Warning: Permanently added '[localhost]:23510' (ECDSA) to the list of known hosts.
2020/07/22 02:44:28 fuzzer started
2020/07/22 02:44:29 dialing manager at 10.0.2.10:46201
2020/07/22 02:44:29 syscalls: 3211
2020/07/22 02:44:29 code coverage: enabled
2020/07/22 02:44:29 comparison tracing: enabled
2020/07/22 02:44:29 extra coverage: enabled
2020/07/22 02:44:29 setuid sandbox: enabled
2020/07/22 02:44:29 namespace sandbox: enabled
2020/07/22 02:44:29 Android sandbox: /sys/fs/selinux/policy does not exist
2020/07/22 02:44:29 fault injection: enabled
2020/07/22 02:44:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2020/07/22 02:44:29 net packet injection: enabled
2020/07/22 02:44:29 net device setup: enabled
2020/07/22 02:44:29 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2020/07/22 02:44:29 devlink PCI setup: PCI device 0000:00:10.0 is not available
2020/07/22 02:44:29 USB emulation: enabled
02:45:10 executing program 0:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x2a, 0x4, 0x1, 0x0, r0}, 0x23)
socket(0x0, 0x0, 0x0)
getsockname$packet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000180), 0x0}, 0x20)

02:45:11 executing program 1:
syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@map_normal='map=normal'}, {@iocharset={'iocharset', 0x3d, 'cp775'}}, {@iocharset={'iocharset', 0x3d, 'cp936'}}]})

syzkaller login: [  170.460803][ T8418] IPVS: ftp: loaded support on port[0] = 21
[  170.479494][ T8420] IPVS: ftp: loaded support on port[0] = 21
02:45:11 executing program 2:
sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='h\x00\x00', @ANYBLOB="04002cbd7000fbdbdf25010000000000000007410000004c001800000009"], 0x68}}, 0x0)
clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x85, 0x85, 0x3, [@union={0x0, 0x8, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @const, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], '\''}]}, {0x0, [0x0]}}, 0x0, 0xa3}, 0x20)
process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0)
tkill(r0, 0x40)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

02:45:12 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0x5890, 0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0)

