Warning: Permanently added '[localhost]:52202' (ECDSA) to the list of known hosts. 2019/11/29 10:44:38 fuzzer started [ 72.233370][ T38] audit: type=1400 audit(1575024278.130:42): avc: denied { map } for pid=7902 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16525 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2019/11/29 10:44:40 dialing manager at 10.0.2.10:46599 2019/11/29 10:44:41 syscalls: 2543 2019/11/29 10:44:41 code coverage: enabled 2019/11/29 10:44:41 comparison tracing: enabled 2019/11/29 10:44:41 extra coverage: extra coverage is not supported by the kernel 2019/11/29 10:44:41 setuid sandbox: enabled 2019/11/29 10:44:41 namespace sandbox: enabled 2019/11/29 10:44:41 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/29 10:44:41 fault injection: enabled 2019/11/29 10:44:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/29 10:44:41 net packet injection: enabled 2019/11/29 10:44:41 net device setup: enabled 2019/11/29 10:44:41 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/29 10:44:41 devlink PCI setup: PCI device 0000:00:10.0 is not available 10:44:57 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fchownat(r0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1000) [ 91.858209][ T38] audit: type=1400 audit(1575024297.750:43): avc: denied { map } for pid=7923 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17747 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 10:44:57 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) [ 92.066567][ T7924] IPVS: ftp: loaded support on port[0] = 21 [ 92.074468][ T7926] IPVS: ftp: loaded support on port[0] = 21 10:44:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r0, 0x8954, 0x0) [ 92.213013][ T7926] chnl_net:caif_netlink_parms(): no params data found [ 92.238944][ T7928] IPVS: ftp: loaded support on port[0] = 21 10:44:58 executing program 3: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x8) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000280), &(0x7f0000000300)=0x4) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='configfs\x00\xbd\xacg>\xe5\xeb\x8eU\xa4\x95>\x17\xcfh\x86\xb7\xa2\x80\xd3}\xc9\xce#_l\x875\xa6\xd9\xb3$/\xc9\x94\x165\xb0t\xf8;H\xee\xb9\x84f\xf9|\x83\f\xe1\xa9\xda\xe9K#V,\x18\xd8D9\x89\xb8\xfd\xd6\x99\a\xf0\xd6\xdf', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) [ 92.268242][ T7924] chnl_net:caif_netlink_parms(): no params data found [ 92.284336][ T7926] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.292669][ T7926] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.302400][ T7926] device bridge_slave_0 entered promiscuous mode [ 92.324986][ T7926] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.333408][ T7926] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.342699][ T7926] device bridge_slave_1 entered promiscuous mode [ 92.374818][ T7926] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 92.385830][ T7926] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 10:44:58 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x182) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da90dce632e1e4efa40c25402952a8dd77a5bf0805cfc3425350"}) [ 92.433398][ T7926] team0: Port device team_slave_0 added [ 92.442252][ T7926] team0: Port device team_slave_1 added [ 92.458221][ T7924] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.466963][ T7924] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.478162][ T7933] IPVS: ftp: loaded support on port[0] = 21 [ 92.486933][ T7924] device bridge_slave_0 entered promiscuous mode 10:44:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) [ 92.562914][ T7926] device hsr_slave_0 entered promiscuous mode [ 92.631305][ T7926] device hsr_slave_1 entered promiscuous mode [ 92.710004][ T7924] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.711559][ T7936] IPVS: ftp: loaded support on port[0] = 21 [ 92.718847][ T7924] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.731323][ T7924] device bridge_slave_1 entered promiscuous mode [ 92.765166][ T7924] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 92.776430][ T7924] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 92.787937][ T7938] IPVS: ftp: loaded support on port[0] = 21 [ 92.826505][ T7928] chnl_net:caif_netlink_parms(): no params data found [ 92.861441][ T7924] team0: Port device team_slave_0 added [ 92.877094][ T38] audit: type=1400 audit(1575024298.770:44): avc: denied { create } for pid=7926 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 92.904136][ T38] audit: type=1400 audit(1575024298.800:45): avc: denied { write } for pid=7926 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 92.930611][ T38] audit: type=1400 audit(1575024298.800:46): avc: denied { read } for pid=7926 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 92.968156][ T7924] team0: Port device team_slave_1 added [ 92.975534][ T7926] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 93.098197][ T7926] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 93.153963][ T7926] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 93.283806][ T7926] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 93.342351][ T7928] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.349709][ T7928] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.357762][ T7928] device bridge_slave_0 entered promiscuous mode [ 93.369349][ T7928] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.377505][ T7928] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.385543][ T7928] device bridge_slave_1 entered promiscuous mode [ 93.452603][ T7924] device hsr_slave_0 entered promiscuous mode [ 93.491004][ T7924] device hsr_slave_1 entered promiscuous mode [ 93.530866][ T7924] debugfs: Directory 'hsr0' with parent '/' already present! [ 93.548205][ T7928] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 93.560079][ T7928] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 93.569572][ T7933] chnl_net:caif_netlink_parms(): no params data found [ 93.605025][ T7928] team0: Port device team_slave_0 added [ 93.624493][ T7928] team0: Port device team_slave_1 added [ 93.636996][ T7933] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.644158][ T7933] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.652010][ T7933] device bridge_slave_0 entered promiscuous mode [ 93.669463][ T7933] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.676815][ T7933] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.684593][ T7933] device bridge_slave_1 entered promiscuous mode [ 93.736717][ T7933] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 93.749585][ T7933] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 93.832710][ T7928] device hsr_slave_0 entered promiscuous mode [ 