Warning: Permanently added '[localhost]:23510' (ECDSA) to the list of known hosts. 2020/07/22 02:44:28 fuzzer started 2020/07/22 02:44:29 dialing manager at 10.0.2.10:46201 2020/07/22 02:44:29 syscalls: 3211 2020/07/22 02:44:29 code coverage: enabled 2020/07/22 02:44:29 comparison tracing: enabled 2020/07/22 02:44:29 extra coverage: enabled 2020/07/22 02:44:29 setuid sandbox: enabled 2020/07/22 02:44:29 namespace sandbox: enabled 2020/07/22 02:44:29 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/22 02:44:29 fault injection: enabled 2020/07/22 02:44:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/22 02:44:29 net packet injection: enabled 2020/07/22 02:44:29 net device setup: enabled 2020/07/22 02:44:29 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/22 02:44:29 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/22 02:44:29 USB emulation: enabled 02:45:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x2a, 0x4, 0x1, 0x0, r0}, 0x23) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000180), 0x0}, 0x20) 02:45:11 executing program 1: syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@map_normal='map=normal'}, {@iocharset={'iocharset', 0x3d, 'cp775'}}, {@iocharset={'iocharset', 0x3d, 'cp936'}}]}) syzkaller login: [ 170.460803][ T8418] IPVS: ftp: loaded support on port[0] = 21 [ 170.479494][ T8420] IPVS: ftp: loaded support on port[0] = 21 02:45:11 executing program 2: sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='h\x00\x00', @ANYBLOB="04002cbd7000fbdbdf25010000000000000007410000004c001800000009"], 0x68}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x85, 0x85, 0x3, [@union={0x0, 0x8, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @const, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], '\''}]}, {0x0, [0x0]}}, 0x0, 0xa3}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:45:12 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x5890, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) [ 171.361215][ T8418] chnl_net:caif_netlink_parms(): no params data found [ 171.381274][ T8422] IPVS: ftp: loaded support on port[0] = 21 [ 171.426023][ T8420] chnl_net:caif_netlink_parms(): no params data found [ 171.940314][ T8420] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.979186][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.016105][ T8420] device bridge_slave_0 entered promiscuous mode [ 172.079873][ T8418] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.121506][ T8418] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.171296][ T8418] device bridge_slave_0 entered promiscuous mode [ 172.224412][ T8420] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.267145][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.309243][ T8420] device bridge_slave_1 entered promiscuous mode [ 172.359099][ T8418] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.397386][ T8418] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.421683][ T8418] device bridge_slave_1 entered promiscuous mode [ 172.474228][ T8418] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 172.520321][ T8418] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 172.562680][ T8420] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 172.571382][ T8426] IPVS: ftp: loaded support on port[0] = 21 [ 172.635139][ T8420] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 172.700343][ T8418] team0: Port device team_slave_0 added [ 172.732659][ T8418] team0: Port device team_slave_1 added [ 172.770081][ T8420] team0: Port device team_slave_0 added [ 172.797031][ T8420] team0: Port device team_slave_1 added [ 172.844163][ T8418] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 172.862663][ T8418] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.938328][ T8418] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 172.978588][ T8418] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 173.002914][ T8418] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 173.076843][ T8418] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 173.153242][ T8420] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 173.170533][ T8420] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 173.236609][ T8420] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 173.259885][ T8420] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 173.272652][ T8420] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 173.341017][ T8420] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 173.463620][ T8418] device hsr_slave_0 entered promiscuous mode [ 173.540908][ T8418] device hsr_slave_1 entered promiscuous mode [ 173.657232][ T8422] chnl_net:caif_netlink_parms(): no params data found [ 173.789859][ T8420] device hsr_slave_0 entered promiscuous mode [ 173.877618][ T8420] device hsr_slave_1 entered promiscuous mode [ 173.967169][ T8420] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 173.987658][ T8420] Cannot create hsr debugfs directory [ 174.161556][ T8422] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.185833][ T8422] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.216979][ T8422] device bridge_slave_0 entered promiscuous mode [ 174.249215][ T8422] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.269900][ T8422] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.288789][ T8422] device bridge_slave_1 entered promiscuous mode [ 174.441240][ T8426] chnl_net:caif_netlink_parms(): no params data found [ 174.518636][ T8422] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 174.564501][ T8422] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 174.628898][ T8422] team0: Port device team_slave_0 added [ 174.662457][ T8422] team0: Port device team_slave_1 added [ 174.713600][ T8418] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 174.810983][ T8418] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 174.907447][ T8426] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.930129][ T8426] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.954790][ T8426] device bridge_slave_0 entered promiscuous mode [ 174.988409][ T8426] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.015625][ T8426] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.040489][ T8426] device bridge_slave_1 entered promiscuous mode [ 175.075572][ T8418] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 175.171138][ T8418] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 175.243206][ T8422] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 175.257163][ T8422] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 175.319021][ T8422] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 175.384589][ T8422] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 175.428043][ T8422] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 175.528537][ T8422] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 175.577619][ T8426] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 175.607050][ T8426] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 175.645048][ T8420] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 175.778925][ T8422] device hsr_slave_0 entered promiscuous mode [ 175.848604][ T8422] device hsr_slave_1 entered promiscuous mode [ 175.896471][ T8422] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 175.912406][ T8422] Cannot create hsr debugfs directory [ 175.927273][ T8420] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 176.001979][ T8420] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 176.101659][ T8426] team0: Port device team_slave_0 added [ 176.125323][ T8426] team0: Port device team_slave_1 added [ 176.163625][ T8420] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 176.263476][ T8426] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 176.290958][ T8426] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 176.391533][ T8426] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 176.433685][ T8426] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 176.457066][ T8426] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 176.541075][ T8426] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 176.681468][ T8426] device hsr_slave_0 entered promiscuous mode [ 176.756891][ T8426] device hsr_slave_1 entered promiscuous mode [ 176.826833][ T8426] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 176.854992][ T8426] Cannot create hsr debugfs directory [ 177.127758][ T8422] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 177.250260][ T8422] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 177.385481][ T8422] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 177.483009][ T8422] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 177.640186][ T8426] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 177.740269][ T8426] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 177.858957][ T8426] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 177.981391][ T8426] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 178.060990][ T8418] 8021q: adding VLAN 0 to HW filter on device bond0 [ 178.109103][ T8420] 8021q: adding VLAN 0 to HW filter on device bond0 [ 178.130961][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.152362][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.174408][ T8418] 8021q: adding VLAN 0 to HW filter on device team0 [ 178.216702][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.231246][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.248986][ T1218] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.259409][ T1218] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.278065][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 178.291073][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.312247][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.338424][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.350297][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.363832][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.376874][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.403744][ T8420] 8021q: adding VLAN 0 to HW filter on device team0 [ 178.420219][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.441912][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.469328][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.486005][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.500583][ T8445] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.512887][ T8445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.525053][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 178.542753][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 178.558884][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 178.576833][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 178.601118][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 178.630653][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.648366][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.667209][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.687603][ T3032] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.702275][ T3032] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.730020][ T8418] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 178.751508][ T8418] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 178.780443][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 178.798591][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.817183][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.838583][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 