[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 33.697710][ T26] audit: type=1800 audit(1571925556.694:25): pid=7084 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 33.733031][ T26] audit: type=1800 audit(1571925556.694:26): pid=7084 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 33.773579][ T26] audit: type=1800 audit(1571925556.694:27): pid=7084 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.122' (ECDSA) to the list of known hosts. 2019/10/24 13:59:27 fuzzer started 2019/10/24 13:59:27 dialing manager at 10.128.0.105:42135 2019/10/24 13:59:27 syscalls: 2524 2019/10/24 13:59:27 code coverage: enabled 2019/10/24 13:59:27 comparison tracing: enabled 2019/10/24 13:59:27 extra coverage: extra coverage is not supported by the kernel 2019/10/24 13:59:27 setuid sandbox: enabled 2019/10/24 13:59:27 namespace sandbox: enabled 2019/10/24 13:59:27 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/24 13:59:27 fault injection: enabled 2019/10/24 13:59:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/24 13:59:27 net packet injection: enabled 2019/10/24 13:59:27 net device setup: enabled 2019/10/24 13:59:27 concurrency sanitizer: enabled syzkaller login: [ 47.849135][ T7254] KCSAN: could not find function: 'poll_schedule_timeout' 2019/10/24 13:59:46 adding functions to KCSAN blacklist: 'mod_timer' 'shmem_getpage_gfp' 'kvm_arch_vcpu_load' 'ep_poll' 'tcp_poll' 'find_get_pages_range_tag' 'rcu_gp_fqs_check_wake' 'tick_sched_do_timer' 'kernfs_refresh_inode' 'snapshot_refaults' 'task_dump_owner' 'xas_find_marked' 'add_timer_on' 'ktime_get_seconds' 'get_task_cred' 'add_timer' 'poll_schedule_timeout' 'run_timer_softirq' 'ext4_mb_good_group' 'ext4_has_free_clusters' 'timer_clear_idle' 'snd_seq_timer_get_cur_tick' 'generic_write_end' 'sk_wait_data' 'install_new_memslots' 'mem_cgroup_select_victim_node' 'filemap_map_pages' 'tomoyo_supervisor' 'wbt_issue' 'blk_mq_get_request' 'rcu_gp_fqs_loop' 'list_lru_count_one' 'pipe_wait' 'find_next_bit' '__splice_from_pipe' '__skb_try_recv_from_queue' 'copy_process' 'do_exit' 'udp6_lib_lookup2' '__tcp_select_window' 'process_srcu' '__mark_inode_dirty' 'blk_mq_run_hw_queue' 'osq_lock' 'p9_poll_workfn' 'wq_watchdog_reset_touched' 'pcpu_alloc' 'ext4_nonda_switch' 'bio_endio' 'tick_nohz_idle_stop_tick' 'balance_dirty_pages' 'sit_tunnel_xmit' 'ext4_writepages' 'unix_release_sock' '__alloc_file' 'ext4_free_inodes_count' 'shmem_file_read_iter' 'ext4_mark_iloc_dirty' '__hrtimer_run_queues' 'generic_permission' '__nf_ct_refresh_acct' 'ext4_da_write_end' 'icmp_global_allow' 'd_delete' 'pipe_poll' 'l2tp_tunnel_del_work' 'do_syslog' 'iput' 'vm_area_dup' '__ext4_new_inode' 'generic_fillattr' 'mm_update_next_owner' '__perf_event_overflow' 'fsnotify' 'page_counter_try_charge' 'do_nanosleep' 'blk_mq_sched_dispatch_requests' 'dd_has_work' 'padata_find_next' 'ktime_get_real_seconds' 'taskstats_exit' '__snd_rawmidi_transmit_ack' 'do_readlinkat' 'pid_update_inode' 'blk_mq_dispatch_rq_list' 'atime_needs_update' '__dev_queue_xmit' 'tick_do_update_jiffies64' 'tcp_add_backlog' 'ext4_free_inode' 'update_defense_level' 'ipip_tunnel_xmit' '__filemap_fdatawrite_range' 'vti_tunnel_xmit' 14:03:41 executing program 0: r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) 14:03:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="a48b12f728db4b2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2ce90ccb15322e20000007c0e3ca8adbf7e4a2d74a75d00008489ef41b4ef4a6566a55fd4caa8d6c0dee265ea2121b173c73f15984fdd5bd24e99b71a8d7f2c45641455ffc3001e29106fa8cd40e6b02b7dcd2809fe1e135ab17b1fbdf7c2a5fae9acc79f793d07a3a4c1e6544bb07d9d1438733ca9997fb677a0b480f808e1251c0fbac0790ad0cf944599b4b23297e30e613b957bbd0449255697029ec9408003da0c2aca5285838440c370fa8bb7a79b52fe624a56c32051", 0xdd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 298.495124][ T7258] IPVS: ftp: loaded support on port[0] = 21 [ 298.622825][ T7258] chnl_net:caif_netlink_parms(): no params data found [ 298.700812][ T7258] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.707921][ T7258] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.716099][ T7258] device bridge_slave_0 entered promiscuous mode [ 298.724570][ T7258] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.731850][ T7258] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.740882][ T7258] device bridge_slave_1 entered promiscuous mode [ 298.764013][ T7258] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 298.767852][ T7261] IPVS: ftp: loaded support on port[0] = 21 [ 298.774586][ T7258] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:03:41 executing program 2: r0 = socket(0x18, 0x1, 0x0) close(r0) r1 = socket(0x18, 0x2, 0x0) setsockopt(r1, 0x1000000000029, 0x9, &(0x7f0000000180)="01000000", 0x4) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)="071400000f370025ff", 0x9) connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = dup2(r0, r2) writev(r3, &(0x7f00000015c0)=[{&(0x7f00000001c0)="67435352b313edc8c25af2165027799b314d7ef2904777b7a345393c79afbca545e5093b25a8a0def7a920bb1152971c4e0ddd2f65a4c89fa35299780cdf734ad154d4abc1ce88046c83a1fa4e269dc2ccf3a95876e070c8467609951a6d6265e10261493fdb", 0x66}, {&(0x7f0000000240)="3e5535de3132e2ffd84d6149dda4b6d113682628f7576131b95b07f2416d65d3e7a19d0a4c50a98e3d11653507525a13ccf40082a2aeaed90fb129aa4e6bb50ef493bf59a5c1a36e61189998791ec2539613629174c78b7bde09d6b0db75b7f93dcd48c0867402f7584c291179a429666f89a712dc0bbbf16cbf250699a8d0d9904e5bd2ae13a1ca566cb5a56a51d67c2e53dd2fc715924b5fb3241b3cabc92f4597850c8a363fbb43f3597b28ece4eb09d14840e43d5c4510841888ca20406a3853ccc271dd83078f8c7586", 0xcc}, {&(0x7f0000000340)="0d76bb0100356d2d6d0aef771cdcccb0c513f6699b9a7ceea4bfaf913788b0fc5dc98e37f6bac287384f33a4822b69528e6043b52d552ad99a37315cece46716cf9b4ff443769532dbe7f922244449ff1f34c237c39e254a162aab0d73462b47835cbf417cefdc6ef8a808365cb2535078dfd55295f729dbe22f42600be64bd3e6f9a07ecc", 0x85}, {&(0x7f0000000080)="e937d1a4a8d2e6980e3cd84d76f754daa51e3834da6a6d53476bc8ed035dc401c6bddf621418f3a8", 0x28}, {&(0x7f0000000400)="f4a43e3db6d4aa50990017669d2685ad4f4f326b8b21e1c15ba4cb964962d1fbbfc9cd85df5d31c484bea59263aaa8d4b46887481d9341950bfbe25b60d7e465ec650e3b0dd95e8395724d410ac033dd39f9c5793dcdcf5ff11c4724d2e46cf66108ed0d3657c7fc371a78887bf73f3ea29be400e331f81263a52550725750dfde5e7056f4d5b741c4ebf9e20d98c79dbc64e9fa70bea37256058dc25e", 0x9d}, {&(0x7f0000000500)="6046db92e440b9175fc6ede4ed52b9adce1736e8f69febd56cdbfb4a98cb25560d681ab2a961a1007e17cc7b9ac68175f0bff75d0bdd4478813b27cf17113c2f7fafffadc20136991b814c89b7ab76620044cd598594", 0x56}, {&(0x7f0000000140)="7647cf403ae909d23a5306533fd822156a677206743c8c209653ed16c586d4fae76bcd7491ba4406f411d6", 0x2b}, {&(0x7f0000000580)="7b59d5c28eeadf76338c33915800bd6607755f345c8ba177f1953adc8a3f75e06aa7859f0cc2cf618c78c871c92d799883892e1a1d1b9b0e8e", 0x39}, {&(0x7f00000005c0)="6744933984055c6e1da000374a25281e8058960aeb1874c641b7c18ec44a2dd224bc2725528d8b91093b7b29991fc29ccc9c0459d0ca8e0c3a4d46eb945f2e426d01ff4b19f8cd2912d0d57bf15795b409ffef3030343b939da9014822496993258db54f7d0df48cf8a861595c4dc82ba1ebf8954683a9801f09fa0a37a245e9d1f7420fa16565a33e9fb3613072f5453289a9fb58bd60cb4ca8ec6dae269e691870b03f0e9971a18f539dfa2a86c216c2fefb470e7fc8beb7ebe6498e2217c02ecf4508e6dfe1323fb46d323811d2b73abf10bfdd232cbb5a9c26b8c3a984876cfe1ff59be2dfcd87a4f76965f5f2ffdd50fc55437fc07847544e6d5530b705279dd8c93284a194b844a0495ddee252998826549528d0f2b88071fcf714f3aefddd895b8ea9bd062aeb6096422cd276efb7febd314d6fe6f2e11fe115fe2dfea9a5fa88ee4217cf17fa8023258d25a87f3ad15f3c3640f1fcf63cccddfa45a3eb60c6eb684bacc30f94e83febbe2d6a775686c8b2223245fe50f84038bbbd1f1f76a23959317d8c8eb7d098c69c8c405a909ab566a6f32802fe8f0ac2774e87297243c05a1faa44b99e629a3cc55d8760b85b86acea95bb3a5a78f30892a074bf24a0fcc6254b43587e6c5b394d1a75cb0c14be892207b04a51f09cb1e7107f793bf5a9da5f6fb573061389b90877de0d00ff4520112aae0dc28d013c9f49f8531d281f6baee7327fbc90da8dec83a41bec24acc319f06f0849fee44f52efb82c86c1a1ae6beb5edc97f6a5882aa54caeba4391d0eedd1a92cb63512b7d095cb565986964b6ed7ca9c242ab59dd70f72c233e7e121c5d35eab3090fd30c9b8cec1274566498a45e92fd2e87f20618c5fc816ab203dc11ee7ad122ad89189051279e7bd8563eb43c807a799160fa588abb24cf7304e83eb7d9d4a365f7f5defa4259dbb4ae33d006f8d87a8061582b578718a274f495b348eebae684e3a65982151607d893a0768e639bb4d541d0be4160b8bae68070a56b4c5388a3fe7f37eb6c0e1bb524efc54650feb2210fa62c420923364e673b2abb5e5f73c1b058728f4ebd400dde91b3b901aabcb887feb50cf74f65369e336c9f1e65051ffca5acb27461f40a8ca44c2f23767c36f6210a29783d469fc5db2645fb0350ba4e0db2114aceafde73b0bb65be8a35c8471d7de6acb2badbe9242f35d0f72f98dc10e3979404ec7002b4b115798bfc67edb55f34141367097f358b5cdf04f9259be5b415a285dcf95bc1e23bdada6765da5c8f7f09255cac26c625a61da05b8e908ef90230b6adbeb51bb855b25af8c8f31c9d5d3414b918eaee24ccfd35a4577aa6fb16b74e040abfa159c3ddd6f9d1431010d0d89bdeb9fbc6e674de5cdcec91fff0deb803f11418fdfc34221dec4f408bbf917c07c4815c1817c744df0974985e2e56b44ce4916e127fe35ac0f9b0870de0d248a943ecf7744ded147a9ec44b28737531984c2b5bea76c51d8ac13e6c171a78be88207e2d9355978014132e1e06a184656ee721fe3490994b0e8d0ac3c5ebbf124913d0ef9d5fc9274b8c72689016d104d5d12689d057aef160d2bd8560b5ff84b9b1b08af223b95f77704cb9dd6e", 0x47f}], 0x9) [ 298.821674][ T7258] team0: Port device team_slave_0 added [ 298.841302][ T7258] team0: Port device team_slave_1 added [ 298.951244][ T7258] device hsr_slave_0 entered promiscuous mode [ 298.998764][ T7258] device hsr_slave_1 entered promiscuous mode [ 299.065680][ T7263] IPVS: ftp: loaded support on port[0] = 21 [ 299.078899][ T7258] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.085958][ T7258] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.093410][ T7258] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.100483][ T7258] bridge0: port 1(bridge_slave_0) entered forwarding state 14:03:42 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000010010000010000000175100c7722ecc84be68287a558be7700000000000000f41b25e406d58937e7e899e0524843c9577f89f71ebddf077798b47ab4a76907477a209522adca7e5454b7dec9d9a67305c04a8ccffca56ccbcabfb25cc94628348a24593c5dbdf200796a8fd217367c017f76f131c8693ac43b77471be914707d2c3545b812f7f58f436706f17b26aebac8e1ae913379902436610c52b724993141a5cb7a0a9c3dca0a16787a4d0c82e2d9829219e3d981d196f1b7256c49aacd6b000000002150a4058a8e4347e13f94be6d87fc7ecdafb88b1a5cde17a53552e6797c056103b8d9e4eac3f0076580f6e76aec101fc935e5c25fac970f73d3fe7d1f036c1e5b40464269b3a1071a96f3d5fdf7a8e7b907d236e91a85b6e2a13b6b5eb5b800000000"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x10002, 0x0) [ 299.154327][ T7261] chnl_net:caif_netlink_parms(): no params data found [ 299.219388][ T7258] 8021q: adding VLAN 0 to HW filter on device bond0 [ 299.257069][ T7261] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.278213][ T7261] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.286250][ T7261] device bridge_slave_0 entered promiscuous mode [ 299.309502][ T7261] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.316562][ T7261] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.339041][ T7261] device bridge_slave_1 entered promiscuous mode [ 299.395770][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 299.406527][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.425271][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.435017][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 299.475258][ T7258] 8021q: adding VLAN 0 to HW filter on device team0 [ 299.506134][ T7267] IPVS: ftp: loaded support on port[0] = 21 [ 299.514042][ T7261] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 299.530290][ T7261] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:03:42 executing program 4: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000400)) clock_adjtime(0x0, &(0x7f00000001c0)) [ 299.585749][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 299.594409][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.601483][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.629258][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 299.637816][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.644886][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.679442][ T7261] team0: Port device team_slave_0 added [ 299.708981][ T7263] chnl_net:caif_netlink_parms(): no params data found [ 299.736479][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 299.761246][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 