93.881188][ T7928] device hsr_slave_1 entered promiscuous mode [ 93.940929][ T7928] debugfs: Directory 'hsr0' with parent '/' already present! [ 93.950999][ T7936] chnl_net:caif_netlink_parms(): no params data found [ 93.967449][ T7924] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 94.032397][ T7924] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 94.085152][ T7924] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 94.167207][ T7924] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 94.224520][ T7933] team0: Port device team_slave_0 added [ 94.233761][ T7933] team0: Port device team_slave_1 added [ 94.267839][ T7938] chnl_net:caif_netlink_parms(): no params data found [ 94.277024][ T7928] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 94.370027][ T7936] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.378405][ T7936] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.386469][ T7936] device bridge_slave_0 entered promiscuous mode [ 94.394855][ T7936] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.402519][ T7936] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.410270][ T7936] device bridge_slave_1 entered promiscuous mode [ 94.420165][ T7928] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 94.524102][ T7933] device hsr_slave_0 entered promiscuous mode [ 94.630997][ T7933] device hsr_slave_1 entered promiscuous mode [ 94.690864][ T7933] debugfs: Directory 'hsr0' with parent '/' already present! [ 94.710512][ T7928] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 94.773335][ T7928] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 94.860996][ T7936] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 94.872144][ T7936] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 94.895276][ T7936] team0: Port device team_slave_0 added [ 94.904951][ T7938] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.912630][ T7938] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.920656][ T7938] device bridge_slave_0 entered promiscuous mode [ 94.929471][ T7936] team0: Port device team_slave_1 added [ 94.941333][ T7926] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.957793][ T7938] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.965390][ T7938] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.973443][ T7938] device bridge_slave_1 entered promiscuous mode [ 95.062726][ T7936] device hsr_slave_0 entered promiscuous mode [ 95.101274][ T7936] device hsr_slave_1 entered promiscuous mode [ 95.160901][ T7936] debugfs: Directory 'hsr0' with parent '/' already present! [ 95.187531][ T7938] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 95.199534][ T7933] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 95.255277][ T7926] 8021q: adding VLAN 0 to HW filter on device team0 [ 95.264068][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.271953][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.282070][ T7938] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 95.307084][ T7938] team0: Port device team_slave_0 added [ 95.313313][ T7933] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 95.372480][ T7933] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 95.443832][ T7938] team0: Port device team_slave_1 added [ 95.451858][ T7933] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 95.503528][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.511810][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.519659][ T3746] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.526456][ T3746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.534389][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.543666][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.552459][ T3746] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.559698][ T3746] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.566711][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 95.575181][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.617872][ T7936] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 95.682690][ T7936] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 95.753549][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 95.812987][ T7938] device hsr_slave_0 entered promiscuous mode [ 95.871078][ T7938] device hsr_slave_1 entered promiscuous mode [ 95.910980][ T7938] debugfs: Directory 'hsr0' with parent '/' already present! [ 95.942412][ T7936] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 96.005796][ T7924] 8021q: adding VLAN 0 to HW filter on device bond0 [ 96.014317][ T7938] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 96.063215][ T7938] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 96.142567][ T7938] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 96.233040][ T7936] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 96.322473][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.331750][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.352202][ T7928] 8021q: adding VLAN 0 to HW filter on device bond0 [ 96.362549][ T7938] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 96.408600][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.416820][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.425839][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.434370][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.443669][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.452329][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.460484][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.471424][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 96.487752][ T7928] 8021q: adding VLAN 0 to HW filter on device team0 [ 96.503440][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 96.511263][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 96.518820][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 96.527332][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 96.535345][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 96.542946][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 96.564891][ T7924] 8021q: adding VLAN 0 to HW filter on device team0 [ 96.576320][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.584938][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.593655][ T4277] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.601159][ T4277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.608487][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.617255][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.625702][ T4277] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.632946][ T4277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.644083][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 