[  171.361215][ T8418] chnl_net:caif_netlink_parms(): no params data found
[  171.381274][ T8422] IPVS: ftp: loaded support on port[0] = 21
[  171.426023][ T8420] chnl_net:caif_netlink_parms(): no params data found
[  171.940314][ T8420] bridge0: port 1(bridge_slave_0) entered blocking state
[  171.979186][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state
[  172.016105][ T8420] device bridge_slave_0 entered promiscuous mode
[  172.079873][ T8418] bridge0: port 1(bridge_slave_0) entered blocking state
[  172.121506][ T8418] bridge0: port 1(bridge_slave_0) entered disabled state
[  172.171296][ T8418] device bridge_slave_0 entered promiscuous mode
[  172.224412][ T8420] bridge0: port 2(bridge_slave_1) entered blocking state
[  172.267145][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state
[  172.309243][ T8420] device bridge_slave_1 entered promiscuous mode
[  172.359099][ T8418] bridge0: port 2(bridge_slave_1) entered blocking state
[  172.397386][ T8418] bridge0: port 2(bridge_slave_1) entered disabled state
[  172.421683][ T8418] device bridge_slave_1 entered promiscuous mode
[  172.474228][ T8418] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  172.520321][ T8418] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  172.562680][ T8420] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  172.571382][ T8426] IPVS: ftp: loaded support on port[0] = 21
[  172.635139][ T8420] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  172.700343][ T8418] team0: Port device team_slave_0 added
[  172.732659][ T8418] team0: Port device team_slave_1 added
[  172.770081][ T8420] team0: Port device team_slave_0 added
[  172.797031][ T8420] team0: Port device team_slave_1 added
[  172.844163][ T8418] batman_adv: batadv0: Adding interface: batadv_slave_0
[  172.862663][ T8418] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  172.938328][ T8418] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  172.978588][ T8418] batman_adv: batadv0: Adding interface: batadv_slave_1
[  173.002914][ T8418] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  173.076843][ T8418] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  173.153242][ T8420] batman_adv: batadv0: Adding interface: batadv_slave_0
[  173.170533][ T8420] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  173.236609][ T8420] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  173.259885][ T8420] batman_adv: batadv0: Adding interface: batadv_slave_1
[  173.272652][ T8420] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  173.341017][ T8420] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  173.463620][ T8418] device hsr_slave_0 entered promiscuous mode
[  173.540908][ T8418] device hsr_slave_1 entered promiscuous mode
[  173.657232][ T8422] chnl_net:caif_netlink_parms(): no params data found
[  173.789859][ T8420] device hsr_slave_0 entered promiscuous mode
[  173.877618][ T8420] device hsr_slave_1 entered promiscuous mode
[  173.967169][ T8420] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  173.987658][ T8420] Cannot create hsr debugfs directory
[  174.161556][ T8422] bridge0: port 1(bridge_slave_0) entered blocking state
[  174.185833][ T8422] bridge0: port 1(bridge_slave_0) entered disabled state
[  174.216979][ T8422] device bridge_slave_0 entered promiscuous mode
[  174.249215][ T8422] bridge0: port 2(bridge_slave_1) entered blocking state
[  174.269900][ T8422] bridge0: port 2(bridge_slave_1) entered disabled state
[  174.288789][ T8422] device bridge_slave_1 entered promiscuous mode
[  174.441240][ T8426] chnl_net:caif_netlink_parms(): no params data found
[  174.518636][ T8422] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  174.564501][ T8422] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  174.628898][ T8422] team0: Port device team_slave_0 added
[  174.662457][ T8422] team0: Port device team_slave_1 added
[  174.713600][ T8418] netdevsim netdevsim0 netdevsim0: renamed from eth0
[  174.810983][ T8418] netdevsim netdevsim0 netdevsim1: renamed from eth1
[  174.907447][ T8426] bridge0: port 1(bridge_slave_0) entered blocking state
[  174.930129][ T8426] bridge0: port 1(bridge_slave_0) entered disabled state
[  174.954790][ T8426] device bridge_slave_0 entered promiscuous mode
[  174.988409][ T8426] bridge0: port 2(bridge_slave_1) entered blocking state
[  175.015625][ T8426] bridge0: port 2(bridge_slave_1) entered disabled state
[  175.040489][ T8426] device bridge_slave_1 entered promiscuous mode
[  175.075572][ T8418] netdevsim netdevsim0 netdevsim2: renamed from eth2
[  175.171138][ T8418] netdevsim netdevsim0 netdevsim3: renamed from eth3
[  175.243206][ T8422] batman_adv: batadv0: Adding interface: batadv_slave_0
[  175.257163][ T8422] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  175.319021][ T8422] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  175.384589][ T8422] batman_adv: batadv0: Adding interface: batadv_slave_1
[  175.428043][ T8422] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  175.528537][ T8422] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  175.577619][ T8426] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  175.607050][ T8426] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  175.645048][ T8420] netdevsim netdevsim1 netdevsim0: renamed from eth0
[  175.778925][ T8422] device hsr_slave_0 entered promiscuous mode
[  175.848604][ T8422] device hsr_slave_1 entered promiscuous mode
[  175.896471][ T8422] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  175.912406][ T8422] Cannot create hsr debugfs directory
[  175.927273][ T8420] netdevsim netdevsim1 netdevsim1: renamed from eth1
[  176.001979][ T8420] netdevsim netdevsim1 netdevsim2: renamed from eth2
[  176.101659][ T8426] team0: Port device team_slave_0 added
[  176.125323][ T8426] team0: Port device team_slave_1 added
[  176.163625][ T8420] netdevsim netdevsim1 netdevsim3: renamed from eth3
[  176.263476][ T8426] batman_adv: batadv0: Adding interface: batadv_slave_0
[  176.290958][ T8426] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  176.391533][ T8426] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  176.433685][ T8426] batman_adv: batadv0: Adding interface: batadv_slave_1
[  176.457066][ T8426] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  176.541075][ T8426] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  176.681468][ T8426] device hsr_slave_0 entered promiscuous mode
[  176.756891][ T8426] device hsr_slave_1 entered promiscuous mode
[  176.826833][ T8426] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  176.854992][ T8426] Cannot create hsr debugfs directory
[  177.127758][ T8422] netdevsim netdevsim2 netdevsim0: renamed from eth0
[  177.250260][ T8422] netdevsim netdevsim2 netdevsim1: renamed from eth1
[  177.385481][ T8422] netdevsim netdevsim2 netdevsim2: renamed from eth2
[  177.483009][ T8422] netdevsim netdevsim2 netdevsim3: renamed from eth3
[  177.640186][ T8426] netdevsim netdevsim3 netdevsim0: renamed from eth0
[  177.740269][ T8426] netdevsim netdevsim3 netdevsim1: renamed from eth1
[  177.858957][ T8426] netdevsim netdevsim3 netdevsim2: renamed from eth2
[  177.981391][ T8426] netdevsim netdevsim3 netdevsim3: renamed from eth3
[  178.060990][ T8418] 8021q: adding VLAN 0 to HW filter on device bond0
[  178.109103][ T8420] 8021q: adding VLAN 0 to HW filter on device bond0
[  178.130961][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  178.152362][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  178.174408][ T8418] 8021q: adding VLAN 0 to HW filter on device team0
[  178.216702][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  178.231246][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  178.248986][ T1218] bridge0: port 1(bridge_slave_0) entered blocking state
[  178.259409][ T1218] bridge0: port 1(bridge_slave_0) entered forwarding state
[  178.278065][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  178.291073][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  178.312247][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  178.338424][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  178.350297][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  178.363832][   T23] bridge0: port 2(bridge_slave_1) entered blocking state
[  178.376874][   T23] bridge0: port 2(bridge_slave_1) entered forwarding state
[  178.403744][ T8420] 8021q: adding VLAN 0 to HW filter on device team0
[  178.420219][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  178.441912][   T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  178.469328][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  178.486005][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  178.500583][ T8445] bridge0: port 1(bridge_slave_0) entered blocking state
[  178.512887][ T8445] bridge0: port 1(bridge_slave_0) entered forwarding state
[  178.525053][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  178.542753][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  178.558884][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  178.576833][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  178.601118][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  178.630653][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  178.648366][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  178.667209][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  178.687603][ T3032] bridge0: port 2(bridge_slave_1) entered blocking state
[  178.702275][ T3032] bridge0: port 2(bridge_slave_1) entered forwarding state
[  178.730020][ T8418] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  178.751508][ T8418] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  178.780443][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  178.798591][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  178.817183][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  178.838583][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  178.864365][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  178.894542][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  178.911713][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  178.943752][ T8422] 8021q: adding VLAN 0 to HW filter on device bond0