299.770711][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 299.789912][ T7261] team0: Port device team_slave_1 added [ 299.806073][ T7258] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 299.818093][ T7258] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 299.849565][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 299.857826][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 299.870166][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 14:03:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x290727e6435bb571, 0x2}, 0x10}}, 0x0) [ 299.961413][ T7261] device hsr_slave_0 entered promiscuous mode [ 300.000805][ T7261] device hsr_slave_1 entered promiscuous mode [ 300.048236][ T7261] debugfs: Directory 'hsr0' with parent '/' already present! [ 300.069004][ T7263] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.076174][ T7263] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.084220][ T7263] device bridge_slave_0 entered promiscuous mode [ 300.092200][ T7263] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.099344][ T7263] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.107206][ T7263] device bridge_slave_1 entered promiscuous mode [ 300.136053][ T7263] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 300.147211][ T7258] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 300.164272][ T7275] IPVS: ftp: loaded support on port[0] = 21 [ 300.177852][ T7273] IPVS: ftp: loaded support on port[0] = 21 [ 300.186257][ T7263] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 300.229313][ T7263] team0: Port device team_slave_0 added [ 300.236981][ T7263] team0: Port device team_slave_1 added [ 300.307755][ T7267] chnl_net:caif_netlink_parms(): no params data found [ 300.363795][ T7263] device hsr_slave_0 entered promiscuous mode [ 300.438741][ T7263] device hsr_slave_1 entered promiscuous mode [ 300.498326][ T7263] debugfs: Directory 'hsr0' with parent '/' already present! [ 300.587228][ T7261] 8021q: adding VLAN 0 to HW filter on device bond0 [ 300.623825][ T7263] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.630967][ T7263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.638306][ T7263] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.645339][ T7263] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.676084][ T7261] 8021q: adding VLAN 0 to HW filter on device team0 [ 300.677256][ T7283] overlayfs: conflicting lowerdir path [ 300.693979][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.704215][ T7284] overlayfs: conflicting lowerdir path [ 300.710809][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.721624][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 300.730127][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.739328][ T7267] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.746369][ T7267] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.754499][ T7267] device bridge_slave_0 entered promiscuous mode 14:03:43 executing program 0: r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) [ 300.790900][ T7267] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.809199][ T7267] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.817442][ T7267] device bridge_slave_1 entered promiscuous mode [ 300.864828][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 300.876899][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.886223][ T3006] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.893339][ T3006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.906768][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 300.917446][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 300.922956][ T7289] overlayfs: conflicting lowerdir path [ 300.929931][ T3006] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.938334][ T3006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.950029][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 300.959789][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 301.010361][ T7267] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 301.038244][ T7261] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 14:03:44 executing program 0: mlockall(0x2) shmctl$SHM_LOCK(0x0, 0xb) shmat(0x0, &(0x7f000000a000/0x4000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) [ 301.051854][ T7261] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 301.072897][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 301.089418][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 301.101915][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 301.111251][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 301.129509][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 301.144730][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 301.153490][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 14:03:44 executing program 0: semtimedop(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="448a84011be2ff00c43119312172705e4e555c400d7b08d97609f6bb12f77af38867fe3402ab6398f77bae47a662c45557b687ff89183ba7b5129db001000000ce7f8f5976639555e3b3707d22b9bf7297ccb8b1965f6ef7a26381d3e7806fe022bf9a116e67444ec80cd3"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 301.165505][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 301.174396][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.186637][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 301.195846][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 301.240579][ T7267] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 301.306253][ T7263] 8021q: adding VLAN 0 to HW filter on device bond0 [ 301.323920][ T7261] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 301.338600][ T7275] chnl_net:caif_netlink_parms(): no params data found [ 301.351268][ T7267] team0: Port device team_slave_0 added [ 301.366916][ T7263] 8021q: adding VLAN 0 to HW filter on device team0 [ 301.386672][ T7267] team0: Port device team_slave_1 added [ 301.402339][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 301.419115][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.427043][ T7273] chnl_net:caif_netlink_parms(): no params data found [ 301.461901][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 301.481073][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.500817][ T3006] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.508006][ T3006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.526452][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 301.535359][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.544687][ T3006] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.551762][ T3006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.560907][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 301.571752][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 301.581238][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 301.590843][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 301.600283][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 301.609583][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 301.610351][ T7297] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 301.619147][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 301.643171][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.655693][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 301.664802][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.683073][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 301.724833][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 301.814279][ T7267] device hsr_slave_0 entered promiscuous mode [ 301.858707][ T7267] device hsr_slave_1 entered promiscuous mode [ 301.908210][ T7267] debugfs: Directory 'hsr0' with parent '/' already present! [ 301.936571][ T7263] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 301.946281][ T7275] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.956822][ T7275] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.969318][ T7275] device bridge_slave_0 entered promiscuous mode [ 301.976998][ T7275] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.984552][ T7275] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.993005][ T7275] device bridge_slave_1 entered promiscuous mode [ 302.064400][ T7273] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.092789][ T7273] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.109678][ T7273] device bridge_slave_0 entered promiscuous mode [ 302.150411][ T7275] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 302.176491][ T7273] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.185243][ T7273] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.193808][ T7273] device bridge_slave_1 entered promiscuous mode [ 302.220161][ T7275] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 302.285589][ T7267] 8021q: adding VLAN 0 to HW filter on device bond0 14:03:45 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)={0x8, 0x0, [{0x0, 0xc9, &(0x7f0000000280)=""/201}, {0x0, 0x1000, &(0x7f0000000580)=""/4096}, {0x0, 0x2b, &(0x7f0000000380)=""/43}, {0x5801, 0x5b, &(0x7f00000003c0)=""/91}, {0x10000, 0x92, &(0x7f0000000440)=""/146}, {0x100000, 0xb1, &(0x7f0000001580)=""/177}, {0xf000, 0xed, &(0x7f0000001640)=""/237}, {0x10000, 0x1, &(0x7f0000000500)=""/1}]}) [ 302.327106][ T7273] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 302.352415][ T7273] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 302.377438][ T7275] team0: Port device team_slave_0 added [ 302.420208][ T7275] team0: Port device team_slave_1 added [ 302.427804][ T7273] team0: Port device team_slave_0 added [ 302.440716][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 302.449637][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 302.459666][ T7267] 8021q: adding VLAN 0 to HW filter on device team0 [ 302.482368][ T7273] team0: Port device team_slave_1 added [ 302.497525][ T7272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 302.519219][ T7272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 302.528950][ T7272] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.536054][ T7272] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.555964][ T7267] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 302.566820][ T7267] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 14:03:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@fat=@flush='flush'}]}) [ 302.622644][ T7275] device hsr_slave_0 entered promiscuous mode [ 302.668928][ T7328] FAT-fs (loop2): bogus number of reserved sectors [ 302.671968][ T7275] device hsr_slave_1 entered promiscuous mode [ 302.675562][ T7328] FAT-fs (loop2): Can't find a valid FAT filesystem 14:03:45 executing program 0: semtimedop(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="448a84011be2ff00c43119312172705e4e555c400d7b08d97609f6bb12f77af38867fe3402ab6398f77bae47a662c45557b687ff89183ba7b5129db001000000ce7f8f5976639555e3b3707d22b9bf7297ccb8b1965f6ef7a26381d3e7806fe022bf9a116e67444ec80cd3"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 302.730686][ T7275] debugfs: Directory 'hsr0' with parent '/' already present! [ 302.760738][ T7328] FAT-fs (loop2): bogus number of reserved sectors [ 302.768783][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 302.784866][ T7328] FAT-fs (loop2): Can't find a valid FAT filesystem [ 302.796170][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 302.806788][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.824724][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.831840][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.847415][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 302.869726][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 302.879454][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 14:03:45 executing program 2: clone(0x0, 0x0, 0x0, 0x0, 0x0) execve(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f00000002c0)=""/11, 0xb) r2 = dup2(r0, r0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)) open$dir(0x0, 0x0, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) [ 302.915037][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 302.937310][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 302.946739][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 302.957422][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 