96.652639][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 96.663254][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 96.688512][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.697191][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.707015][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.717597][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.726784][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.735074][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.743327][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.751521][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.759546][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.773096][ T7926] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.790465][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.799111][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.807833][ T1343] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.815025][ T1343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.823591][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 96.835171][ T38] audit: type=1400 audit(1575024302.730:47): avc: denied { associate } for pid=7926 comm="syz-executor.1" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 96.857407][ T7928] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.870904][ T7933] 8021q: adding VLAN 0 to HW filter on device bond0 [ 96.886278][ T7933] 8021q: adding VLAN 0 to HW filter on device team0 [ 96.893305][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 96.900576][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 96.909070][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 96.917247][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 96.924825][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.933308][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.941589][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.948371][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.965509][ T7936] 8021q: adding VLAN 0 to HW filter on device bond0 [ 96.983697][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 97.002864][ T7936] 8021q: adding VLAN 0 to HW filter on device team0 [ 97.010573][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 97.019501][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 97.024802][ T38] audit: type=1400 audit(1575024302.920:48): avc: denied { open } for pid=7950 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 97.028527][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 10:45:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r0, 0x8954, 0x0) [ 97.078939][ T7938] 8021q: adding VLAN 0 to HW filter on device bond0 10:45:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r0, 0x8954, 0x0) [ 97.086877][ T38] audit: type=1400 audit(1575024302.970:49): avc: denied { kernel } for pid=7950 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 10:45:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r0, 0x8954, 0x0) [ 97.116468][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 97.126624][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 97.135543][ T2781] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.143288][ T2781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.143735][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 10:45:03 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) [ 97.160551][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 97.170351][ T2781] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.178023][ T2781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.186937][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 10:45:03 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) [ 97.196245][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 10:45:03 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) [ 97.205656][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 97.215112][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 97.223744][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 97.233590][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 97.243036][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 97.251259][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 97.259318][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 97.279969][ T7924] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 97.291595][ T7924] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 97.309175][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 97.319666][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 97.328691][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 97.337633][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.345953][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 97.356645][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.365522][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 97.374912][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 97.384519][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 97.407105][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 97.415877][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 97.425508][ T1343] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.432746][ T1343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.440548][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 97.449720][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 97.459370][ T1343] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.466504][ T1343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.474903][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 97.482936][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 97.491793][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 97.501285][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 97.509725][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.518742][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 97.528287][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 97.538789][ T7938] 8021q: adding VLAN 0 to HW filter on device team0 [ 97.550057][ T7933] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 97.562957][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 97.578605][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 97.588419][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.596888][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 97.604556][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 97.624689][ T7924] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 97.633442][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 97.642396][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 97.651218][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 