e6bf39ab074b690284b6d6aff6cc1e736b32f7d781c315bad312c6e8062089abe9838cd011d5227aa050589d2e5f34e10165336747bc2156f8e2570a4a76d4af1ef57edb31f57834ba2486c9f253a1737d59d15a11571414ec61c17dc20d9974e58cf2925c7c6e56216d4e35e39a9977e27e21450596008761c86e216667c6f72b64fdcad802718d16b390d4b4dc05bffb838b7e6831cc53b65b1de0bbf6af1311a722a80065913d37bea8c988e3b3f05ab1eb02d6b52a11191f1ced75b0200502e5f2881204104e152b5644da9d26301ed8905156a069c61444d44d82c135ff4f20574247a4a5cc963e3c395a029125ccae1f1564a3e28e06b1a08e47bd1a9621edf1003d167cbdfc0be2a4914908198575a688a38d24bdc9881ced9fe04e119a87b9286ea15aa168163a9650a26a926c571f2f0e0b2102de1fd1a6920cb71d846f02b2c23f80a3c0116b48d14925e69c4a65126e544995e0cb5fefaa870ddd66e8eb47a3be8f07fcd361dcf144c865fe355e3b98e6d4694d74aa6d3d75c7c568feabdcb483c5c22ca40782cd2dea789dc677c603227878c369a3b7a3204bf1bc9b1fdb1e00447152e854095b9527d6e980b1bac1b1ec6e9706084ac77b383bd4e555a11410f6a830966ec9b0fa58abf22238638ea06bad5baa2b55174b0db5108d79849c1028550fb3c713875478805f961b04f94a70dcde91c0d2ea2bcd0d2dd83b09cd6a0975db4257bf599f7d82462f914e4e641aa399ba721e72fd53d21af1f5d2a075bfd90044c562027ec840170b2d4b67adf68ed790a5ce5a49933f55c0df0b2a2ae252b5bf00b5ca0ec0005674ac62eee923cae59edeab59c1d00ca6d6f56c5ed757ce4cb67a55bcc9fb79105dbf6d0bb978631ac3bb68fc7bf0b2e88a056f10ba6174b9a511d8cd7257c82a9c66f399d5d9bda583af51f9a2dc086e1ca1a9bc7c57329d4932960b4594c94a8ef63132321531d313651616f40a0d63dc130d362f080edce63bece561f21bb9f52b5a37149757709eb8d43076f18410f0ed1166ff2d8260ec7edf321d0b08389b0be1b66863deb02d93830955688928813f1b698a87a79b865a48b59d1b28bf18db12bff87b2395f830cc705002", 0x36c}, {&(0x7f0000000080)="132419b3d35b8af26552785e69b97c1d6aa4d97ec22836c5db91d23988a3a977", 0x20}, {&(0x7f0000000300)="0ebbb218be8d3954e135df5f396071992eaf48c6be4575b2cd72c05da2dcf622ab81bfb5e04f14d17c07fe83b1e0455bfd319b6812e89ad48e9467125948fbe0fd43d11c277ad671710da0a26430c907ece20848c55cb51bd29bc11e20d0f35708eed18d4b01c01ce4e7011ca4b6766288", 0x71}, {&(0x7f0000001400)="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", 0x200}], 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xfff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 07:50:09 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, 0x0, 0x479) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 07:50:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={0x0, 0xea60}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee2514903088dfd546a136d40646857b851b65a7a918c58881be75d5d71239c7698d7bdb3f879f49436bbbd87586553407860397d48842400126f8703ddc55ba4e", 0xec}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8c5", 0x2c}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d461fd8e623ef", 0x69}], 0x3}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 07:50:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x200000a, 0x400002172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) 07:50:09 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x33}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 07:50:09 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f0000000100)="c2", 0x1, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6c, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) 07:50:09 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000080)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @ramp}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r3 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r3, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 07:50:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000000), 0x0) 07:50:09 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r2, &(0x7f0000000100)="c2", 0x1, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) [ 290.707880][T11473] netlink: 44211 bytes leftover after parsing attributes in process `syz-executor.3'. 07:50:10 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x33}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 290.747285][T11473] A link change request failed with some changes committed already. Interface gre0 may have been left with an inconsistent configuration, please check. 