302.966140][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 302.980792][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 302.999117][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 303.013911][ T7267] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 303.091516][ T7273] device hsr_slave_0 entered promiscuous mode [ 303.129138][ T7273] device hsr_slave_1 entered promiscuous mode [ 303.168245][ T7273] debugfs: Directory 'hsr0' with parent '/' already present! [ 303.184179][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 303.196362][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 303.297634][ T7275] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.342907][ T7275] 8021q: adding VLAN 0 to HW filter on device team0 [ 303.363086][ T7273] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.372300][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 303.385512][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.415865][ T7273] 8021q: adding VLAN 0 to HW filter on device team0 [ 303.445298][ T7272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.467250][ T7272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.477706][ T7272] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.484801][ T7272] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.493338][ T7272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.502473][ T7272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.511359][ T7272] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.518464][ T7272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.534922][ T7272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 303.568487][ T7272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 303.576843][ T7272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.592094][ T7272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 303.627347][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 303.640151][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 303.659255][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 303.674621][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.696141][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.710295][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.717471][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.728658][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 303.737890][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 303.747747][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.762203][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.773569][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.780701][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.795852][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 303.804955][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 303.820522][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 303.830004][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 303.841254][ T7275] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 303.853357][ T7275] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 303.873021][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 303.884044][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 303.893017][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 303.902893][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 303.912256][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 303.921416][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 303.944420][ T7273] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 303.968192][ T7273] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 303.987116][ T7275] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 303.995425][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 304.004616][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 304.024042][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 304.044726][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.057576][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.066819][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.081315][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.101970][ T7273] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 304.109980][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 14:03:48 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in=@remote, 0x4d3, 0x6c}, 0x0, @in6=@mcast1, 0x0, 0x0, 0x0, 0x2}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 14:03:48 executing program 2: clone(0x0, 0x0, 0x0, 0x0, 0x0) execve(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f00000002c0)=""/11, 0xb) r2 = dup2(r0, r0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)) open$dir(0x0, 0x0, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) 14:03:48 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) execve(&(0x7f0000000280)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) open$dir(&(0x7f0000000340)='./file0\x00', 0x841, 0x0) clone(0x3102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r2, 0x5404, 0x0) 14:03:48 executing program 0: semtimedop(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="448a84011be2ff00c43119312172705e4e555c400d7b08d97609f6bb12f77af38867fe3402ab6398f77bae47a662c45557b687ff89183ba7b5129db001000000ce7f8f5976639555e3b3707d22b9bf7297ccb8b1965f6ef7a26381d3e7806fe022bf9a116e67444ec80cd3"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 14:03:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSETATTR(r1, 0x0, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 14:03:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x7, 0x209e20, 0x8000000001}, 0x414) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77f7fb, 0x0, 0x82e700, 0x0, 0x0, [0xffffffffa0018000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x2c) 14:03:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) 14:03:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSETATTR(r1, 0x0, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 14:03:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x6, 0xffffffff}) 14:03:48 executing program 2: clone(0xffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2, 0x74}, &(0x7f0000000800)='])+\xe4\x00\x19I0z\xf9\xdc~\xb0\xba\r\x9f\xf1q\xe5\x19\xa3\xf4R\xf6yae+\xa1\xbc\x1dqP\xcd|\xbf(\xe0L\x87\xbf\xc26\xaa\xf2Hb\xa7\xae\xd7\xb9\xfb\xf1+\xea\xd6\xfa\xf9\xc4}\xb6\x14{\x91\x86B\xbc\x91\x9d:\xedx\x1fIK B\xd8@\xe7\xa9\xc8\xdd)\x91.\x83\xbfo\xa0\a\xb5&\xfd\xb5W\x8f\xfeN\xeaH\xf8\xc3%<\x7f\xdc\xa9\xa6Uua\xaf\xc6L\xbd\xbfz@z\x84`\x8e\xa4\x1b\x82\xb0\x99Oe\xde\v\xd3\xadg\x96\xf0g\v\x8f_\x94\xda\xbd\xf9\x80\xb4\xd0C\xdd<\x96\xea\x98\x7f\xb3', 0x0) close(0xffffffffffffffff) 14:03:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 14:03:48 executing program 1: 14:03:49 executing program 3: 14:03:49 executing program 5: 14:03:49 executing program 4: 14:03:49 executing program 0: 14:03:49 executing program 3: 14:03:49 executing program 1: 14:03:49 executing program 2: 14:03:49 executing program 4: 14:03:49 executing program 5: 14:03:49 executing program 3: 14:03:49 executing program 2: 14:03:49 executing program 5: semtimedop(0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="448a84011be2ff00c43119312172705e4e555c400d7b08d97609f6bb"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:03:49 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000140)) 14:03:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) 14:03:50 executing program 0: shmctl$SHM_LOCK(0x0, 0xb) shmat(0x0, &(0x7f000000a000/0x4000)=nil, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) [ 307.151235][ C0] hrtimer: interrupt took 29239 ns 14:03:50 executing program 2: r0 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) flistxattr(r0, 0x0, 0x0) 14:03:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003000000c763bf000079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bfbd9a2d7a0ec8c06b51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b02cda6d3ae0359817c5ad0ff74ed7d8973841c157945f7ea2aeba908227b92e995eceb6039d7a81bc3efc82e30d345cbc9a14e11dca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76edbeb16e3e4fd678792d290e73cc1b159b8f5b611918c1f53a483c1cf0554189f553a670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ef3c64b249ddeff68"], 0x3c) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r3 = gettid() tkill(r3, 0x10010000000032) 14:03:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xfdad}], 0x1, 0xfebfffff) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, 0x0, 0x0, 0x0) 14:03:50 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'dummy0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="03"]}) [ 307.508061][ T7504] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.3 proc:/self/fd/6' not defined. 14:03:50 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x2, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, @local, @dev}, "000088beffff0000"}}}}}, 0x0) 14:03:50 executing program 2: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000001540)=0x1ff) 14:03:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xfdad}], 0x1, 0xfebfffff) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x60001) 14:03:51 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000001200)={0x0, 0x1, 0x0, 0x0}) 14:03:51 executing program 5: semtimedop(0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="448a84011be2ff00c43119312172705e4e555c400d7b08d97609f6bb"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:03:51 executing program 2: r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000040)}, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x7000000, 0x80fe}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0x0) 14:03:51 executing program 3: semtimedop(0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="448a84011be2ff00c43119312172705e4e555c400d7b08d97609f6bb"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 308.519733][ T7608] md: invalid raid superblock magic on ram0 [ 308.549954][ T7608] md: ram0 does not have a valid v0.0 superblock, not importing! [ 308.608405][ T7608] md: md_import_device returned -22 [ 308.627566][ T7615] md: invalid raid superblock magic on ram0 [ 308.661740][ T7615] md: ram0 does not have a valid v0.0 superblock, not importing! [ 308.679722][ T7615] md: md_import_device returned -22 14:03:51 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x12}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x2000000000003, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000080)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xd8\xed\xa9\xac\x03v\xe4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\xb1\x00\x00\x00\x00\x00\x00\x00\xc8\x92b\"\xe0\x844\xb3\x9fj\xaaJ\x9c$i&') 14:03:51 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000001200)={0x0, 0x1, 0x0, 0x0}) 14:03:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xfdad}], 0x1, 0xfebfffff) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, 0x0, 0x0, 0x0) [ 309.043438][ T7626] md: invalid raid superblock magic on ram0 [ 309.087861][ T7626] md: ram0 does not have a valid v0.0 superblock, not importing! [ 309.117731][ T7626] md: md_import_device returned -22 14:03:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xfdad}], 0x1, 0xfebfffff) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, 0x0, 0x0, 0x0) 14:03:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xfdad}], 0x1, 0xfebfffff) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, 0x0, 0x0, 0x0) 14:03:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0xffffff43) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x4]}, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) close(0xffffffffffffffff) r5 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x5, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x5, 0x10000, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x9, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_config_ext={0x8ab, 0x5}, 0x24800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x667a}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x801c581f, 0x20000000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f00000000c0)='memory'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r5, 0xffffffffffffffff, 0x0, 0xc, &(0x7f00000000c0)='cgroup.stat\x00'}, 0x30) write$cgroup_int(r2, 0x0, 0x0) 14:03:52 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)}, 