178.864365][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.894542][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.911713][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 178.943752][ T8422] 8021q: adding VLAN 0 to HW filter on device bond0 [ 178.974660][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 178.997168][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.019868][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.044705][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.069341][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 179.100975][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 179.126016][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.155297][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 179.179817][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.205301][ T8420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 179.229126][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 179.250873][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 179.277072][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 179.293490][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.323375][ T8418] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 179.351498][ T8422] 8021q: adding VLAN 0 to HW filter on device team0 [ 179.375192][ T8426] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.408638][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 179.430432][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 179.454539][ T8420] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 179.476956][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.498738][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.520111][ T1218] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.534023][ T1218] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.551757][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 179.572728][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 179.610396][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.629842][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.650146][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.673935][ T8445] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.687646][ T8445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.702207][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.727498][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 179.745515][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.762914][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.783261][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.802047][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.820650][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 179.844096][ T8426] 8021q: adding VLAN 0 to HW filter on device team0 [ 179.875914][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.902895][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.925989][ T54] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.944308][ T54] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.963258][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.987826][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.018104][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.036731][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 180.056006][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 180.084930][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 180.102012][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 180.132677][ T8418] device veth0_vlan entered promiscuous mode [ 180.157357][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.180970][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.207943][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.232351][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.261517][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 180.295903][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 180.326081][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.355638][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 180.387368][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 180.410642][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 180.444045][ T8418] device veth1_vlan entered promiscuous mode [ 180.480822][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 180.508275][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.547185][ T8426] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 180.579494][ T8426] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 180.610960][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 180.631353][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.658874][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.690384][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.711352][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.736941][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 180.751166][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.766622][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 180.781230][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.804477][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 180.821519][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 180.868179][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 180.893817][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 180.919152][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 180.949410][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 180.981049][ T8420] device veth0_vlan entered promiscuous mode [ 181.001855][ T8426] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 