[  178.974660][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  178.997168][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  179.019868][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  179.044705][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  179.069341][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  179.100975][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  179.126016][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  179.155297][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  179.179817][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  179.205301][ T8420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  179.229126][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  179.250873][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  179.277072][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  179.293490][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  179.323375][ T8418] 8021q: adding VLAN 0 to HW filter on device batadv0
[  179.351498][ T8422] 8021q: adding VLAN 0 to HW filter on device team0
[  179.375192][ T8426] 8021q: adding VLAN 0 to HW filter on device bond0
[  179.408638][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  179.430432][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  179.454539][ T8420] 8021q: adding VLAN 0 to HW filter on device batadv0
[  179.476956][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  179.498738][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  179.520111][ T1218] bridge0: port 1(bridge_slave_0) entered blocking state
[  179.534023][ T1218] bridge0: port 1(bridge_slave_0) entered forwarding state
[  179.551757][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  179.572728][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  179.610396][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  179.629842][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  179.650146][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  179.673935][ T8445] bridge0: port 2(bridge_slave_1) entered blocking state
[  179.687646][ T8445] bridge0: port 2(bridge_slave_1) entered forwarding state
[  179.702207][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  179.727498][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  179.745515][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  179.762914][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  179.783261][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  179.802047][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  179.820650][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  179.844096][ T8426] 8021q: adding VLAN 0 to HW filter on device team0
[  179.875914][   T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  179.902895][   T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  179.925989][   T54] bridge0: port 1(bridge_slave_0) entered blocking state
[  179.944308][   T54] bridge0: port 1(bridge_slave_0) entered forwarding state
[  179.963258][   T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  179.987826][   T54] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  180.018104][   T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  180.036731][   T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  180.056006][   T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  180.084930][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  180.102012][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  180.132677][ T8418] device veth0_vlan entered promiscuous mode
[  180.157357][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  180.180970][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  180.207943][   T28] bridge0: port 2(bridge_slave_1) entered blocking state
[  180.232351][   T28] bridge0: port 2(bridge_slave_1) entered forwarding state
[  180.261517][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  180.295903][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  180.326081][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  180.355638][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  180.387368][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  180.410642][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  180.444045][ T8418] device veth1_vlan entered promiscuous mode
[  180.480822][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  180.508275][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  180.547185][ T8426] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  180.579494][ T8426] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  180.610960][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  180.631353][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  180.658874][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  180.690384][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  180.711352][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  180.736941][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  180.751166][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  180.766622][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  180.781230][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  180.804477][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  180.821519][ T1218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  180.868179][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  180.893817][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  180.919152][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  180.949410][   T13] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  180.981049][ T8420] device veth0_vlan entered promiscuous mode
[  181.001855][ T8426] 8021q: adding VLAN 0 to HW filter on device batadv0
[  181.020801][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  181.048885][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  181.089759][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  181.110309][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  181.135006][ T8422] 8021q: adding VLAN 0 to HW filter on device batadv0
[  181.149959][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  181.168771][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  181.187563][ T8420] device veth1_vlan entered promiscuous mode
[  181.215332][ T8418] device veth0_macvtap entered promiscuous mode
[  181.247041][ T8418] device veth1_macvtap entered promiscuous mode
[  181.275672][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  181.301892][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  181.324421][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  181.343635][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  181.374064][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  181.392328][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  181.422433][ T8420] device veth0_macvtap entered promiscuous mode
[  181.443759][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  181.471894][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  181.495781][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  181.528204][ T8420] device veth1_macvtap entered promiscuous mode
[  181.554875][ T8418] batman_adv: batadv0: Interface activated: batadv_slave_0
[  181.583843][ T8426] device veth0_vlan entered promiscuous mode
[  181.614496][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  181.658495][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  181.720873][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  181.788583][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  181.853129][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  181.891429][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  181.912762][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  181.949956][ T8418] batman_adv: batadv0: Interface activated: batadv_slave_1
[  182.017622][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  182.068107][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  182.121169][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  182.175180][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  182.228642][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  182.282705][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  182.348761][ T8426] device veth1_vlan entered promiscuous mode
[  182.539772][ T8422] device veth0_vlan entered promiscuous mode
[  182.695019][ T8422] device veth1_vlan entered promiscuous mode
[  182.753683][ T8420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  182.825452][ T8420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  182.890647][ T8420] batman_adv: batadv0: Interface activated: batadv_slave_0
[  182.989339][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  183.020880][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  183.063656][ T8420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  183.119812][ T8420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  183.163667][ T8420] batman_adv: batadv0: Interface activated: batadv_slave_1
[  183.192130][ T8426] device veth0_macvtap entered promiscuous mode
[  183.204927][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  183.225761][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  183.261370][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  183.292781][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  183.323639][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  183.355255][ T8426] device veth1_macvtap entered promiscuous mode
[  183.361472][ T8418] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation
[  183.608530][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  183.658051][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  183.715060][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  183.761536][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  183.813593][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  183.873718][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  183.937996][ T8426] batman_adv: batadv0: Interface activated: batadv_slave_0
[  183.963145][ T8422] device veth0_macvtap entered promiscuous mode
[  184.055755][   T54] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  184.090255][   T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  184.130223][   T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  184.163572][ T8422] device veth1_macvtap entered promiscuous mode
[  184.184720][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  184.219543][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
02:45:25 executing program 0:
r0 = open(&(0x7f0000000240)='./file0\x00', 0x102e0, 0x0)
fcntl$setsig(r0, 0xa, 0x11)
fcntl$setlease(r0, 0x400, 0x0)
timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0)
timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000040)=<r1=>0x0)
timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0)
truncate(&(0x7f0000000100)='./file0\x00', 0x0)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')