97.659500][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 97.668315][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.676033][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.684199][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 97.693588][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 97.702131][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 97.709782][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 97.727332][ T7936] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 97.738343][ T7936] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 97.755306][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 97.763888][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 97.773255][ T1343] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.781212][ T1343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.788474][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 97.796859][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.805239][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 97.813654][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 97.821770][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.830280][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 97.838861][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 97.846447][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 97.863878][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 97.871993][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 97.880379][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 97.888665][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 97.897330][ T1343] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 97.912298][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 97.928822][ T7936] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 97.937086][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 97.944667][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 97.952955][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 97.961745][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.969819][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 97.978671][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.988168][ T7938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 97.998516][ T7933] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 98.027924][ T7938] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 98.035932][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 98.044333][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 98.212607][ T38] audit: type=1804 audit(1575024304.110:50): pid=7980 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/syzkaller-testdir622897168/syzkaller.jbh0nn/0/file0/bus" dev="loop3" ino=22 res=1 10:45:04 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fchownat(r0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1000) 10:45:04 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) 10:45:04 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) [ 98.264350][ T8019] netlink: 160 bytes leftover after parsing attributes in process `syz-executor.5'. 10:45:04 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) 10:45:04 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x182) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da90dce632e1e4efa40c25402952a8dd77a5bf0805cfc3425350"}) 10:45:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) 10:45:04 executing program 3: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x8) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000280), &(0x7f0000000300)=0x4) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='configfs\x00\xbd\xacg>\xe5\xeb\x8eU\xa4\x95>\x17\xcfh\x86\xb7\xa2\x80\xd3}\xc9\xce#_l\x875\xa6\xd9\xb3$/\xc9\x94\x165\xb0t\xf8;H\xee\xb9\x84f\xf9|\x83\f\xe1\xa9\xda\xe9K#V,\x18\xd8D9\x89\xb8\xfd\xd6\x99\a\xf0\xd6\xdf', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) 10:45:04 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) 10:45:04 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fchownat(r0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1000) [ 98.379019][ T8036] netlink: 160 bytes leftover after parsing attributes in process `syz-executor.5'. 10:45:04 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) 10:45:04 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 10:45:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) 10:45:04 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x182) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da90dce632e1e4efa40c25402952a8dd77a5bf0805cfc3425350"}) [ 98.447454][ T8053] netlink: 160 bytes leftover after parsing attributes in process `syz-executor.5'. 10:45:04 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x8) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000280), &(0x7f0000000300)=0x4) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='configfs\x00\xbd\xacg>\xe5\xeb\x8eU\xa4\x95>\x17\xcfh\x86\xb7\xa2\x80\xd3}\xc9\xce#_l\x875\xa6\xd9\xb3$/\xc9\x94\x165\xb0t\xf8;H\xee\xb9\x84f\xf9|\x83\f\xe1\xa9\xda\xe9K#V,\x18\xd8D9\x89\xb8\xfd\xd6\x99\a\xf0\xd6\xdf', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) 10:45:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) 10:45:04 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x182) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da90dce632e1e4efa40c25402952a8dd77a5bf0805cfc3425350"}) 10:45:04 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fchownat(r0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1000) 10:45:04 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x182) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) [ 98.653610][ T8072] netlink: 160 bytes leftover after parsing attributes in process `syz-executor.5'. 