181.020801][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 181.048885][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 181.089759][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 181.110309][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 181.135006][ T8422] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 181.149959][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 181.168771][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 181.187563][ T8420] device veth1_vlan entered promiscuous mode [ 181.215332][ T8418] device veth0_macvtap entered promiscuous mode [ 181.247041][ T8418] device veth1_macvtap entered promiscuous mode [ 181.275672][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 181.301892][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 181.324421][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 181.343635][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 181.374064][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 181.392328][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 181.422433][ T8420] device veth0_macvtap entered promiscuous mode [ 181.443759][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 181.471894][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 181.495781][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 181.528204][ T8420] device veth1_macvtap entered promiscuous mode [ 181.554875][ T8418] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 181.583843][ T8426] device veth0_vlan entered promiscuous mode [ 181.614496][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 181.658495][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 181.720873][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.788583][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 181.853129][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 181.891429][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.912762][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.949956][ T8418] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 182.017622][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 182.068107][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.121169][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 182.175180][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 182.228642][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.282705][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.348761][ T8426] device veth1_vlan entered promiscuous mode [ 182.539772][ T8422] device veth0_vlan entered promiscuous mode [ 182.695019][ T8422] device veth1_vlan entered promiscuous mode [ 182.753683][ T8420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 182.825452][ T8420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 182.890647][ T8420] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 182.989339][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 183.020880][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 183.063656][ T8420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 183.119812][ T8420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 183.163667][ T8420] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 183.192130][ T8426] device veth0_macvtap entered promiscuous mode [ 183.204927][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 183.225761][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 183.261370][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 183.292781][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 183.323639][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 183.355255][ T8426] device veth1_macvtap entered promiscuous mode [ 183.361472][ T8418] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 183.608530][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 183.658051][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 183.715060][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 183.761536][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 183.813593][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 183.873718][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 183.937996][ T8426] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 183.963145][ T8422] device veth0_macvtap entered promiscuous mode [ 184.055755][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 184.090255][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 184.130223][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 184.163572][ T8422] device veth1_macvtap entered promiscuous mode [ 184.184720][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 184.219543][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 02:45:25 executing program 0: r0 = open(&(0x7f0000000240)='./file0\x00', 0x102e0, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') [ 184.258938][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 184.306942][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 184.359280][ T8426] batman_adv: batadv0: Interface activated: batadv_slave_1 02:45:25 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000019540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0x8, [@union={0x0, 0x8, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @enum={0x0, 0x3, 0x0, 0x6, 0x4, [{}, {}, {}]}, @const, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x2e, 0x0, 0x0, 0x0, 0x30, 0x61]}}, 0x0, 0x140}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:45:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x75, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000004680)=[{&(0x7f0000001480)="94", 0xfec6}], 0x1) [ 184.481391][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 184.513150][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 