[  184.258938][ T8426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  184.306942][ T8426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  184.359280][ T8426] batman_adv: batadv0: Interface activated: batadv_slave_1
02:45:25 executing program 0:
clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000019540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0x8, [@union={0x0, 0x8, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @enum={0x0, 0x3, 0x0, 0x6, 0x4, [{}, {}, {}]}, @const, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x2e, 0x0, 0x0, 0x0, 0x30, 0x61]}}, 0x0, 0x140}, 0x20)
process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0)
tkill(r0, 0x40)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

02:45:25 executing program 0:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0)
perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x75, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x5, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
r3 = fcntl$dupfd(r1, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
writev(r0, &(0x7f0000004680)=[{&(0x7f0000001480)="94", 0xfec6}], 0x1)

[  184.481391][   T54] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  184.513150][   T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  184.551001][   T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  184.595030][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  184.630732][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  184.691965][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  184.747618][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  184.788319][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  184.820136][ T8471] ISOFS: Unable to identify CD-ROM format.
[  184.834178][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  184.874604][ T8422] batman_adv: batadv0: Interface activated: batadv_slave_0
[  184.907834][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  184.932148][   T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  185.022898][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  185.051228][ T8471] ISOFS: Unable to identify CD-ROM format.
[  185.061201][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  185.110304][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  185.142482][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  185.175642][ T8422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  185.204932][ T8422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  185.234804][ T8422] batman_adv: batadv0: Interface activated: batadv_slave_1
02:45:26 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={<r2=>0xffffffffffffffff})
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)
r4 = dup(r1)
write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000))
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f0000000180)='net/llc/core\x00')

02:45:26 executing program 1:
clone(0x80200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x3c1, 0x3, 0x448, 0x260, 0x150, 0x150, 0x0, 0x0, 0x378, 0x238, 0x238, 0x378, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x1f8, 0x260, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x10001, 0x4}}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}, {{@ipv6={@private0, @private2, [], [], 'vcan0\x00', 'bond_slave_0\x00'}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@dst={{0x48, 'dst\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a8)