0x20) 14:03:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xfdad}], 0x1, 0xfebfffff) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x60001) 14:03:52 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.cpu_exclusive\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000003c0), 0x12) 14:03:52 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) 14:03:52 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in=@remote, 0x4d3, 0x6c}, 0x0, @in6=@mcast1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) [ 310.042566][ T7647] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 310.096497][ T7647] CPU: 1 PID: 7647 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 310.104362][ T7647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.114444][ T7647] Call Trace: [ 310.117836][ T7647] dump_stack+0xf5/0x159 [ 310.122189][ T7647] dump_header+0xaa/0x449 [ 310.126561][ T7647] oom_kill_process.cold+0x10/0x15 [ 310.131717][ T7647] out_of_memory+0x231/0xa00 [ 310.136332][ T7647] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 310.142015][ T7647] mem_cgroup_out_of_memory+0x128/0x150 [ 310.147602][ T7647] try_charge+0xb3a/0xbc0 [ 310.151965][ T7647] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 310.157633][ T7647] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 310.163408][ T7647] ? __tsan_read8+0x2c/0x30 [ 310.167979][ T7647] mem_cgroup_charge_skmem+0xd5/0x190 [ 310.173394][ T7647] __sk_mem_raise_allocated+0x32d/0x9f0 [ 310.179057][ T7647] ? sctp_sched_fcfs_init_sid+0x17/0x20 [ 310.184693][ T7647] __sk_mem_schedule+0x7a/0xd0 [ 310.189571][ T7647] sctp_sendmsg_to_asoc+0xe38/0x11c0 [ 310.194961][ T7647] ? sctp_assoc_add_peer+0x15d/0x7f0 [ 310.200360][ T7647] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 310.206013][ T7647] ? __tsan_read8+0x2c/0x30 [ 310.210594][ T7647] sctp_sendmsg+0xbdf/0x14e0 [ 310.215235][ T7647] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 310.220987][ T7647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.227353][ T7647] inet_sendmsg+0x6d/0x90 [ 310.231726][ T7647] ? inet_send_prepare+0x200/0x200 [ 310.231763][ T7647] sock_sendmsg+0x9f/0xc0 14:03:53 executing program 3: clone(0xffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2, 0x74}, &(0x7f0000000800)='])+\xe4\x00\x19I0z\xf9\xdc~\xb0\xba\r\x9f\xf1q\xe5\x19\xa3\xf4R\xf6yae+\xa1\xbc\x1dqP\xcd|\xbf(\xe0L\x87\xbf\xc26\xaa\xf2Hb\xa7\xae\xd7\xb9\xfb\xf1+\xea\xd6\xfa\xf9\xc4}\xb6\x14{\x91\x86B\xbc\x91\x9d:\xedx\x1fIK B\xd8@\xe7\xa9\xc8\xdd)\x91.\x83\xbfo\xa0\a\xb5&\xfd\xb5W\x8f\xfeN\xeaH\xf8\xc3%<\x7f\xdc\xa9\xa6Uua\xaf\xc6L\xbd\xbfz@z\x84`\x8e\xa4\x1b\x82\xb0\x99Oe\xde\v\xd3\xadg\x96\xf0g\v\x8f_\x94\xda\xbd\xf9\x80\xb4\xd0C\xdd<\x96\xea\x98\x7f\xb3', 0x0) close(0xffffffffffffffff) 14:03:53 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) [ 310.231799][ T7647] ___sys_sendmsg+0x59d/0x5d0 [ 310.231842][ T7647] ? __sanitizer_cov_trace_switch+0x49/0x80 14:03:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f000074fffc), 0x348) [ 310.231877][ T7647] ? __fget+0xb8/0x1d0 [ 310.231961][ T7647] ? __tsan_write4+0x32/0x40 [ 310.232001][ T7647] __sys_sendmsg+0xa0/0x160 14:03:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r3 = dup(r2) getpeername$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000080)=0x6e) [ 310.232095][ T7647] __x64_sys_sendmsg+0x51/0x70 14:03:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="b4", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000040)='\'', 0x1, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32, @ANYRESOCT, @ANYRESHEX, @ANYBLOB="0327c18c5b6053fd509def7d1c586cea2fc4535f6da60591bcdd51d24a6ef792487bf1def539eeb4098b951468dec6898662dc424045", @ANYRESOCT, @ANYRESDEC, @ANYPTR]], 0x3f5) sendto$inet(r0, &(0x7f00000012c0)='2', 0x1, 0x20008011, 0x0, 0x0) [ 310.232133][ T7647] do_syscall_64+0xcc/0x370 14:03:53 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x6, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000280)) [ 310.232169][ T7647] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 310.232190][ T7647] RIP: 0033:0x459ef9 [ 310.232241][ T7647] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.232257][ T7647] RSP: 002b:00007f9b61387c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 310.232284][ T7647] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459ef9 14:03:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0xffffff43) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x4]}, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) close(0xffffffffffffffff) r5 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x5, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x5, 0x10000, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x9, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_config_ext={0x8ab, 0x5}, 0x24800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x667a}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x801c581f, 0x20000000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f00000000c0)='memory'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r5, 0xffffffffffffffff, 0x0, 0xc, &(0x7f00000000c0)='cgroup.stat\x00'}, 0x30) write$cgroup_int(r2, 0x0, 0x0) 14:03:54 executing program 1: [ 310.232301][ T7647] RDX: 000000000000fec0 RSI: 0000000020000240 RDI: 0000000000000007 [ 310.232327][ T7647] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 310.232345][ T7647] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b613886d4 [ 310.232362][ T7647] R13: 00000000004c8189 R14: 00000000004de178 R15: 00000000ffffffff [ 310.411390][ T7647] memory: usage 2688kB, limit 0kB, failcnt 9 [ 310.411408][ T7647] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 310.411415][ T7647] Memory cgroup stats for /syz4: [ 310.411719][ T7647] anon 2158592 [ 310.411719][ T7647] file 0 [ 310.411719][ T7647] kernel_stack 36864 [ 310.411719][ T7647] slab 0 [ 310.411719][ T7647] sock 0 [ 310.411719][ T7647] shmem 0 [ 310.411719][ T7647] file_mapped 0 [ 310.411719][ T7647] file_dirty 0 [ 310.411719][ T7647] file_writeback 0 [ 310.411719][ T7647] anon_thp 2097152 [ 310.411719][ T7647] inactive_anon 0 [ 310.411719][ T7647] active_anon 2207744 [ 310.411719][ T7647] inactive_file 0 [ 310.411719][ T7647] active_file 0 [ 310.411719][ T7647] unevictable 0 [ 310.411719][ T7647] slab_reclaimable 0 [ 310.411719][ T7647] slab_unreclaimable 0 [ 310.411719][ T7647] pgfault 561 [ 310.411719][ T7647] pgmajfault 0 [ 310.411719][ T7647] workingset_refault 0 [ 310.411719][ T7647] workingset_activate 0 [ 310.411719][ T7647] workingset_nodereclaim 0 [ 310.411719][ T7647] pgrefill 0 [ 310.411719][ T7647] pgscan 0 [ 310.411719][ T7647] pgsteal 0 [ 310.411719][ T7647] pgactivate 0 [ 310.411719][ T7647] pgdeactivate 0 [ 310.411736][ T7647] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=7646,uid=0 [ 310.411876][ T7647] Memory cgroup out of memory: Killed process 7646 (syz-executor.4) total-vm:72716kB, anon-rss:2160kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 310.413987][ T1061] oom_reaper: reaped process 7646 (syz-executor.4), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 311.191573][ T7273] syz-executor.4 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 311.191605][ T7273] CPU: 0 PID: 7273 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 311.191620][ T7273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.191627][ T7273] Call Trace: [ 311.191727][ T7273] dump_stack+0xf5/0x159 [ 311.191767][ T7273] dump_header+0xaa/0x449 [ 311.191803][ T7273] oom_kill_process.cold+0x10/0x15 [ 311.191859][ T7273] out_of_memory+0x231/0xa00 [ 311.191884][ T7273] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 311.191948][ T7273] mem_cgroup_out_of_memory+0x128/0x150 [ 311.191992][ T7273] try_charge+0xb3a/0xbc0 [ 311.192025][ T7273] ? __tsan_read4+0x2c/0x30 [ 311.192124][ T7273] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 311.192167][ T7273] cache_grow_begin+0x3ed/0x670 [ 311.192208][ T7273] fallback_alloc+0x161/0x1f0 [ 311.192248][ T7273] ____cache_alloc_node+0x1b1/0x1c0 [ 311.192287][ T7273] ? debug_smp_processor_id+0x4c/0x172 [ 311.192324][ T7273] kmem_cache_alloc+0x179/0x5d0 [ 311.192420][ T7273] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 311.192455][ T7273] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 311.192491][ T7273] ? debug_smp_processor_id+0x4c/0x172 [ 311.192526][ T7273] ? ext4_free_in_core_inode+0x50/0x50 [ 311.192559][ T7273] ext4_alloc_inode+0x45/0x390 [ 311.192603][ T7273] alloc_inode+0x48/0x130 [ 311.192633][ T7273] new_inode_pseudo+0x35/0xe0 [ 311.192714][ T7273] new_inode+0x28/0x50 [ 311.192751][ T7273] __ext4_new_inode+0x22a/0x3070 [ 311.192781][ T7273] ? __tsan_read4+0x2c/0x30 [ 311.192864][ T7273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.192892][ T7273] ? __dquot_initialize+0x2f5/0x6b0 [ 311.192925][ T7273] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 311.193005][ T7273] ext4_mkdir+0x289/0x820 [ 311.193051][ T7273] vfs_mkdir+0x283/0x390 [ 311.193083][ T7273] do_mkdirat+0x1ac/0x1f0 [ 311.193129][ T7273] __x64_sys_mkdir+0x40/0x50 [ 311.193167][ T7273] do_syscall_64+0xcc/0x370 [ 311.193203][ T7273] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 311.193222][ T7273] RIP: 0033:0x459317 [ 311.193317][ T7273] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.193330][ T7273] RSP: 002b:00007ffd44512358 EFLAGS: 00000202 ORIG_RAX: 0000000000000053 [ 311.193353][ T7273] RAX: ffffffffffffffda RBX: 000000000004ba7f RCX: 0000000000459317 [ 311.193368][ T7273] RDX: 00007ffd445123a3 RSI: 00000000000001ff RDI: 00007ffd445123a0 [ 311.193439][ T7273] RBP: 0000000000000021 R08: 0000000000000000 R09: 0000000000000003 [ 311.193456][ T7273] R10: 0000000000000064 R11: 0000000000000202 R12: 000000000000001b [ 311.193473][ T7273] R13: 00007ffd44512390 R14: 000000000004b9df R15: 00007ffd445123a0 [ 311.193507][ T7273] memory: usage 360kB, limit 0kB, failcnt 30 [ 311.193522][ T7273] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 311.193528][ T7273] Memory cgroup stats for /syz4: [ 311.193783][ T7273] anon 53248 [ 311.193783][ T7273] file 0 [ 311.193783][ T7273] kernel_stack 0 [ 311.193783][ T7273] slab 0 [ 311.193783][ T7273] sock 0 [ 311.193783][ T7273] shmem 0 [ 311.193783][ T7273] file_mapped 0 [ 311.193783][ T7273] file_dirty 0 [ 311.193783][ T7273] file_writeback 0 [ 311.193783][ T7273] anon_thp 0 [ 311.193783][ T7273] inactive_anon 0 [ 311.193783][ T7273] active_anon 53248 [ 311.193783][ T7273] inactive_file 0 [ 311.193783][ T7273] active_file 0 [ 311.193783][ T7273] unevictable 0 [ 311.193783][ T7273] slab_reclaimable 0 [ 311.193783][ T7273] slab_unreclaimable 0 [ 311.193783][ T7273] pgfault 561 [ 311.193783][ T7273] pgmajfault 0 [ 311.193783][ T7273] workingset_refault 0 [ 311.193783][ T7273] workingset_activate 0 [ 311.193783][ T7273] workingset_nodereclaim 0 [ 311.193783][ T7273] pgrefill 0 [ 311.193783][ T7273] pgscan 0 [ 311.193783][ T7273] pgsteal 0 [ 311.193783][ T7273] pgactivate 0 [ 311.193783][ T7273] pgdeactivate 0 [ 311.193797][ T7273] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=7273,uid=0 14:03:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xfdad}], 0x1, 0xfebfffff) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x60001) 14:03:54 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) 14:03:54 executing program 2: 14:03:54 executing program 3: 14:03:54 executing program 1: 14:03:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0xffffff43) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x4]}, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) close(0xffffffffffffffff) r5 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x5, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x5, 0x10000, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x9, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_config_ext={0x8ab, 0x5}, 0x24800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x667a}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x801c581f, 0x20000000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f00000000c0)='memory'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r5, 0xffffffffffffffff, 0x0, 0xc, &(0x7f00000000c0)='cgroup.stat\x00'}, 0x30) write$cgroup_int(r2, 0x0, 0x0) [ 311.193926][ T7273] Memory cgroup out of memory: Killed process 7273 (syz-executor.4) total-vm:72452kB, anon-rss:104kB, file-rss:35776kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 14:03:55 executing program 1: 14:03:55 executing program 3: 14:03:55 executing program 2: 14:03:55 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) 14:03:55 executing program 1: 14:03:55 executing program 3: 14:03:56 executing program 0: 14:03:56 executing program 2: 14:03:56 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)="c6"}, 0x20) 14:03:56 executing program 1: 14:03:56 executing program 3: [ 313.798965][ T7337] device bridge_slave_1 left promiscuous mode [ 313.805418][ T7337] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.899126][ T7337] device bridge_slave_0 left promiscuous mode [ 313.905486][ T7337] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.738569][ T7337] device hsr_slave_0 left promiscuous mode [ 314.818361][ T7337] device hsr_slave_1 left promiscuous mode [ 314.877696][ T7337] team0 (unregistering): Port device team_slave_1 removed [ 314.889224][ T7337] team0 (unregistering): Port device team_slave_0 removed [ 314.900513][ T7337] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 314.943830][ T7337] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 315.038831][ T7337] bond0 (unregistering): Released all slaves [ 315.147401][ T7738] IPVS: ftp: loaded support on port[0] = 21 [ 315.215790][ T7738] chnl_net:caif_netlink_parms(): no params data found [ 315.249197][ T7738] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.256440][ T7738] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.264393][ T7738] device bridge_slave_0 entered promiscuous mode [ 315.308451][ T7738] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.315555][ T7738] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.328579][ T7738] device bridge_slave_1 entered promiscuous mode [ 315.355606][ T7738] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 315.371637][ T7738] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 315.399816][ T7738] team0: Port device team_slave_0 added [ 315.406992][ T7738] team0: Port device team_slave_1 added [ 315.471284][ T7738] device hsr_slave_0 entered promiscuous mode [ 315.548674][ T7738] device hsr_slave_1 entered promiscuous mode [ 315.610092][ T7738] debugfs: Directory 'hsr0' with parent '/' already present! [ 315.631002][ T7738] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.638194][ T7738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.645491][ T7738] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.652586][ T7738] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.694475][ T7738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 315.712687][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 315.726883][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.736451][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.757180][ T7738] 8021q: adding VLAN 0 to HW filter on device team0 [ 315.774278][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 315.786897][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.794185][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.825830][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 315.835612][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.842861][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.859790][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 315.872598][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 315.882520][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 315.897570][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 315.906839][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 315.917981][ T7738] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 315.940980][ T7738] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 316.267978][ T7748] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 316.280382][ T7748] CPU: 0 PID: 7748 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 316.288235][ T7748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.298465][ T7748] Call Trace: [ 316.301856][ T7748] dump_stack+0xf5/0x159 [ 316.306136][ T7748] dump_header+0xaa/0x449 [ 316.310495][ T7748] oom_kill_process.cold+0x10/0x15 [ 316.315715][ T7748] out_of_memory+0x231/0xa00 [ 316.320333][ T7748] ? __tsan_read8+0x2c/0x30 [ 316.324877][ T7748] ? timer_reduce+0xa4/0x830 [ 316.329513][ T7748] mem_cgroup_out_of_memory+0x128/0x150 [ 316.335103][ T7748] memory_max_write+0x17b/0x250 [ 316.339989][ T7748] cgroup_file_write+0x119/0x320 [ 316.344955][ T7748] ? high_work_func+0x30/0x30 [ 316.349660][ T7748] kernfs_fop_write+0x1f4/0x2e0 [ 316.354527][ T7748] ? cgroup_css.part.0+0x90/0x90 [ 316.359535][ T7748] __vfs_write+0x67/0xc0 [ 316.363802][ T7748] ? kernfs_seq_show+0xe0/0xe0 [ 316.368676][ T7748] vfs_write+0x18a/0x390 [ 316.372945][ T7748] ksys_write+0xd5/0x1b0 [ 316.377215][ T7748] __x64_sys_write+0x4c/0x60 [ 316.381830][ T7748] do_syscall_64+0xcc/0x370 [ 316.386354][ T7748] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 316.392330][ T7748] RIP: 0033:0x459ef9 [ 316.396258][ T7748] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.415875][ T7748] RSP: 002b:00007faea5673c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 316.424304][ T7748] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459ef9 [ 316.432288][ T7748] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 316.440272][ T7748] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 316.448260][ T7748] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faea56746d4 [ 316.456244][ T7748] R13: 00000000004ca4f4 R14: 00000000004e23a8 R15: 00000000ffffffff [ 316.468942][ T7748] memory: usage 2756kB, limit 0kB, failcnt 50 [ 316.488215][ T7748] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 316.495244][ T7748] Memory cgroup stats for /syz4: [ 316.495352][ T7748] anon 2183168 [ 316.495352][ T7748] file 36864 [ 316.495352][ T7748] kernel_stack 36864 [ 316.495352][ T7748] slab 0 [ 316.495352][ T7748] sock 0 [ 316.495352][ T7748] shmem 0 [ 316.495352][ T7748] file_mapped 0 [ 316.495352][ T7748] file_dirty 0 [ 316.495352][ T7748] file_writeback 0 [ 316.495352][ T7748] anon_thp 2097152 [ 316.495352][ T7748] inactive_anon 0 [ 316.495352][ T7748] active_anon 2183168 [ 316.495352][ T7748] inactive_file 81920 [ 316.495352][ T7748] active_file 0 [ 316.495352][ T7748] unevictable 0 [ 316.495352][ T7748] slab_reclaimable 0 [ 316.495352][ T7748] slab_unreclaimable 0 [ 316.495352][ T7748] pgfault 660 [ 316.495352][ T7748] pgmajfault 0 [ 316.495352][ T7748] workingset_refault 0 [ 316.495352][ T7748] workingset_activate 0 [ 316.495352][ T7748] workingset_nodereclaim 0 [ 316.495352][ T7748] pgrefill 0 [ 316.495352][ T7748] pgscan 1214 [ 316.495352][ T7748] pgsteal 1197 [ 316.495352][ T7748] pgactivate 0 [ 316.589403][ T7748] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=7745,uid=0 [ 316.605283][ T7748] Memory cgroup out of memory: Killed process 7745 (syz-executor.4) total-vm:72852kB, anon-rss:2204kB, file-rss:35828kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 316.625926][ T1061] oom_reaper: reaped process 7745 (syz-executor.4), now anon-rss:0kB, file-rss:34876kB, shmem-rss:0kB 14:03:59 executing program 4: 14:03:59 executing program 1: 14:03:59 executing program 2: 14:03:59 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)="c6"}, 0x20) 14:03:59 executing program 3: 14:03:59 executing program 0: [ 316.721535][ T7738] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 316.751654][ T7738] CPU: 1 PID: 7738 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 316.759509][ T7738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.769579][ T7738] Call Trace: [ 316.772944][ T7738] dump_stack+0xf5/0x159 [ 316.777233][ T7738] dump_header+0xaa/0x449 [ 316.781601][ T7738] oom_kill_process.cold+0x10/0x15 [ 316.786779][ T7738] out_of_memory+0x231/0xa00 [ 316.791535][ T7738] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 316.797215][ T7738] mem_cgroup_out_of_memory+0x128/0x150 [ 316.802795][ T7738] try_charge+0xb3a/0xbc0 [ 316.807156][ T7738] ? rcu_note_context_switch+0x700/0x760 [ 316.812971][ T7738] mem_cgroup_try_charge+0xd2/0x260 [ 316.818376][ T7738] mem_cgroup_try_charge_delay+0x3a/0x80 [ 316.824131][ T7738] wp_page_copy+0x322/0x1160 [ 316.828745][ T7738] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 316.834410][ T7738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.840679][ T7738] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 316.846414][ T7738] do_wp_page+0x192/0x11f0 [ 316.850852][ T7738] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 316.856521][ T7738] __handle_mm_fault+0x1c07/0x2cb0 [ 316.861727][ T7738] handle_mm_fault+0x21b/0x530 [ 316.866537][ T7738] __do_page_fault+0x3fb/0x9e0 [ 316.871368][ T7738] do_page_fault+0x54/0x233 [ 316.875946][ T7738] ? do_syscall_64+0x270/0x370 [ 316.880745][ T7738] page_fault+0x34/0x40 [ 316.884914][ T7738] RIP: 0033:0x403a42 [ 316.888915][ T7738] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 d9 8e 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 f9 43 05 00 48 [ 316.908671][ T7738] RSP: 002b:00007fffd72a0cc0 EFLAGS: 00010246 14:03:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040), 0x1cc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$netlink(r1, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2fffffffe}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 14:03:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40000000000002b, 0x0) 14:03:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x19) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x10, 0xfa}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 316.914752][ T7738] RAX: 0000000000000000 RBX: 000000000004d375 RCX: 00000000004139b0 [ 316.922754][ T7738] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007fffd72a1df0 [ 316.930783][ T7738] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000000c83940 [ 316.938781][ T7738] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fffd72a1df0 [ 316.946833][ T7738] R13: 00007fffd72a1de0 R14: 0000000000000000 R15: 00007fffd72a1df0 14:04:00 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)="c6"}, 0x20) [ 317.028413][ T7738] memory: usage 400kB, limit 0kB, failcnt 59 [ 317.039601][ T7738] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 317.072020][ T7738] Memory cgroup stats for /syz4: [ 317.072304][ T7738] anon 90112 [ 317.072304][ T7738] file 36864 [ 317.072304][ T7738] kernel_stack 36864 [ 317.072304][ T7738] slab 0 [ 317.072304][ T7738] sock 0 [ 317.072304][ T7738] shmem 0 [ 317.072304][ T7738] file_mapped 0 [ 317.072304][ T7738] file_dirty 0 [ 317.072304][ T7738] file_writeback 0 [ 317.072304][ T7738] anon_thp 0 [ 317.072304][ T7738] inactive_anon 0 [ 317.072304][ T7738] active_anon 90112 [ 317.072304][ T7738] inactive_file 81920 14:04:00 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x35b2, 0xe0b7}) fallocate(r1, 0x0, 0x0, 0x7fff) [ 317.072304][ T7738] active_file 0 [ 317.072304][ T7738] unevictable 0 [ 317.072304][ T7738] slab_reclaimable 0 [ 317.072304][ T7738] slab_unreclaimable 0 [ 317.072304][ T7738] pgfault 660 [ 317.072304][ T7738] pgmajfault 0 [ 317.072304][ T7738] workingset_refault 0 [ 317.072304][ T7738] workingset_activate 0 [ 317.072304][ T7738] workingset_nodereclaim 0 [ 317.072304][ T7738] pgrefill 0 [ 317.072304][ T7738] pgscan 1214 [ 317.072304][ T7738] pgsteal 1197 [ 317.072304][ T7738] pgactivate 0 [ 317.072304][ T7738] pgdeactivate 0 [ 317.188235][ T7738] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=7738,uid=0 [ 317.256082][ T7738] Memory cgroup out of memory: Killed process 7738 (syz-executor.4) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 14:04:00 executing program 5: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) [ 317.377431][ T1061] oom_reaper: reaped process 7738 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 14:04:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) connect$ax25(r1, &(0x7f00000000c0)={{0x3, @bcast, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) 14:04:00 