184.551001][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 184.595030][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 184.630732][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 184.691965][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 184.747618][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 184.788319][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 184.820136][ T8471] ISOFS: Unable to identify CD-ROM format. [ 184.834178][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 184.874604][ T8422] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 184.907834][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 184.932148][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 185.022898][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 185.051228][ T8471] ISOFS: Unable to identify CD-ROM format. [ 185.061201][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 185.110304][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 185.142482][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 185.175642][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 185.204932][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 185.234804][ T8422] batman_adv: batadv0: Interface activated: batadv_slave_1 02:45:26 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r1) write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/llc/core\x00') 02:45:26 executing program 1: clone(0x80200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x448, 0x260, 0x150, 0x150, 0x0, 0x0, 0x378, 0x238, 0x238, 0x378, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x1f8, 0x260, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x10001, 0x4}}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}, {{@ipv6={@private0, @private2, [], [], 'vcan0\x00', 'bond_slave_0\x00'}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@dst={{0x48, 'dst\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a8) [ 185.315249][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 02:45:26 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000019540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0xec, 0x8, [@union={0x0, 0x8, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @const, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x10c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 185.350684][ T8480] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /syz-fuzzer /syz-executor.0 proc:/self/fd/4' not defined. [ 185.369645][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 185.420430][ T8490] ptrace attach of "/syz-executor.1"[8489] was attempted by "/syz-executor.1"[8490] 02:45:27 executing program 2: syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid'}}]}) 02:45:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$instantiate(0xc, 0x0, &(0x7f00000003c0)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'cl\x00\x00r]}n\xeb\xf0\x17\xa9\x8d\xe6\x19\xc7\xb5\f3\xbe\x9a\rU\xfc\x18\xbb\x00g}9\xf7R\xa8a\xe9\xf4\xb3\xa7'}, 0x4d, 0xfffffffffffffff8) 02:45:27 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x5890, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) 02:45:27 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r1) write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/llc/core\x00') 02:45:27 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r1) write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/llc/core\x00') 02:45:27 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5}) 02:45:27 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5}) 02:45:27 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x5890, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) 02:45:27 executing program 2: io_setup(0x7, &(0x7f0000000380)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x20000005002}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) io_submit(r0, 0x3, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}, 0x0]) 02:45:27 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r1) write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/llc/core\x00') 02:45:27 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5}) 02:45:27 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5}) 02:45:27 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r1) write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) 02:45:27 executing program 1: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5}) 02:45:27 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x5890, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) 02:45:27 executing program 1: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5}) 02:45:27 executing program 2: io_setup(0x7, &(0x7f0000000380)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x20000005002}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) io_submit(r0, 0x3, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}, 0x0]) 02:45:27 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r1) write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) 02:45:27 executing program 1: ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5}) 02:45:27 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) 02:45:27 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r1) write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) 02:45:27 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) 02:45:27 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5}) 02:45:27 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r1) write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) 02:45:28 executing program 2: io_setup(0x7, &(0x7f0000000380)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x20000005002}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) io_submit(r0, 