[  185.315249][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
02:45:26 executing program 1:
clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000019540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0xec, 0x8, [@union={0x0, 0x8, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @const, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x10c}, 0x20)
process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0)
tkill(r0, 0x40)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  185.350684][ T8480] ERROR: Domain '<kernel> /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /syz-fuzzer /syz-executor.0 proc:/self/fd/4' not defined.
[  185.369645][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  185.420430][ T8490] ptrace attach of "/syz-executor.1"[8489] was attempted by "/syz-executor.1"[8490]
02:45:27 executing program 2:
syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid'}}]})

02:45:27 executing program 1:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
keyctl$instantiate(0xc, 0x0, &(0x7f00000003c0)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'cl\x00\x00r]}n\xeb\xf0\x17\xa9\x8d\xe6\x19\xc7\xb5\f3\xbe\x9a\rU\xfc\x18\xbb\x00g}9\xf7R\xa8a\xe9\xf4\xb3\xa7'}, 0x4d, 0xfffffffffffffff8)

02:45:27 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0x5890, 0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0)

02:45:27 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={<r2=>0xffffffffffffffff})
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)
r4 = dup(r1)
write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000))
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f0000000180)='net/llc/core\x00')

02:45:27 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={<r2=>0xffffffffffffffff})
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)
r4 = dup(r1)
write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000))
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f0000000180)='net/llc/core\x00')

02:45:27 executing program 1:
r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0)
ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5})

02:45:27 executing program 1:
r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0)
ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5})

02:45:27 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0x5890, 0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0)

02:45:27 executing program 2:
io_setup(0x7, &(0x7f0000000380)=<r0=>0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x20000005002})
r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
io_submit(r0, 0x3, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}, 0x0])

02:45:27 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={<r2=>0xffffffffffffffff})
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)
r4 = dup(r1)
write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000))
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f0000000180)='net/llc/core\x00')

02:45:27 executing program 1:
r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0)
ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5})

02:45:27 executing program 1:
r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0)
ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5})

02:45:27 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={<r2=>0xffffffffffffffff})
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)
r4 = dup(r1)
write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000))
prctl$PR_SET_DUMPABLE(0x4, 0x0)

02:45:27 executing program 1:
ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5})

02:45:27 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0x5890, 0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0)

02:45:27 executing program 1:
ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5})

02:45:27 executing program 2:
io_setup(0x7, &(0x7f0000000380)=<r0=>0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x20000005002})
r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
io_submit(r0, 0x3, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}, 0x0])

02:45:27 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={<r2=>0xffffffffffffffff})
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)
r4 = dup(r1)
write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000))

02:45:27 executing program 1:
ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5})

02:45:27 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0)

02:45:27 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={<r2=>0xffffffffffffffff})
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)
r4 = dup(r1)
write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000))

02:45:27 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0)

02:45:27 executing program 1:
r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5})

02:45:27 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={<r2=>0xffffffffffffffff})
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)
r4 = dup(r1)
write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0)

02:45:28 executing program 2:
io_setup(0x7, &(0x7f0000000380)=<r0=>0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x20000005002})
r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
io_submit(r0, 0x3, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}, 0x0])

02:45:28 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r1 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r1, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={<r2=>0xffffffffffffffff})
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)
r4 = dup(r1)
write$P9_RGETATTR(r4, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0)

02:45:28 executing program 1:
r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5})

02:45:28 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0)

02:45:28 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={<r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)
r3 = dup(r0)
write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0)

02:45:28 executing program 1:
r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5})

02:45:28 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0)

02:45:28 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={<r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)
r3 = dup(r0)
write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc}}, 0xa0)

02:45:28 executing program 2:
io_setup(0x7, &(0x7f0000000380)=<r0=>0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x20000005002})
r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
io_submit(r0, 0x3, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}, 0x0])

02:45:28 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={<r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)
dup(r0)

02:45:28 executing program 1:
openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0)
ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5})

02:45:28 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
dup(r0)
mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0)

02:45:28 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080))
mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0)

02:45:28 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={<r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)
dup(r0)

02:45:28 executing program 1:
openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0)
ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5})

02:45:28 executing program 1:
openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0)
ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5})

02:45:28 executing program 2:
io_setup(0x7, &(0x7f0000000380)=<r0=>0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x20000005002})
io_submit(r0, 0x3, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0])

02:45:28 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={<r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)

02:45:28 executing program 1:
r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0)
ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0)

02:45:28 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0)