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x0, &(0x7f00008feff0)={&(0x7f0000000180)=ANY=[@ANYBLOB="020d0000100000002f3144e800000000030006000720000002004000e0000001000000f5000000000800120002000100000000000000000030006c000203009f7eae02000000ada78100000000152c000000000000000001020014bb00000000000000000000000003000500002000000200ed00e0000001000000ba0000cc2d1483000083e30f510b958efd6eadf315614ce3a044152ea8bb574e2a78cb90d951c0af8345a652d3f8b063daeb15b119f58d2b220046820cd437fb9525e63abd1f39479d824920968cd59f74db363a6d8064e7b175a7ba7184cef93a0fcc835820d96008f866fb4d28bc7ef9f8062f9db56c8128159cdcfd0c171bcf9e868c603d7f8542cbd8c5d2e29b90dd2ca4c9b80600bd45d8b6f661130c52080000001a8eebb41e495669dd7f1237cc427d1d35826f68073a437969f7d039c721484d64363829137869865cce84240b9ec5cf2faf907a440931d08e9e65d7b8597e57292ac7c4f1c02db1c2e4f7104d1a982cf40045d0f4431963df216018cd006bbdcb3d5892b7b45695d5f782adaeac178f69a3247fd3bf2908eb0cd1f0134fad0bd65b5008c249706ea978f16437a43f65a0a4707f6d8cd95a9672bdcc5f2dfcb35d123f85d75f400d25928aab75c854502f01000100000000007a6845de7f93684d20fdffffffffffffff5f6512a39875e6e543defe12c0a79fb6b74e4a59802cd01276d5ccf2044a28b928f9d8b00b8609dd2ce899228509c49f9fe74fc9de22ea49b934f40ae18968cb1123d562ec4834bcbfe5d389dba66e268afb679090614652c1d8a633093015bdc8edc11bae372c83640cf812f55533de7dc120c8653421af7bd85059fec6aaf9a881f56908ef619948eac304a6dd5dae540f0e478f72c7ed60240fd9e5fd847771e4c978c2b039cefc2566be2f0655395d495c20001914832e513fe5b0a428195bd0e8186eba1800000000000000000000000000006351378bc1d74702a0c950765d822259357b5aa5377b4c97984e45a7f0cfbb05257170b87a4e383101241d9f1796d82dfded5af1fbadb5b5bdd52a7f84427796ee9bc70405453e93ae4ebed8405af1fbb6b237cbf2b950b63fb45d12bea5e8d2ee591ecf871ea5c15b294785cfbdf5d4adc9467535a8a06ed062b155b8ff296336fcbcb6b175b6cb3a654d3a447a0f6ee54a43281bd5f0850cfeec98458be0d38e59f1ac1f03d5ed2c3e20a93ee852ce088319166f191e50c94d9863c5bc90590c792d5050e1e0e3cef86808c10122fe287797ceefdc491e5db5cd0731a18a51af66c2e92c7b1ad6bd29d16124a67502c343a72a3d06168a096aff16454ccd7848fa4807c6be3beb1982d25e1af301430823fe2e85fef29da4efd745641657e3db8512abd2981792cef69ba2f7415107f19c8fa42e0000000000000000d501cb0f4b1c417d3896f832374378b396fbe50cfa9e7e539159bca09c4b2406585728c83a34d57ecb571f24054f0dbf8ed327bb102b1b1bb03bf572cfef6dda4c972302829f253f74aeda11351a882dbfe41a6eb3f5f3a83d511406a85e796b007f00000000000000096c77411b12b660973d8468bdbf393e7e61fc73f5cb3600b431c30c45fd96e7fea24843e0a9687ba5eedf9afd3ce16ceb2bf48f8d91cdf194df8c7ff60e102d4473bc9c76286d50ff5215185d28c9a0c537c05e9ff1a2f4e37099103ca31588b0188f7b53c8033af2dac84ccd9eed12000000000000000000000000000000000000000000006b2589b9734c2db823c3c573a1751195237c497843c503cf05bea73d2c83c8ac12ae487e2f2eee3f4071341c7278564a1dda84d0e5f06c9f5b47910d3f13f7ec37ddb703756472968e59385c39cf42033c09557dbdfc5210c37c979e0aeda26af9cd29def7236693c3eb9465555ed50b672f7e74e3912f7fdb7a1919f767fc4ab527144002424e4ee3a800841592a753eae748d1d2166ab859c7d704e20ecde65a370dadde0dcfda53670a53988ebb0d19f57dc6977284cfb997971d0197d837c75200000000"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f00000000c0), 0x4000676, 0x0) 14:04:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:04:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) flistxattr(r0, 0x0, 0x0) 14:04:00 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x10}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x94}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 14:04:00 executing program 5: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) 14:04:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0x8090ae81, 0x0) 14:04:01 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x10}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x94}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 14:04:01 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') getdents64(r1, 0x0, 0x0) 14:04:01 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, [@tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}]]}}}]}, 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) 14:04:01 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = epoll_create1(0x0) epoll_pwait(r3, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 14:04:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) [ 318.216910][ T7806] IPVS: ftp: loaded support on port[0] = 21 14:04:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) 14:04:01 executing program 0: memfd_create(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) write(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) epoll_create1(0x100000) getpgid(0x0) r3 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r3, 0x0) msgctl$MSG_STAT(r3, 0xb, &(0x7f0000000180)=""/170) 14:04:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) 14:04:01 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xf) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x37}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:04:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) 14:04:02 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x6, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKFLSBUF(r0, 0x1261, 0x0) [ 319.694215][ T7806] IPVS: ftp: loaded support on port[0] = 21 [ 319.978948][ T7580] device bridge_slave_1 left promiscuous mode [ 319.985273][ T7580] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.029107][ T7580] device bridge_slave_0 left promiscuous mode [ 320.035490][ T7580] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.908654][ T7580] device hsr_slave_0 left promiscuous mode [ 320.948359][ T7580] device hsr_slave_1 left promiscuous mode [ 321.026149][ T7580] team0 (unregistering): Port device team_slave_1 removed [ 321.037548][ T7580] team0 (unregistering): Port device team_slave_0 removed [ 321.049293][ T7580] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 321.093779][ T7580] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 321.196265][ T7580] bond0 (unregistering): Released all slaves [ 321.326496][ T7850] IPVS: ftp: loaded support on port[0] = 21 [ 321.408737][ T7850] chnl_net:caif_netlink_parms(): no params data found [ 321.475738][ T7850] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.483689][ T7850] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.495879][ T7850] device bridge_slave_0 entered promiscuous mode [ 321.505450][ T7850] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.516604][ T7850] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.525743][ T7850] device bridge_slave_1 entered promiscuous mode [ 321.559004][ T7850] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 321.571161][ T7850] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 321.594947][ T7850] team0: Port device team_slave_0 added [ 321.601918][ T7850] team0: Port device team_slave_1 added [ 321.685575][ T7850] device hsr_slave_0 entered promiscuous mode [ 321.748585][ T7850] device hsr_slave_1 entered promiscuous mode [ 321.828565][ T7850] debugfs: Directory 'hsr0' with parent '/' already present! [ 321.847363][ T7850] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.854449][ T7850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.861747][ T7850] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.868806][ T7850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.910468][ T7850] 8021q: adding VLAN 0 to HW filter on device bond0 [ 321.926836][ T7265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.936586][ T7265] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.950718][ T7265] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.970793][ T7850] 8021q: adding VLAN 0 to HW filter on device team0 [ 321.986366][ T7265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.996067][ T7265] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.003140][ T7265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.026807][ T7850] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 322.037605][ T7850] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 322.053101][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.062438][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.069533][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.080624][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 322.089553][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 322.098441][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.107035][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.115984][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 322.124061][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 322.142651][ T7850] 8021q: adding VLAN 0 to HW filter on device batadv0 14:04:05 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x6, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKBSZSET(r0, 0x40081271, 0x0) 14:04:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) 14:04:05 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$instantiate(0xc, 0x0, &(0x7f0000000140)=@encrypted_load={'load ', 'default', 0x20, 'user:', 'vmnet0[ppp0keyringsystemvboxnet0'}, 0x49, 0x0) 14:04:05 executing program 0: r0 = socket(0x2, 0x3, 0x0) connect$unix(r0, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x10) r1 = dup2(r0, r0) write(r1, 0x0, 0x0) 14:04:05 executing program 2: r0 = socket(0x2, 0x3, 0x0) connect$unix(r0, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x10) r1 = dup2(r0, r0) write(r1, 0x0, 0x0) 14:04:05 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, [@tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}]]}}}]}, 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) [ 322.429575][ T7862] IPVS: ftp: loaded support on port[0] = 21 14:04:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x0, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) 14:04:05 executing program 1: clone(0xffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2, 0x74}, &(0x7f0000000800)='])+\xe4\x00\x19I0z\xf9\xdc~\xb0\xba\r\x9f\xf1q\xe5\x19\xa3\xf4R\xf6yae+\xa1\xbc\x1dqP\xcd|\xbf(\xe0L\x87\xbf\xc26\xaa\xf2Hb\xa7\xae\xd7\xb9\xfb\xf1+\xea\xd6\xfa\xf9\xc4}\xb6\x14{\x91\x86B\xbc\x91\x9d:\xedx\x1fIK B\xd8@\xe7\xa9\xc8\xdd)\x91.\x83\xbfo\xa0\a\xb5&\xfd\xb5W\x8f\xfeN\xeaH\xf8\xc3%<\x7f\xdc\xa9\xa6Uua\xaf\xc6L\xbd\xbfz@z\x84`\x8e\xa4\x1b\x82\xb0\x99Oe\xde\v\xd3\xadg\x96\xf0g\v\x8f_\x94\xda\xbd\xf9\x80\xb4\xd0C\xdd<\x96\xea\x98\x7f\xb3', 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 14:04:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fanotify_init(0x0, 0x0) 14:04:05 executing program 2: clone(0xffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2, 0x74}, &(0x7f0000000800)='])+\xe4\x00\x19I0z\xf9\xdc~\xb0\xba\r\x9f\xf1q\xe5\x19\xa3\xf4R\xf6yae+\xa1\xbc\x1dqP\xcd|\xbf(\xe0L\x87\xbf\xc26\xaa\xf2Hb\xa7\xae\xd7\xb9\xfb\xf1+\xea\xd6\xfa\xf9\xc4}\xb6\x14{\x91\x86B\xbc\x91\x9d:\xedx\x1fIK B\xd8@\xe7\xa9\xc8\xdd)\x91.\x83\xbfo\xa0\a\xb5&\xfd\xb5W\x8f\xfeN\xeaH\xf8\xc3%<\x7f\xdc\xa9\xa6Uua\xaf\xc6L\xbd\xbfz@z\x84`\x8e\xa4\x1b\x82\xb0\x99Oe\xde\v\xd3\xadg\x96\xf0g\v\x8f_\x94\xda\xbd\xf9\x80\xb4\xd0C\xdd<\x96\xea\x98\x7f\xb3', 0x0) 14:04:05 executing program 0: 14:04:05 executing program 1: 14:04:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x0, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) 14:04:06 executing program 0: 14:04:06 executing program 2: 14:04:06 executing program 4: 14:04:06 executing program 1: 14:04:07 executing program 3: 14:04:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x0, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) 14:04:07 executing program 0: 14:04:07 executing program 4: 14:04:07 executing program 2: 14:04:07 executing program 1: 14:04:07 executing program 2: 14:04:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x0, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) 14:04:07 executing program 4: 14:04:07 executing program 1: 14:04:07 executing program 0: 14:04:07 executing program 3: 14:04:07 executing program 2: 14:04:07 executing program 0: 14:04:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ppoll(&(0x7f0000000440)=[{r1}, {r0, 0x406}], 0x2, 0x0, 0x0, 0x0) 14:04:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x0, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) 14:04:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x39}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0x9, 0x4, 0xe9, 0x0, r0, 0x0, [0x8]}, 0x2c) 14:04:07 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") creat(&(0x7f0000000280)='./file0\x00', 0x0) 14:04:08 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 14:04:08 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setfsgid(0x0) 