0x3, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}, 0x0]) 02:45:28 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) r4 = dup(r1) write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) 02:45:28 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5}) 02:45:28 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) 02:45:28 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r0) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0) 02:45:28 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5}) 02:45:28 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) 02:45:28 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r0) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0) 02:45:28 executing program 2: io_setup(0x7, &(0x7f0000000380)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x20000005002}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) io_submit(r0, 0x3, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}, 0x0]) 02:45:28 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) dup(r0) 02:45:28 executing program 1: openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5}) 02:45:28 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) 02:45:28 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) 02:45:28 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) dup(r0) 02:45:28 executing program 1: openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5}) 02:45:28 executing program 1: openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5}) 02:45:28 executing program 2: io_setup(0x7, &(0x7f0000000380)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x20000005002}) io_submit(r0, 0x3, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 02:45:28 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 02:45:28 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 02:45:28 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) 02:45:28 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 02:45:28 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0) 02:45:28 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) 02:45:28 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r1) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 02:45:29 executing program 2: io_setup(0x7, &(0x7f0000000380)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x3, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 02:45:29 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5}) 02:45:29 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) 02:45:29 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 02:45:29 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 02:45:29 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) 02:45:29 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 02:45:29 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) 02:45:29 executing program 2: io_setup(0x7, &(0x7f0000000380)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x3, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) [ 188.118737][ T8695] ================================================================== [ 188.122048][ T8695] BUG: KASAN: vmalloc-out-of-bounds in bitfill_aligned+0x34a/0x400 [ 188.122325][ T8695] Write of size 8 at addr ffffc90009651000 by task syz-executor.1/8695 [ 188.122329][ T8695] [ 188.122551][ T8695] CPU: 1 PID: 8695 Comm: syz-executor.1 Not tainted 5.8.0-rc6-syzkaller #0 [ 188.122558][ T8695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 188.122562][ T8695] Call Trace: [ 188.122700][ T8695] dump_stack+0x18f/0x20d [ 188.122712][ T8695] ? bitfill_aligned+0x34a/0x400 [ 188.122723][ T8695] ? bitfill_aligned+0x34a/0x400 [ 188.122742][ T8695] print_address_description.constprop.0.cold+0x5/0x436 [ 188.125240][ T8695] ? lockdep_hardirqs_off+0x66/0xa0 [ 188.125484][ T8695] ? vprintk_func+0x97/0x1a6 [ 188.125498][ T8695] ? bitfill_aligned+0x34a/0x400 [ 188.125508][ T8695] kasan_report.cold+0x1f/0x37 [ 188.125940][ T8695] ? bitfill_aligned+0x34a/0x400 [ 188.125951][ T8695] bitfill_aligned+0x34a/0x400 [ 188.126124][ T8695] sys_fillrect+0x408/0x7a0 [ 188.126134][ T8695] ? sys_fillrect+0x7a0/0x7a0 [ 188.126151][ T8695] drm_fb_helper_sys_fillrect+0x1e/0x190 [ 188.126163][ T8695] bit_clear_margins+0x2d5/0x4a0 [ 188.126173][ T8695] ? bit_bmove+0x210/0x210 [ 188.126185][ T8695] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 188.126402][ T8695] ? fb_get_color_depth+0x11a/0x240 [ 188.126415][ T8695] fbcon_clear_margins+0x1d5/0x230 [ 188.126427][ T8695] fbcon_switch+0xb6e/0x16c0 [ 188.126440][ T8695] ? fbcon_scroll+0x3600/0x3600 [ 188.126462][ T8695] ? set_origin+0x156/0x3e0 [ 188.126475][ T8695] redraw_screen+0x2ae/0x770 [ 188.126487][ T8695] ? vc_init+0x440/0x440 [ 188.126502][ T8695] fbcon_modechanged+0x575/0x710 [ 188.126513][ T8695] fbcon_update_vcs+0x3a/0x50 [ 188.126523][ T8695] fb_set_var+0xae8/0xd60 [ 188.126534][ T8695] ? fb_blank+0x190/0x190 [ 188.126542][ T8695] ? lock_release+0x8d0/0x8d0 [ 188.126554][ T8695] ? lock_is_held_type+0xb0/0xe0 [ 188.126570][ T8695] ? do_fb_ioctl+0x2f2/0x6c0 [ 188.126588][ T8695] ? _raw_spin_unlock_irqrestore+0x62/0xe0 [ 188.126597][ T8695] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 188.126606][ T8695] ? trace_hardirqs_on+0x5f/0x220 [ 188.126619][ T8695] do_fb_ioctl+0x33f/0x6c0 [ 188.126629][ T8695] ? fb_set_suspend+0x1a0/0x1a0 [ 188.126639][ T8695] ? lock_downgrade+0x820/0x820 [ 188.126649][ T8695] ? trace_hardirqs_on+0x5f/0x220 [ 188.126658][ T8695] ? lockdep_hardirqs_on+0x6a/0xe0 [ 188.126674][ T8695] ? tomoyo_path_number_perm+0x244/0x4d0 [ 188.126685][ T8695] ? tomoyo_execute_permission+0x470/0x470 [ 188.126695][ T8695] ? __might_fault+0xef/0x1d0 [ 188.126781][ T8695] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 