07:50:10 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @random="32970b4fa595", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x3, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:50:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={0x0, 0xea60}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee2514903088dfd546a136d40646857b851b65a7a918c58881be75d5d71239c7698d7bdb3f879f49436bbbd87586553407860397d48842400126f8703ddc55ba4e", 0xec}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8c5", 0x2c}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d461fd8e623ef4860", 0x6b}, {&(0x7f00000014c0)="cd96bdb578810f358b2aaaf2bacafe0e46d11b73fdeffa5726afc6a69f941fc2599736bb61d60c3c812d5418a56a3ae461b9528b039a4f69e204b182765bfcff36add10caad94fd56acc52258ccc796153c7484baa5c84b6e151acc1074b87cecf8f792f3d064be5b6dc406e438b1d1386faf77a78a67dff226d1259da5fabe3f963b069886e", 0x86}], 0x4}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 07:50:10 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f00000004c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup(r0) sendto$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) [ 290.875502][T11473] netlink: 44211 bytes leftover after parsing attributes in process `syz-executor.3'. [ 290.902791][T11473] A link change request failed with some changes committed already. Interface gre0 may have been left with an inconsistent configuration, please check. [ 291.240648][T11465] ================================================================== [ 291.248804][T11465] BUG: KCSAN: data-race in pipe_double_lock / put_pipe_info [ 291.256078][T11465] [ 291.258415][T11465] write to 0xffff88809e8e7368 of 4 bytes by task 11456 on cpu 0: [ 291.266158][T11465] put_pipe_info+0x47/0xb0 [ 291.270579][T11465] pipe_release+0x150/0x1a0 [ 291.275081][T11465] __fput+0x1e9/0x500 [ 291.279064][T11465] ____fput+0x1b/0x30 [ 291.283066][T11465] task_work_run+0xba/0x120 [ 291.287595][T11465] exit_to_usermode_loop+0x2ae/0x2c0 [ 291.292912][T11465] do_syscall_64+0x38b/0x3b0 [ 291.297520][T11465] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 291.303427][T11465] [ 291.305758][T11465] read to 0xffff88809e8e7368 of 4 bytes by task 11465 on cpu 1: [ 291.313393][T11465] pipe_double_lock+0x8e/0x120 [ 291.318160][T11465] do_splice+0x216/0xc30 [ 291.322403][T11465] __x64_sys_splice+0x1fd/0x210 [ 291.327260][T11465] do_syscall_64+0xc7/0x3b0 [ 291.331799][T11465] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 291.337675][T11465] [ 291.339997][T11465] Reported by Kernel Concurrency Sanitizer on: [ 291.346174][T11465] CPU: 1 PID: 11465 Comm: syz-executor.1 Not tainted 5.7.0-rc1-syzkaller #0 [ 291.354840][T11465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.364919][T11465] ================================================================== [ 291.373002][T11465] Kernel panic - not syncing: panic_on_warn set ... [ 291.379730][T11465] CPU: 1 PID: 11465 Comm: syz-executor.1 Not tainted 5.7.0-rc1-syzkaller #0 [ 291.388396][T11465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.398477][T11465] Call Trace: [ 291.401782][T11465] dump_stack+0x11d/0x187 [ 291.406153][T11465] panic+0x210/0x640 [ 291.410093][T11465] ? vprintk_func+0x89/0x13a [ 291.414778][T11465] kcsan_report.cold+0xc/0x1a [ 291.419473][T11465] kcsan_setup_watchpoint+0x3fb/0x440 [ 291.424854][T11465] pipe_double_lock+0x8e/0x120 [ 291.429624][T11465] do_splice+0x216/0xc30 [ 291.433885][T11465] __x64_sys_splice+0x1fd/0x210 [ 291.438750][T11465] do_syscall_64+0xc7/0x3b0 [ 291.443266][T11465] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 291.449183][T11465] RIP: 0033:0x45ca59 [ 291.453084][T11465] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.472683][T11465] RSP: 002b:00007f86d60b6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 291.481100][T11465] RAX: ffffffffffffffda RBX: 00000000005084a0 RCX: 000000000045ca59 [ 291.489069][T11465] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 291.497150][T11465] RBP: 000000000078bfa0 R08: 0000000000019404 R09: 0000000000000000 [ 291.505124][T11465] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 291.513096][T11465] R13: 0000000000000bcb R14: 00000000004cec7a R15: 00007f86d60b76d4 [ 291.522178][T11465] Kernel Offset: disabled [ 291.526542][T11465] Rebooting in 86400 seconds..