14:04:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB]}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:04:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x0, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) 14:04:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b50500000000000061101800ddffffff1f000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0x1003d, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 14:04:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x39}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0x9, 0x4, 0xe9, 0x0, r0, 0x0, [0x8]}, 0x2c) 14:04:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x39}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0x9, 0x4, 0xe9, 0x0, r0, 0x0, [0x8]}, 0x2c) 14:04:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) 14:04:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000040)='\'', 0x1, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32, @ANYRESOCT, @ANYRESHEX, @ANYBLOB="0327c18c5b6053fd509def7d1c586cea2fc4535f6da60591bcdd51d24a6ef792487bf1def539eeb4098b951468dec6898662dc424045", @ANYRESOCT, @ANYRESDEC, @ANYPTR]], 0x3f5) sendto$inet(r0, &(0x7f00000012c0)='2', 0x1, 0x20008011, 0x0, 0x0) 14:04:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB]}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:04:08 executing program 3: mknod(&(0x7f0000000040)='./file1\x00', 0x778c90c97e80043a, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) 14:04:08 executing program 2: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:04:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x0) ioctl$FITRIM(r0, 0x807812f0, &(0x7f0000000100)) 14:04:09 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) 14:04:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000040)='\'', 0x1, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32, @ANYRESOCT, @ANYRESHEX, @ANYBLOB="0327c18c5b6053fd509def7d1c586cea2fc4535f6da60591bcdd51d24a6ef792487bf1def539eeb4098b951468dec6898662dc424045", @ANYRESOCT, @ANYRESDEC, @ANYPTR]], 0x3f5) sendto$inet(r0, &(0x7f00000012c0)='2', 0x1, 0x20008011, 0x0, 0x0) 14:04:09 executing program 2: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 14:04:09 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB]}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:04:09 executing program 3: mknod(&(0x7f0000000040)='./file1\x00', 0x778c90c97e80043a, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) 14:04:09 executing program 1: 14:04:09 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)="c6"}, 0x20) 14:04:09 executing program 2: 14:04:09 executing program 0: 14:04:09 executing program 1: 14:04:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) 14:04:09 executing program 3: 14:04:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB]}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:04:10 executing program 2: 14:04:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) 14:04:10 executing program 0: 14:04:10 executing program 1: 14:04:10 executing program 3: 14:04:10 executing program 2: 14:04:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB]}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:04:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) 14:04:10 executing program 1: 14:04:10 executing program 2: 14:04:10 executing program 0: 14:04:10 executing program 3: 14:04:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)="c6"}, 0x20) 14:04:11 executing program 1: 14:04:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB]}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:04:11 executing program 3: 14:04:11 executing program 2: 14:04:11 executing program 0: 14:04:11 executing program 1: 14:04:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)="c6"}, 0x20) 14:04:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB]}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:04:11 executing program 3: 14:04:11 executing program 2: 14:04:11 executing program 0: 14:04:11 executing program 1: 14:04:11 executing program 3: 14:04:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000180)="c6"}, 0x20) 14:04:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB]}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:04:12 executing program 0: clone(0x3103101ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000a9e000/0x4000)=nil, 0x4000) openat(0xffffffffffffff9c, 0x0, 0x149000, 0x11) 14:04:12 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x80000000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000002380)) 14:04:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="a48b12f728db4b2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2ce90ccb15322e20000007c0e3ca8adbf7e4a2d74a75d00008489ef41b4ef4a6566a55fd4caa8d6c0dee265ea2121b173c73f15984fdd5bd24e99b71a8d7f2c45641455ffc3001e29106fa8cd40e6", 0x72}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:04:12 executing program 3: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}}}, 0x284) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x0, 0x0, @local}}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}}}, 0x284) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000580)={0x3, 0x3ca, 0xfa00, {{0xa, 0x4e22, 0x0, @mcast2}, {0xa, 0x0, 0x0, @local}}}, 0x48) dup2(r2, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x0, 0x0, @local}}}, 0x48) r7 = dup2(r4, r5) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r7, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20a120}, 0xc, &(0x7f00000002c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="00000000c07cf49c5b5d615a673bfc28a4de6340f6833d4fd29c29c3f74c13a7b0426e0384a14bd2292900e92fb68a", @ANYRES16=r8, @ANYBLOB="01002abd7000fddbdf2514000000e80004002400070008000400020000000000040000000000080003000400000008000100190000001c00070008000300060000000800040005000000080004000500000044000700080001001d00000008000300060000000800040008000000080003008100000008000400020800000800010017000000080004007f000000080001000b0000000c00010073797a30000000005400070008000200290b0000f9ff01000500000008000400197c0000080003000900000008000200000000000800040000000020080001000100000008000200ff07000008"], 0x3}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000812) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}, r10}}, 0x284) write$RDMA_USER_CM_CMD_RESOLVE_IP(r9, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x0, 0x0, @local}, r10}}, 0x48) dup2(0xffffffffffffffff, r9) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) r13 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x4e23, 0x0, @local}, r14}}, 0x48) dup2(r11, r12) socket$inet6_tcp(0xa, 0x1, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r15, 0x8946, 0x0) socket$packet(0x11, 0x3, 0x300) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) 14:04:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, 0x0}, 0x20) 14:04:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB]}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:04:12 executing program 2: 14:04:12 executing program 2: 14:04:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, 0x0}, 0x20) 14:04:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB]}}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xfc) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:04:13 executing program 3: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}}}, 0x284) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x0, 0x0, @local}}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}}}, 0x284) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000580)={0x3, 0x3ca, 0xfa00, {{0xa, 0x4e22, 0x0, @mcast2}, {0xa, 0x0, 0x0, @local}}}, 0x48) dup2(r2, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x0, 0x0, @local}}}, 0x48) r7 = dup2(r4, r5) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r7, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20a120}, 0xc, &(0x7f00000002c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="00000000c07cf49c5b5d615a673bfc28a4de6340f6833d4fd29c29c3f74c13a7b0426e0384a14bd2292900e92fb68a", @ANYRES16=r8, @ANYBLOB="01002abd7000fddbdf2514000000e80004002400070008000400020000000000040000000000080003000400000008000100190000001c00070008000300060000000800040005000000080004000500000044000700080001001d00000008000300060000000800040008000000080003008100000008000400020800000800010017000000080004007f000000080001000b0000000c00010073797a30000000005400070008000200290b0000f9ff01000500000008000400197c0000080003000900000008000200000000000800040000000020080001000100000008000200ff07000008"], 0x3}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000812) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}, r10}}, 0x284) write$RDMA_USER_CM_CMD_RESOLVE_IP(r9, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x0, 0x0, @local}, r10}}, 0x48) dup2(0xffffffffffffffff, r9) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) r13 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x4e23, 0x0, @local}, r14}}, 0x48) dup2(r11, r12) socket$inet6_tcp(0xa, 0x1, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r15, 0x8946, 0x0) socket$packet(0x11, 0x3, 0x300) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) 14:04:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, 0x0}, 0x20) 14:04:13 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 14:04:13 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}}}, 0x284) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x0, 0x0, @local}}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}}}, 0x284) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000580)={0x3, 0x3ca, 0xfa00, {{0xa, 0x4e22, 0x0, @mcast2}, {0xa, 0x0, 0x0, @local}}}, 0x48) dup2(r2, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x0, 0x0, @local}}}, 0x48) r7 = dup2(r4, r5) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r7, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20a120}, 0xc, &(0x7f00000002c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="00000000c07cf49c5b5d615a673bfc28a4de6340f6833d4fd29c29c3f74c13a7b0426e0384a14bd2292900e92fb68a", @ANYRES16=r8, @ANYBLOB="01002abd7000fddbdf2514000000e80004002400070008000400020000000000040000000000080003000400000008000100190000001c00070008000300060000000800040005000000080004000500000044000700080001001d00000008000300060000000800040008000000080003008100000008000400020800000800010017000000080004007f000000080001000b0000000c00010073797a30000000005400070008000200290b0000f9ff01000500000008000400197c0000080003000900000008000200000000000800040000000020080001000100000008000200ff07000008"], 0x3}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000812) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}, r10}}, 0x284) write$RDMA_USER_CM_CMD_RESOLVE_IP(r9, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x0, 0x0, @local}, r10}}, 0x48) dup2(0xffffffffffffffff, r9) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) r13 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x4e23, 0x0, @local}, r14}}, 0x48) dup2(r11, r12) socket$inet6_tcp(0xa, 0x1, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r15, 0x8946, 0x0) socket$packet(0x11, 0x3, 0x300) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) 14:04:15 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = semget$private(0x0, 0x800000000007, 0x0) semtimedop(r0, &(0x7f00000000c0)=[{}], 0x19b, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="448a84011be2ff00c43119312172705e4e555c400d7b08d97609f6bb12f77af38867fe3402ab6398f77bae47a662c45557b687ff89183ba7b5129db001000000ce7f8f5976639555e3b3707d22b9bf7297ccb8b1965f6ef7a26381d3e7806fe022bf9a116e67444ec80cd3"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) semctl$SETALL(r0, 0x0, 0x11, 0x0) 14:04:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB]}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:04:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)}, 0x20) 14:04:15 executing program 3: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}}}, 0x284) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x0, 0x0, @local}}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}}}, 0x284) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000580)={0x3, 0x3ca, 0xfa00, {{0xa, 0x4e22, 0x0, @mcast2}, {0xa, 0x0, 0x0, @local}}}, 0x48) dup2(r2, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x0, 0x0, @local}}}, 0x48) r7 = dup2(r4, r5) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r7, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20a120}, 