188.126793][ T8695] ? do_vfs_ioctl+0x27d/0x1090 [ 188.126803][ T8695] ? generic_block_fiemap+0x60/0x60 [ 188.126816][ T8695] fb_compat_ioctl+0x175/0xc10 [ 188.126830][ T8695] ? fb_open+0x430/0x430 [ 188.126847][ T8695] ? __fget_files+0x294/0x400 [ 188.126862][ T8695] ? fb_open+0x430/0x430 [ 188.126872][ T8695] __do_compat_sys_ioctl+0x1d3/0x230 [ 188.126887][ T8695] do_syscall_32_irqs_on+0x3f/0x60 [ 188.126965][ T8695] do_fast_syscall_32+0x7f/0x120 [ 188.126977][ T8695] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 188.127082][ T8695] RIP: 0023:0xf7ff3569 [ 188.127082][ T8695] Code: Bad RIP value. [ 188.127082][ T8695] RSP: 002b:00000000f5dee0bc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 188.127082][ T8695] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000004601 [ 188.127082][ T8695] RDX: 0000000020000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 188.127082][ T8695] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 188.127082][ T8695] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 188.127082][ T8695] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 188.127082][ T8695] [ 188.127082][ T8695] [ 188.127082][ T8695] Memory state around the buggy address: [ 188.127082][ T8695] ffffc90009650f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 188.127082][ T8695] ffffc90009650f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 188.127082][ T8695] >ffffc90009651000: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 [ 188.127082][ T8695] ^ [ 188.127082][ T8695] ffffc90009651080: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 [ 188.127082][ T8695] ffffc90009651100: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 [ 188.127082][ T8695] ================================================================== [ 188.127082][ T8695] Disabling lock debugging due to kernel taint [ 188.174135][ T8695] Kernel panic - not syncing: panic_on_warn set ... [ 188.174148][ T8695] CPU: 1 PID: 8695 Comm: syz-executor.1 Tainted: G B 5.8.0-rc6-syzkaller #0 [ 188.174154][ T8695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 188.174228][ T8695] Call Trace: [ 188.174408][ T8695] dump_stack+0x18f/0x20d [ 188.174479][ T8695] ? bitfill_aligned+0x310/0x400 [ 188.174489][ T8695] panic+0x2e3/0x75c [ 188.174498][ T8695] ? __warn_printk+0xf3/0xf3 [ 188.174513][ T8695] ? preempt_schedule_common+0x59/0xc0 [ 188.174528][ T8695] ? bitfill_aligned+0x34a/0x400 [ 188.174538][ T8695] ? preempt_schedule_thunk+0x16/0x18 [ 188.174548][ T8695] ? trace_hardirqs_on+0x55/0x220 [ 188.174558][ T8695] ? bitfill_aligned+0x34a/0x400 [ 188.174570][ T8695] ? bitfill_aligned+0x34a/0x400 [ 188.174578][ T8695] end_report+0x4d/0x53 [ 188.174586][ T8695] kasan_report.cold+0xd/0x37 [ 188.174595][ T8695] ? bitfill_aligned+0x34a/0x400 [ 188.174610][ T8695] bitfill_aligned+0x34a/0x400 [ 188.174674][ T8695] sys_fillrect+0x408/0x7a0 [ 188.174683][ T8695] ? sys_fillrect+0x7a0/0x7a0 [ 188.174697][ T8695] drm_fb_helper_sys_fillrect+0x1e/0x190 [ 188.174747][ T8695] bit_clear_margins+0x2d5/0x4a0 [ 188.174756][ T8695] ? bit_bmove+0x210/0x210 [ 188.174773][ T8695] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 188.174784][ T8695] ? fb_get_color_depth+0x11a/0x240 [ 188.174793][ T8695] fbcon_clear_margins+0x1d5/0x230 [ 188.174869][ T8695] fbcon_switch+0xb6e/0x16c0 [ 188.174880][ T8695] ? fbcon_scroll+0x3600/0x3600 [ 188.174894][ T8695] ? set_origin+0x156/0x3e0 [ 188.174903][ T8695] redraw_screen+0x2ae/0x770 [ 188.175230][ T8695] ? vc_init+0x440/0x440 [ 188.175242][ T8695] fbcon_modechanged+0x575/0x710 [ 188.175253][ T8695] fbcon_update_vcs+0x3a/0x50 [ 188.175262][ T8695] fb_set_var+0xae8/0xd60 [ 188.175271][ T8695] ? fb_blank+0x190/0x190 [ 188.175281][ T8695] ? lock_release+0x8d0/0x8d0 [ 188.175291][ T8695] ? lock_is_held_type+0xb0/0xe0 [ 188.175303][ T8695] ? do_fb_ioctl+0x2f2/0x6c0 [ 188.175315][ T8695] ? _raw_spin_unlock_irqrestore+0x62/0xe0 [ 188.175323][ T8695] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 188.175331][ T8695] ? trace_hardirqs_on+0x5f/0x220 [ 188.175352][ T8695] do_fb_ioctl+0x33f/0x6c0 [ 188.175362][ T8695] ? fb_set_suspend+0x1a0/0x1a0 [ 188.175371][ T8695] ? lock_downgrade+0x820/0x820 [ 188.175381][ T8695] ? trace_hardirqs_on+0x5f/0x220 [ 188.175389][ T8695] ? lockdep_hardirqs_on+0x6a/0xe0 [ 188.175400][ T8695] ? tomoyo_path_number_perm+0x244/0x4d0 [ 188.175411][ T8695] ? tomoyo_execute_permission+0x470/0x470 [ 188.175419][ T8695] ? __might_fault+0xef/0x1d0 [ 188.175439][ T8695] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 188.175451][ T8695] ? do_vfs_ioctl+0x27d/0x1090 [ 188.175459][ T8695] ? generic_block_fiemap+0x60/0x60 [ 188.175469][ T8695] fb_compat_ioctl+0x175/0xc10 [ 188.175477][ T8695] ? fb_open+0x430/0x430 [ 188.175486][ T8695] ? __fget_files+0x294/0x400 [ 188.175496][ T8695] ? fb_open+0x430/0x430 [ 188.175504][ T8695] __do_compat_sys_ioctl+0x1d3/0x230 [ 188.175514][ T8695] do_syscall_32_irqs_on+0x3f/0x60 [ 188.175529][ T8695] do_fast_syscall_32+0x7f/0x120 [ 188.175540][ T8695] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 188.175547][ T8695] RIP: 0023:0xf7ff3569 [ 188.175550][ T8695] Code: Bad RIP value. [ 188.175554][ T8695] RSP: 002b:00000000f5dee0bc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 188.175563][ T8695] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000004601 [ 188.175567][ T8695] RDX: 0000000020000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 188.175572][ T8695] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 188.175576][ T8695] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 188.175580][ T8695] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 188.176423][ T8695] Kernel Offset: disabled [ 188.176423][ T8695] Rebooting in 86400 seconds..