02:45:28 executing program 1:
r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0)
ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0)

02:45:28 executing program 1:
r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0)
ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, 0x0)

02:45:28 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0)

02:45:28 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840)={<r1=>0xffffffffffffffff})
fcntl$dupfd(r1, 0x0, r1)
execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)

02:45:29 executing program 2:
io_setup(0x7, &(0x7f0000000380)=<r0=>0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
io_submit(r0, 0x3, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0])

02:45:29 executing program 1:
r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0)
ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x5})

02:45:29 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0)

02:45:29 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840))
execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)

02:45:29 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001840))
execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)

02:45:29 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0)

02:45:29 executing program 0:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0)
r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x7f\xc9\xe9\x0e\xff\x8b\xe8\xd0\xb8\x80\xc7\xf5\xe2Z\x03\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb\xf1^\xe8\xf8\xc1-9Q\x00\x04\x00\x00\x8b[\xaa\x91\xef\x7f@\xd2z\xb3T\x9e\xefn7%E\x00(\x1e\xd1P\x0f\x9f\xca\xff\xcf\xc9c\x97\xb3\x81\xa04\x03\x1b\xf5\xce\xfa\xdc\xf6\xf2\'\x83\x82\"#K\x02eU\xae\xd4P\xc0iH\xf2g\xc9}\xf4I\xb0}\x9er#y\x0e\xcb\xa3\x80\xb5q\x1c\xef0\xbd\x87\xe8\x8e\x88\xe6^\xdc\f\x1e\xd0\x97\xce\xdc\x13\xce\x8a\xb3\b\xee\xd8I\xbck\xec\x80\xfa\xce\x86\x85\"\x1d\xa2\xc2\x1d\xf0\xc3\x9cm\xcf\x8a\x00\x00\x00\xe31\xe6\xc3\xa5\xb1\x1c\r8%\x06\xc3c\xe0\x7f\x88W\x18u\xdcbl\xe5(\x97c\x1a\xfd\xe0\xfa\xc0\x97\xc8\x95\x82u\x82e\xf3\xe7e\xf59\xf9S2\xd1\x98\x81\x8f\xbfwr\x97\xee\a\x8a \x1c%o\xed\x9e\x11\xd1', 0x0)
write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c4602000000000000000000060003003e000039a594249c0fd82feb9cf20000000000000000dfeb7bba00281293bd5d74dafc20380003"], 0x3c)
execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000)

02:45:29 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0)

02:45:29 executing program 2:
io_setup(0x7, &(0x7f0000000380)=<r0=>0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
io_submit(r0, 0x3, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0])