10:45:04 executing program 3: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x8) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000280), &(0x7f0000000300)=0x4) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='configfs\x00\xbd\xacg>\xe5\xeb\x8eU\xa4\x95>\x17\xcfh\x86\xb7\xa2\x80\xd3}\xc9\xce#_l\x875\xa6\xd9\xb3$/\xc9\x94\x165\xb0t\xf8;H\xee\xb9\x84f\xf9|\x83\f\xe1\xa9\xda\xe9K#V,\x18\xd8D9\x89\xb8\xfd\xd6\x99\a\xf0\xd6\xdf', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) 10:45:04 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x182) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) memfd_create(0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) 10:45:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) [ 99.360753][ C3] hrtimer: interrupt took 24473 ns 10:45:38 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 10:46:27 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 10:46:27 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 10:46:27 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 10:46:27 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x8) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000280), &(0x7f0000000300)=0x4) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='configfs\x00\xbd\xacg>\xe5\xeb\x8eU\xa4\x95>\x17\xcfh\x86\xb7\xa2\x80\xd3}\xc9\xce#_l\x875\xa6\xd9\xb3$/\xc9\x94\x165\xb0t\xf8;H\xee\xb9\x84f\xf9|\x83\f\xe1\xa9\xda\xe9K#V,\x18\xd8D9\x89\xb8\xfd\xd6\x99\a\xf0\xd6\xdf', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) 10:46:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) 10:46:27 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x182) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) memfd_create(0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) 10:46:27 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fchownat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1000) 10:46:27 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 10:46:27 executing program 3: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x8) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000280), &(0x7f0000000300)=0x4) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='configfs\x00\xbd\xacg>\xe5\xeb\x8eU\xa4\x95>\x17\xcfh\x86\xb7\xa2\x80\xd3}\xc9\xce#_l\x875\xa6\xd9\xb3$/\xc9\x94\x165\xb0t\xf8;H\xee\xb9\x84f\xf9|\x83\f\xe1\xa9\xda\xe9K#V,\x18\xd8D9\x89\xb8\xfd\xd6\x99\a\xf0\xd6\xdf', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) 10:46:27 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 10:46:27 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 10:46:27 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 10:46:28 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 10:46:28 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 10:46:28 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) [ 182.970954][ T7932] tipc: TX() has been purged, node left! [ 183.122407][ T8154] IPVS: ftp: loaded support on port[0] = 21 [ 183.123217][ T8155] IPVS: ftp: loaded support on port[0] = 21 [ 183.154344][ T8158] IPVS: ftp: loaded support on port[0] = 21 [ 183.169612][ T8160] IPVS: ftp: loaded support on port[0] = 21 [ 183.201875][ T8159] IPVS: ftp: loaded support on port[0] = 21 [ 183.324091][ T8158] chnl_net:caif_netlink_parms(): no params data found [ 183.364123][ T8154] chnl_net:caif_netlink_parms(): no params data found [ 183.396317][ T8155] chnl_net:caif_netlink_parms(): no params data found [ 183.410010][ T8158] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.417470][ T8158] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.425748][ T8158] device bridge_slave_0 entered promiscuous mode [ 183.437854][ T8158] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.445126][ T8158] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.453017][ T8158] device bridge_slave_1 entered promiscuous mode [ 183.518171][ T8155] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.526071][ T8155] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.533908][ T8155] device bridge_slave_0 entered promiscuous mode [ 183.541070][ T8154] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.548015][ T8154] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.555987][ T8154] device bridge_slave_0 entered promiscuous mode [ 183.565440][ T8154] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.572810][ T8154] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.581028][ T8154] device bridge_slave_1 entered promiscuous mode [ 183.589454][ T8158] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 183.607679][ T8158] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 183.637864][ T8155] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.645143][ T8155] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.652797][ T8155] device bridge_slave_1 entered promiscuous mode [ 183.672441][ T8160] chnl_net:caif_netlink_parms(): no params data found [ 183.695632][ T8155] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 183.708469][ T8155] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 183.726858][ T8154] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 183.738725][ T8154] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 183.761223][ T8158] team0: Port device team_slave_0 added [ 183.770565][ T8159] chnl_net:caif_netlink_parms(): no params data found [ 183.797570][ T8155] team0: Port device team_slave_0 added [ 183.804345][ T8158] team0: Port device team_slave_1 added [ 183.811602][ T8155] team0: Port device team_slave_1 added [ 183.822953][ T8154] team0: Port device team_slave_0 added [ 183.852914][ T8154] team0: Port device team_slave_1 added [ 183.902590][ T8155] device hsr_slave_0 entered promiscuous mode [ 183.961395][ T8155] device hsr_slave_1 entered promiscuous mode [ 184.020971][ T8155] debugfs: Directory 'hsr0' with parent '/' already present! [ 184.033856][ T8160] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.041600][ T8160] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.049285][ T8160] device bridge_slave_0 entered promiscuous mode [ 184.060909][ T8160] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.068135][ T8160] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.076290][ T8160] device bridge_slave_1 entered promiscuous mode [ 184.094787][ T8160] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.108956][ T8160] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.119457][ T8159] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.126811][ T8159] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.134617][ T8159] device bridge_slave_0 entered promiscuous mode [ 184.223169][ T8158] device hsr_slave_0 entered promiscuous mode [ 184.311188][ T8158] device hsr_slave_1 entered promiscuous mode [ 184.350845][ T8158] debugfs: Directory 'hsr0' with parent '/' already present! [ 184.358289][ T8159] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.365785][ T8159] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.373714][ T8159] device bridge_slave_1 entered promiscuous mode [ 184.395127][ T8160] team0: Port device team_slave_0 added [ 184.403867][ T8160] team0: Port device team_slave_1 added [ 184.473178][ T8154] device hsr_slave_0 entered promiscuous mode [ 184.521110][ T8154] device hsr_slave_1 entered promiscuous mode [ 184.580890][ T8154] debugfs: Directory 'hsr0' with parent '/' already present! [ 184.598460][ T8159] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.641784][ T8159] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.712718][ T8160] device hsr_slave_0 entered promiscuous mode [ 184.751003][ T8160] device