0xc, &(0x7f00000002c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="00000000c07cf49c5b5d615a673bfc28a4de6340f6833d4fd29c29c3f74c13a7b0426e0384a14bd2292900e92fb68a", @ANYRES16=r8, @ANYBLOB="01002abd7000fddbdf2514000000e80004002400070008000400020000000000040000000000080003000400000008000100190000001c00070008000300060000000800040005000000080004000500000044000700080001001d00000008000300060000000800040008000000080003008100000008000400020800000800010017000000080004007f000000080001000b0000000c00010073797a30000000005400070008000200290b0000f9ff01000500000008000400197c0000080003000900000008000200000000000800040000000020080001000100000008000200ff07000008"], 0x3}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000812) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}, r10}}, 0x284) write$RDMA_USER_CM_CMD_RESOLVE_IP(r9, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x0, 0x0, @local}, r10}}, 0x48) dup2(0xffffffffffffffff, r9) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) r13 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x4e23, 0x0, @local}, r14}}, 0x48) dup2(r11, r12) socket$inet6_tcp(0xa, 0x1, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r15, 0x8946, 0x0) socket$packet(0x11, 0x3, 0x300) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) 14:04:15 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0'}, 0xb) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000340)='security.capability\x00', &(0x7f0000000380)=@v2={0x2000000, [{}, {0x0, 0x3}]}, 0x14, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0x4) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) execveat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000100)='security.capability\x00', 0x0], &(0x7f00000004c0)=[&(0x7f0000000200)='security.capability\x00', 0x0, &(0x7f0000000300)='security.capability\x00', 0x0, &(0x7f0000000440)='wlan0&\x00', &(0x7f0000000480)='self\'\x00'], 0x1500) 14:04:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x1, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@can, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x1, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) flistxattr(r1, 0x0, 0xfffffffffffffff8) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000cc0)={{{@in=@initdev, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000640)=0xe8) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000f00)=ANY=[]) r4 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x950, 0x882) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0xfcc9}], 0x1, 0x81805) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x005t\xea\xdca$\r\x01\xf4\x10\xfd\xf0\xcc*\xf3r!\x04\xe5\xc1@\xf8\xee\xe2\xab\xe2\xc7s\x04\xc1y\xe7\f\x9a\x7f\xd9\xb2\xfb\x03\xf0\xe6\xc3O\x1ai\xa6\xc0\xfd\x9f\x8b\x13\f\x13M\xaf\xf1\xd0\x81Z?F\xfbM-^a\'\xed\xfe\xcc\x9b_\x83\x99f\x93C\x8f\'g\xaeq\x92GFu[\xf5\xd5\xf0\x924(\xe1\xdc\x81\x86C\x7f\xb1\xc4\xfb\xb3e\xa4\x94\xfcYI\x03\xaf\x19\x9bp9-PG\xe5\xf8{v\xe0\xbb\xe4\xef[\x9b\xc3\v\xc6;4\x18\xbb\x83\xdc\x13q\t`\xf1X!\xf5\xb9\xdc\xf6 \xc4\x04\xbe\x14\x16DI\xa1<\x97\xecb\'>f\x8c\xd0\xb0e', 0x1, 0xc3, &(0x7f0000000240)=""/195, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100026}, 0xc, &(0x7f0000000080)={&(0x7f0000000780)=@getlink={0x3dc, 0x12, 0x1, 0x70bd28, 0x0, {0x0, 0x0, 0x0, r6, 0x918, 0x1000}, [@IFLA_MTU={0x8, 0xe, 0x1ff}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x7fffffff}, @IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @remote}]}}}, @IFLA_PHYS_PORT_ID={0xc, 0x22, "85a84f71cbc7c510"}, @IFLA_VFINFO_LIST={0x314, 0x16, [{0x60, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0x400, 0x9}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0xb97, 0x100000000}}, @IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0xce6}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1}}, @IFLA_VF_VLAN_LIST={0x18, 0xc, [{0x14, 0x1, {0x7d, 0x91e, 0x2, 0x8100}}]}]}, {0xec, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x0, 0xad3d}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0xaf, 0x1}}, @IFLA_VF_VLAN={0x10, 0x2, {0x2, 0xe20, 0xfb}}, @IFLA_VF_VLAN_LIST={0xa4, 0xc, [{0x14, 0x1, {0x2, 0x56e, 0x100, 0x88a8}}, {0x14, 0x1, {0x2, 0x909, 0x8, 0x8100}}, {0x14, 0x1, {0x32f0c5ca, 0xa2, 0x3, 0x88a8}}, {0x14, 0x1, {0x80000001, 0xd91, 0x3e, 0x18aa8}}, {0x14, 0x1, {0x8, 0xe49, 0x2, 0x8100}}, {0x14, 0x1, {0x8000000, 0x607, 0xf, 0x8100}}, {0x14, 0x1, {0x1000, 0xf99, 0x80, 0x88a8}}, {0x14, 0x1, {0x4, 0x3b0, 0x7, 0x4928}}]}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x10000}}]}, {0xb4, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x20, 0x9}}, @IFLA_VF_VLAN={0x10, 0x2, {0x101, 0x89d, 0x88}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0xbed}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x400, 0xeb6}}, @IFLA_VF_VLAN={0x10, 0x2, {0x6c180, 0x4c8, 0x80000001}}, @IFLA_VF_RATE={0x10, 0x6, {0x7fffffff, 0x9, 0x10000}}, @IFLA_VF_MAC={0x28, 0x1, {0x541ab9ab, @dev={[], 0x18}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x9, 0x3}}, @IFLA_VF_MAC={0x28, 0x1, {0x8, @link_local}}]}, {0x30, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x401, 0x7}}, @IFLA_VF_VLAN_LIST={0x18, 0xc, [{0x14, 0x1, {0x1, 0x107, 0x0, 0x8100}}]}]}, {0x3c, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x8}}, @IFLA_VF_VLAN={0x10, 0x2, {0x1, 0xccf, 0x9}}, @IFLA_VF_VLAN={0x10, 0x2, {0x8512, 0xdfa, 0x10000}}, @IFLA_VF_TRUST={0xc, 0x9, {0x5, 0x7}}]}, {0x10, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x0, 0xecd7}}]}, {0x94, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x7f}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0xb167, 0x2}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1}}, @IFLA_VF_RATE={0x10, 0x6, {0x5, 0x0, 0x1f}}, @IFLA_VF_TRUST={0xc, 0x9, {0x2, 0xfffffb50}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x9, 0x3}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x2, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x0, 0x3, 0x6}}]}]}, @IFLA_PORT_SELF={0x54, 0x19, [@IFLA_PORT_PROFILE={0x10, 0x2, '/dev/loop#\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "aa23974eb8b48696bf3b7272f20f31e3"}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_VF={0x8, 0x1, 0x3}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "648a1c16b102c1e9f7badcaf77760abc"}, @IFLA_PORT_VF={0x8, 0x1, 0x7f}]}, @IFLA_TXQLEN={0x8, 0xd, 0x9}, @IFLA_EVENT={0x8, 0x2c, 0x6}, @IFLA_LINK_NETNSID={0x8, 0x25, 0x3}, @IFLA_EVENT={0x8, 0x2c, 0x10000}]}, 0x3dc}, 0x1, 0x0, 0x0, 0x800}, 0x20040010) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$sock_inet_SIOCADDRT(r8, 0x890b, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, r9) ioctl$sock_inet_SIOCADDRT(r10, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2) sendfile(r3, r4, &(0x7f00000001c0), 0x20002000005) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000c80)={'veth1_to_hsr\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="200000003b000000b0dc9874e37835be8de1f0d18ebf89e17bce1fdbf814f7d5f68717509f2e6a45896a8b8b671fb364d5139b10052df24d700cee10abea5e507dfea8"]}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000200)) ioctl$LOOP_CLR_FD(r4, 0x4c01) connect$inet(r0, &(0x7f00000000c0), 0x10) 14:04:15 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000100)='./file0\x00', 0x800000000000744, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 14:04:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)}, 0x20) 14:04:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB]}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:04:15 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x40000001, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000100), 0x5bd, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = gettid() tkill(r0, 0x1000000000016) 14:04:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB]}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:04:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000180)}, 0x20) [ 333.515660][ T8304] ================================================================== [ 333.523800][ T8304] BUG: KCSAN: data-race in kvm_mmu_notifier_invalidate_range_end / tdp_page_fault [ 333.532975][ T8304] [ 333.535319][ T8304] read to 0xffffc900018a2130 of 8 bytes by task 8257 on cpu 0: [ 333.542855][ T8304] tdp_page_fault+0x1d8/0x4d0 [ 333.547529][ T8304] kvm_mmu_page_fault+0xf9/0xbc0 [ 333.552465][ T8304] handle_ept_violation+0x1e5/0x340 [ 333.557654][ T8304] vmx_handle_exit+0x1c2/0xd60 [ 333.562416][ T8304] vcpu_enter_guest+0xc1f/0x3820 [ 333.567344][ T8304] kvm_arch_vcpu_ioctl_run+0x2a2/0xdc0 [ 333.572793][ T8304] kvm_vcpu_ioctl+0x752/0xa30 [ 333.577467][ T8304] do_vfs_ioctl+0x991/0xc60 [ 333.581959][ T8304] ksys_ioctl+0xbd/0xe0 [ 333.586104][ T8304] __x64_sys_ioctl+0x4c/0x60 [ 333.590686][ T8304] do_syscall_64+0xcc/0x370 [ 333.595196][ T8304] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 333.601071][ T8304] [ 333.603397][ T8304] write to 0xffffc900018a2130 of 8 bytes by task 8304 on cpu 1: [ 333.611022][ T8304] kvm_mmu_notifier_invalidate_range_end+0x47/0xb0 [ 333.617513][ T8304] __mmu_notifier_invalidate_range_end+0x144/0x1e0 [ 333.624008][ T8304] zap_page_range_single+0x303/0x310 [ 333.629283][ T8304] unmap_mapping_pages+0x20c/0x250 [ 333.634387][ T8304] unmap_mapping_range+0x51/0x60 [ 333.639943][ T8304] shmem_fallocate+0x6ed/0x860 [ 333.644704][ T8304] vfs_fallocate+0x3be/0x650 [ 333.649287][ T8304] __do_sys_madvise+0x7f7/0x1150 [ 333.654214][ T8304] __x64_sys_madvise+0x4c/0x60 [ 333.658974][ T8304] do_syscall_64+0xcc/0x370 [ 333.663467][ T8304] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 333.669340][ T8304] [ 333.671658][ T8304] Reported by Kernel Concurrency Sanitizer on: [ 333.677804][ T8304] CPU: 1 PID: 8304 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 333.685589][ T8304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.695626][ T8304] ================================================================== [ 333.703674][ T8304] Kernel panic - not syncing: panic_on_warn set ... [ 333.710255][ T8304] CPU: 1 PID: 8304 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 333.718571][ T8304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.728615][ T8304] Call Trace: [ 333.731929][ T8304] dump_stack+0xf5/0x159 [ 333.736169][ T8304] panic+0x210/0x640 [ 333.740065][ T8304] ? __x64_sys_madvise+0x4c/0x60 [ 333.744996][ T8304] ? vprintk_func+0x8d/0x140 [ 333.749579][ T8304] kcsan_report.cold+0xc/0x10 [ 333.754253][ T8304] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 333.759810][ T8304] __tsan_write8+0x32/0x40 [ 333.764219][ T8304] kvm_mmu_notifier_invalidate_range_end+0x47/0xb0 [ 333.770727][ T8304] ? vcpu_stat_clear+0x120/0x120 [ 333.776616][ T8304] __mmu_notifier_invalidate_range_end+0x144/0x1e0 [ 333.783117][ T8304] ? unmap_single_vma+0x153/0x200 [ 333.788141][ T8304] zap_page_range_single+0x303/0x310 [ 333.793437][ T8304] unmap_mapping_pages+0x20c/0x250 [ 333.798556][ T8304] unmap_mapping_range+0x51/0x60 [ 333.803490][ T8304] shmem_fallocate+0x6ed/0x860 [ 333.808248][ T8304] ? __tsan_read8+0x2c/0x30 [ 333.812749][ T8304] ? __tsan_read4+0x2c/0x30 [ 333.817251][ T8304] vfs_fallocate+0x3be/0x650 [ 333.821834][ T8304] ? shmem_get_link+0x270/0x270 [ 333.826681][ T8304] __do_sys_madvise+0x7f7/0x1150 [ 333.831610][ T8304] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 333.837241][ T8304] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 333.842876][ T8304] ? 0xffffffff81000000 [ 333.847029][ T8304] __x64_sys_madvise+0x4c/0x60 [ 333.851790][ T8304] ? __x64_sys_madvise+0x4c/0x60 [ 333.856729][ T8304] do_syscall_64+0xcc/0x370 [ 333.861233][ T8304] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 333.867118][ T8304] RIP: 0033:0x459ef9 [ 333.871013][ T8304] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.890607][ T8304] RSP: 002b:00007f122a0bec78 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 333.899011][ T8304] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459ef9 [ 333.906976][ T8304] RDX: 0000000000000009 RSI: 0000000000600003 RDI: 0000000020000000 [ 333.914935][ T8304] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 333.922900][ T8304] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f122a0bf6d4 [ 333.930862][ T8304] R13: 00000000004c66e1 R14: 00000000004db820 R15: 00000000ffffffff [ 333.940344][ T8304] Kernel Offset: disabled [ 333.944676][ T8304] Rebooting in 86400 seconds..