[  188.118737][ T8695] ==================================================================
[  188.122048][ T8695] BUG: KASAN: vmalloc-out-of-bounds in bitfill_aligned+0x34a/0x400
[  188.122325][ T8695] Write of size 8 at addr ffffc90009651000 by task syz-executor.1/8695
[  188.122329][ T8695] 
[  188.122551][ T8695] CPU: 1 PID: 8695 Comm: syz-executor.1 Not tainted 5.8.0-rc6-syzkaller #0
[  188.122558][ T8695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014
[  188.122562][ T8695] Call Trace:
[  188.122700][ T8695]  dump_stack+0x18f/0x20d
[  188.122712][ T8695]  ? bitfill_aligned+0x34a/0x400
[  188.122723][ T8695]  ? bitfill_aligned+0x34a/0x400
[  188.122742][ T8695]  print_address_description.constprop.0.cold+0x5/0x436
[  188.125240][ T8695]  ? lockdep_hardirqs_off+0x66/0xa0
[  188.125484][ T8695]  ? vprintk_func+0x97/0x1a6
[  188.125498][ T8695]  ? bitfill_aligned+0x34a/0x400
[  188.125508][ T8695]  kasan_report.cold+0x1f/0x37
[  188.125940][ T8695]  ? bitfill_aligned+0x34a/0x400
[  188.125951][ T8695]  bitfill_aligned+0x34a/0x400
[  188.126124][ T8695]  sys_fillrect+0x408/0x7a0
[  188.126134][ T8695]  ? sys_fillrect+0x7a0/0x7a0
[  188.126151][ T8695]  drm_fb_helper_sys_fillrect+0x1e/0x190
[  188.126163][ T8695]  bit_clear_margins+0x2d5/0x4a0
[  188.126173][ T8695]  ? bit_bmove+0x210/0x210
[  188.126185][ T8695]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[  188.126402][ T8695]  ? fb_get_color_depth+0x11a/0x240
[  188.126415][ T8695]  fbcon_clear_margins+0x1d5/0x230
[  188.126427][ T8695]  fbcon_switch+0xb6e/0x16c0
[  188.126440][ T8695]  ? fbcon_scroll+0x3600/0x3600
[  188.126462][ T8695]  ? set_origin+0x156/0x3e0
[  188.126475][ T8695]  redraw_screen+0x2ae/0x770
[  188.126487][ T8695]  ? vc_init+0x440/0x440
[  188.126502][ T8695]  fbcon_modechanged+0x575/0x710
[  188.126513][ T8695]  fbcon_update_vcs+0x3a/0x50
[  188.126523][ T8695]  fb_set_var+0xae8/0xd60
[  188.126534][ T8695]  ? fb_blank+0x190/0x190
[  188.126542][ T8695]  ? lock_release+0x8d0/0x8d0
[  188.126554][ T8695]  ? lock_is_held_type+0xb0/0xe0
[  188.126570][ T8695]  ? do_fb_ioctl+0x2f2/0x6c0
[  188.126588][ T8695]  ? _raw_spin_unlock_irqrestore+0x62/0xe0
[  188.126597][ T8695]  ? lockdep_hardirqs_on_prepare+0x3a2/0x590
[  188.126606][ T8695]  ? trace_hardirqs_on+0x5f/0x220
[  188.126619][ T8695]  do_fb_ioctl+0x33f/0x6c0
[  188.126629][ T8695]  ? fb_set_suspend+0x1a0/0x1a0
[  188.126639][ T8695]  ? lock_downgrade+0x820/0x820
[  188.126649][ T8695]  ? trace_hardirqs_on+0x5f/0x220
[  188.126658][ T8695]  ? lockdep_hardirqs_on+0x6a/0xe0
[  188.126674][ T8695]  ? tomoyo_path_number_perm+0x244/0x4d0
[  188.126685][ T8695]  ? tomoyo_execute_permission+0x470/0x470
[  188.126695][ T8695]  ? __might_fault+0xef/0x1d0
[  188.126781][ T8695]  ? __sanitizer_cov_trace_switch+0x45/0x70
[  188.126793][ T8695]  ? do_vfs_ioctl+0x27d/0x1090
[  188.126803][ T8695]  ? generic_block_fiemap+0x60/0x60
[  188.126816][ T8695]  fb_compat_ioctl+0x175/0xc10
[  188.126830][ T8695]  ? fb_open+0x430/0x430
[  188.126847][ T8695]  ? __fget_files+0x294/0x400
[  188.126862][ T8695]  ? fb_open+0x430/0x430
[  188.126872][ T8695]  __do_compat_sys_ioctl+0x1d3/0x230
[  188.126887][ T8695]  do_syscall_32_irqs_on+0x3f/0x60
[  188.126965][ T8695]  do_fast_syscall_32+0x7f/0x120
[  188.126977][ T8695]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  188.127082][ T8695] RIP: 0023:0xf7ff3569
[  188.127082][ T8695] Code: Bad RIP value.
[  188.127082][ T8695] RSP: 002b:00000000f5dee0bc EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  188.127082][ T8695] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000004601
[  188.127082][ T8695] RDX: 0000000020000000 RSI: 0000000000000000 RDI: 0000000000000000
[  188.127082][ T8695] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  188.127082][ T8695] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  188.127082][ T8695] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  188.127082][ T8695] 
[  188.127082][ T8695] 
[  188.127082][ T8695] Memory state around the buggy address:
[  188.127082][ T8695]  ffffc90009650f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.127082][ T8695]  ffffc90009650f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  188.127082][ T8695] >ffffc90009651000: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
[  188.127082][ T8695]                    ^