hsr_slave_1 entered promiscuous mode [ 184.810938][ T8160] debugfs: Directory 'hsr0' with parent '/' already present! [ 184.826965][ T8159] team0: Port device team_slave_0 added [ 184.837746][ T8159] team0: Port device team_slave_1 added [ 184.902502][ T8159] device hsr_slave_0 entered promiscuous mode [ 184.971094][ T8159] device hsr_slave_1 entered promiscuous mode [ 185.010937][ T8159] debugfs: Directory 'hsr0' with parent '/' already present! [ 185.095119][ T8158] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.118021][ T8155] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.135730][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.145225][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.156114][ T8158] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.177250][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.185500][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.193667][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.202776][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.211903][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.218893][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.229073][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.243919][ T8155] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.262393][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.271432][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.279763][ T2781] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.287334][ T2781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.295677][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.305141][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.314110][ T2781] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.321580][ T2781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.363044][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.371930][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.380174][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.388716][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.396995][ T2781] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.403950][ T2781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.411943][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.420123][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.428860][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.437567][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.446271][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.454479][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.462547][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.470609][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.484911][ T8154] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.496804][ T8158] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 185.508513][ T8158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.522796][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.531633][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.539625][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.548343][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.563399][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.572311][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.592166][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.599969][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.608485][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.617160][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 185.624982][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 185.638333][ T8160] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.652264][ T8154] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.679894][ T8155] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 185.690976][ T8155] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 185.702418][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.711199][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.719546][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.727628][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.735615][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.743966][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.752682][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.771226][ T8159] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.784718][ T8158] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.794384][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.802888][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.816748][ T7953] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.824016][ T7953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.844733][ T8160] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.858748][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.867210][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.874901][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.882823][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.890470][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.898393][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.906943][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.915802][ T2781] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.922882][ T2781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.931771][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.939815][ T2781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.952662][ T8159] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.983672][ T8155] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.993182][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 186.000636][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.008486][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.017081][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.027140][ T7953] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.034396][ T7953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.042470][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.051304][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.060264][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.068555][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.091720][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.100147][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.108979][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.117730][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.126595][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.135534][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.149911][ T3236] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.157332][ T3236] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.165228][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.173853][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.182538][ T3236] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.189721][ T3236] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.206410][ T8154] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 186.218749][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.230381][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.237961][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.246290][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.268431][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.277925][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.292504][ T4277] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.299278][ T4277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.317332][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.326518][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.336712][ T4277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.387267][ T8159] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 186.397811][ T8159] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 186.415348][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.425230][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.435247][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.443967][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.452611][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.460499][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.469112][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.477564][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.486226][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 186.494035][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.501815][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.509426][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.521187][ T595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.539592][ T8154] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.548263][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.556892][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.574444][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.583534][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.591920][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.606371][ T8160] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 186.617149][ T8160] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 186.632979][ T7944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.641425][ T7944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.649731][ T7944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.658077][ T7944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.667144][ T7944] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 186.674801][ T7944] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.682669][ T7944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.694758][ T8159] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.706361][ T7932] device bridge_slave_1 left promiscuous mode [ 186.713538][ T7932] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.784205][ T7932] device bridge_slave_0 left promiscuous mode [ 186.790456][ T7932] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.331779][ T7932] device hsr_slave_0 left promiscuous mode [ 187.401092][ T7932] device hsr_slave_1 left promiscuous mode [ 187.492166][ T7932] team0 (unregistering): Port device team_slave_1 removed [ 187.504348][ T7932] team0 (unregistering): Port device team_slave_0 removed [ 187.516748][ T7932] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 187.575405][ T7932] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 187.736560][ T7932] bond0 (unregistering): Released all slaves [ 187.959026][ T8160] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.966832][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 187.977418][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 10:46:34 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fchownat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1000) 10:46:34 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 10:46:34 executing program 3: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x8) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000280), &(0x7f0000000300)=0x4) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='configfs\x00\xbd\xacg>\xe5\xeb\x8eU\xa4\x95>\x17\xcfh\x86\xb7\xa2\x80\xd3}\xc9\xce#_l\x875\xa6\xd9\xb3$/\xc9\x94\x165\xb0t\xf8;H\xee\xb9\x84f\xf9|\x83\f\xe1\xa9\xda\xe9K#V,\x18\xd8D9\x89\xb8\xfd\xd6\x99\a\xf0\xd6\xdf', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)) 10:46:34 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x8) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000280), &(0x7f0000000300)=0x4) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='configfs\x00\xbd\xacg>\xe5\xeb\x8eU\xa4\x95>\x17\xcfh\x86\xb7\xa2\x80\xd3}\xc9\xce#_l\x875\xa6\xd9\xb3$/\xc9\x94\x165\xb0t\xf8;H\xee\xb9\x84f\xf9|\x83\f\xe1\xa9\xda\xe9K#V,\x18\xd8D9\x89\xb8\xfd\xd6\x99\a\xf0\xd6\xdf', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) 10:46:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) 10:46:34 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x182) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) 10:46:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) 10:46:34 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) [ 188.358006][ T8250] netlink: 160 bytes leftover after parsing attributes in process `syz-executor.5'. 10:46:34 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x182) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) 10:46:34 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fchownat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1000) 10:46:34 executing program 3: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x8) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000280), &(0x7f0000000300)=0x4) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='configfs\x00\xbd\xacg>\xe5\xeb\x8eU\xa4\x95>\x17\xcfh\x86\xb7\xa2\x80\xd3}\xc9\xce#_l\x875\xa6\xd9\xb3$/\xc9\x94\x165\xb0t\xf8;H\xee\xb9\x84f\xf9|\x83\f\xe1\xa9\xda\xe9K#V,\x18\xd8D9\x89\xb8\xfd\xd6\x99\a\xf0\xd6\xdf', 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)) 10:46:34 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x182) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) 10:46:34 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) 10:46:34 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) [ 191.603183][ T8275] netlink: 160 bytes leftover after parsing attributes in process `syz-executor.5'. 