[  188.127082][ T8695]  ffffc90009651080: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
[  188.127082][ T8695]  ffffc90009651100: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
[  188.127082][ T8695] ==================================================================
[  188.127082][ T8695] Disabling lock debugging due to kernel taint
[  188.174135][ T8695] Kernel panic - not syncing: panic_on_warn set ...
[  188.174148][ T8695] CPU: 1 PID: 8695 Comm: syz-executor.1 Tainted: G    B             5.8.0-rc6-syzkaller #0
[  188.174154][ T8695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014
[  188.174228][ T8695] Call Trace:
[  188.174408][ T8695]  dump_stack+0x18f/0x20d
[  188.174479][ T8695]  ? bitfill_aligned+0x310/0x400
[  188.174489][ T8695]  panic+0x2e3/0x75c
[  188.174498][ T8695]  ? __warn_printk+0xf3/0xf3
[  188.174513][ T8695]  ? preempt_schedule_common+0x59/0xc0
[  188.174528][ T8695]  ? bitfill_aligned+0x34a/0x400
[  188.174538][ T8695]  ? preempt_schedule_thunk+0x16/0x18
[  188.174548][ T8695]  ? trace_hardirqs_on+0x55/0x220
[  188.174558][ T8695]  ? bitfill_aligned+0x34a/0x400
[  188.174570][ T8695]  ? bitfill_aligned+0x34a/0x400
[  188.174578][ T8695]  end_report+0x4d/0x53
[  188.174586][ T8695]  kasan_report.cold+0xd/0x37
[  188.174595][ T8695]  ? bitfill_aligned+0x34a/0x400
[  188.174610][ T8695]  bitfill_aligned+0x34a/0x400
[  188.174674][ T8695]  sys_fillrect+0x408/0x7a0
[  188.174683][ T8695]  ? sys_fillrect+0x7a0/0x7a0
[  188.174697][ T8695]  drm_fb_helper_sys_fillrect+0x1e/0x190
[  188.174747][ T8695]  bit_clear_margins+0x2d5/0x4a0
[  188.174756][ T8695]  ? bit_bmove+0x210/0x210
[  188.174773][ T8695]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[  188.174784][ T8695]  ? fb_get_color_depth+0x11a/0x240
[  188.174793][ T8695]  fbcon_clear_margins+0x1d5/0x230
[  188.174869][ T8695]  fbcon_switch+0xb6e/0x16c0
[  188.174880][ T8695]  ? fbcon_scroll+0x3600/0x3600
[  188.174894][ T8695]  ? set_origin+0x156/0x3e0
[  188.174903][ T8695]  redraw_screen+0x2ae/0x770
[  188.175230][ T8695]  ? vc_init+0x440/0x440
[  188.175242][ T8695]  fbcon_modechanged+0x575/0x710
[  188.175253][ T8695]  fbcon_update_vcs+0x3a/0x50
[  188.175262][ T8695]  fb_set_var+0xae8/0xd60
[  188.175271][ T8695]  ? fb_blank+0x190/0x190
[  188.175281][ T8695]  ? lock_release+0x8d0/0x8d0
[  188.175291][ T8695]  ? lock_is_held_type+0xb0/0xe0
[  188.175303][ T8695]  ? do_fb_ioctl+0x2f2/0x6c0
[  188.175315][ T8695]  ? _raw_spin_unlock_irqrestore+0x62/0xe0
[  188.175323][ T8695]  ? lockdep_hardirqs_on_prepare+0x3a2/0x590
[  188.175331][ T8695]  ? trace_hardirqs_on+0x5f/0x220
[  188.175352][ T8695]  do_fb_ioctl+0x33f/0x6c0
[  188.175362][ T8695]  ? fb_set_suspend+0x1a0/0x1a0
[  188.175371][ T8695]  ? lock_downgrade+0x820/0x820
[  188.175381][ T8695]  ? trace_hardirqs_on+0x5f/0x220
[  188.175389][ T8695]  ? lockdep_hardirqs_on+0x6a/0xe0
[  188.175400][ T8695]  ? tomoyo_path_number_perm+0x244/0x4d0
[  188.175411][ T8695]  ? tomoyo_execute_permission+0x470/0x470
[  188.175419][ T8695]  ? __might_fault+0xef/0x1d0
[  188.175439][ T8695]  ? __sanitizer_cov_trace_switch+0x45/0x70
[  188.175451][ T8695]  ? do_vfs_ioctl+0x27d/0x1090
[  188.175459][ T8695]  ? generic_block_fiemap+0x60/0x60
[  188.175469][ T8695]  fb_compat_ioctl+0x175/0xc10
[  188.175477][ T8695]  ? fb_open+0x430/0x430
[  188.175486][ T8695]  ? __fget_files+0x294/0x400
[  188.175496][ T8695]  ? fb_open+0x430/0x430
[  188.175504][ T8695]  __do_compat_sys_ioctl+0x1d3/0x230
[  188.175514][ T8695]  do_syscall_32_irqs_on+0x3f/0x60
[  188.175529][ T8695]  do_fast_syscall_32+0x7f/0x120
[  188.175540][ T8695]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  188.175547][ T8695] RIP: 0023:0xf7ff3569
[  188.175550][ T8695] Code: Bad RIP value.
[  188.175554][ T8695] RSP: 002b:00000000f5dee0bc EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  188.175563][ T8695] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000004601
[  188.175567][ T8695] RDX: 0000000020000000 RSI: 0000000000000000 RDI: 0000000000000000
[  188.175572][ T8695] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  188.175576][ T8695] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  188.175580][ T8695] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  188.176423][ T8695] Kernel Offset: disabled
[  188.176423][ T8695] Rebooting in 86400 seconds..