10:46:37 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x8) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000280), &(0x7f0000000300)=0x4) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='configfs\x00\xbd\xacg>\xe5\xeb\x8eU\xa4\x95>\x17\xcfh\x86\xb7\xa2\x80\xd3}\xc9\xce#_l\x875\xa6\xd9\xb3$/\xc9\x94\x165\xb0t\xf8;H\xee\xb9\x84f\xf9|\x83\f\xe1\xa9\xda\xe9K#V,\x18\xd8D9\x89\xb8\xfd\xd6\x99\a\xf0\xd6\xdf', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) 10:46:37 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fchownat(r0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1000) 10:46:37 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x182) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) 10:46:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) 10:46:37 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fchownat(r0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1000) 10:46:37 executing program 4: ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) 10:46:37 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) socket$kcm(0x10, 0x0, 0x10) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) [ 191.757310][ T8301] netlink: 160 bytes leftover after parsing attributes in process `syz-executor.5'. 10:46:37 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fchownat(r0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1000) 10:46:37 executing program 3: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x8) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000280), &(0x7f0000000300)=0x4) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x2, &(0x7f0000000000)) 10:46:37 executing program 4: ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) 10:46:37 executing program 5: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) 10:46:37 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fchownat(r0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1000) 10:46:37 executing program 4: ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) 10:46:37 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 10:46:37 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x8) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000280), &(0x7f0000000300)=0x4) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='configfs\x00\xbd\xacg>\xe5\xeb\x8eU\xa4\x95>\x17\xcfh\x86\xb7\xa2\x80\xd3}\xc9\xce#_l\x875\xa6\xd9\xb3$/\xc9\x94\x165\xb0t\xf8;H\xee\xb9\x84f\xf9|\x83\f\xe1\xa9\xda\xe9K#V,\x18\xd8D9\x89\xb8\xfd\xd6\x99\a\xf0\xd6\xdf', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)) 10:46:37 executing program 5: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) 10:46:37 executing program 5: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) 10:46:37 executing program 4: r0 = syz_open_dev$loop(0x0, 0x4, 0x182) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) 10:46:37 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fchownat(r0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1000) 10:46:37 executing program 3: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x8) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000280), &(0x7f0000000300)=0x4) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)) 10:46:37 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 10:46:37 executing program 4: r0 = syz_open_dev$loop(0x0, 0x4, 0x182) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) 10:46:37 executing program 5: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) 10:46:38 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fchownat(r0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1000) 10:46:38 executing program 5: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) 10:46:38 executing program 4: r0 = syz_open_dev$loop(0x0, 0x4, 0x182) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) 10:46:38 executing program 5: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) 10:46:38 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x8) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000280), &(0x7f0000000300)=0x4) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='configfs\x00\xbd\xacg>\xe5\xeb\x8eU\xa4\x95>\x17\xcfh\x86\xb7\xa2\x80\xd3}\xc9\xce#_l\x875\xa6\xd9\xb3$/\xc9\x94\x165\xb0t\xf8;H\xee\xb9\x84f\xf9|\x83\f\xe1\xa9\xda\xe9K#V,\x18\xd8D9\x89\xb8\xfd\xd6\x99\a\xf0\xd6\xdf', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)) 10:46:38 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) 10:46:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 10:46:38 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 10:46:38 executing program 3: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x8) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000280), &(0x7f0000000300)=0x4) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) io_setup(0x2, &(0x7f0000000000)) 10:46:38 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchownat(r0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1000) 10:46:38 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) 10:46:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 10:46:39 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, "3fe867eb55c74596693ea1135435555840fca0a9035ad5035b9ab8f043cd0e9b0575dd0cbe8256a7af4316ace1660d8ae33ed8f252d632f2203a231e1fdb1ce5", "9cc59c4fc6f1c318e852177c97623c938ac6652b28140caee899192ff95a8250d54108a13b05809ec8b71effbd44b6c094e86a88a5670db790b24cbfae973f4a", "5e2bc2e15e3271b96a70c5c54a3871be4e894d7a519219757597002905fb72c3"}) [ 297.430685][ C3] rcu: INFO: rcu_preempt self-detected stall on CPU [ 297.434648][ C3] rcu: 3-....: (10500 ticks this GP) idle=e4a/1/0x4000000000000004 softirq=8902/8902 fqs=4999 [ 297.434648][ C3] (t=10500 jiffies g=7153 q=1557) [ 297.434648][ C3] NMI backtrace for cpu 3 [ 297.434648][ C3] CPU: 3 PID: 8392 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 297.459517][ C3] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 297.459517][ C3] Call Trace: [ 297.459517][ C3] [ 297.459517][ C3] dump_stack+0x197/0x210 [ 297.459517][ C3] nmi_cpu_backtrace.cold+0x70/0xb2 [ 297.459517][ C3] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 297.459517][ C3] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 297.459517][ C3] arch_trigger_cpumask_backtrace+0x14/0x20 [ 297.459517][ C3] rcu_dump_cpu_stacks+0x183/0x1cf [ 297.459517][ C3] ? find_next_bit+0x107/0x130 [ 297.459517][ C3] rcu_sched_clock_irq.cold+0x509/0xc02 [ 297.459517][ C3] ? raise_softirq+0x138/0x340 [ 297.459517][ C3] update_process_times+0x2d/0x70 [ 297.459517][ C3] tick_sched_handle+0xa2/0x190 [ 297.459517][ C3] tick_sched_timer+0x53/0x140 [ 297.459517][ C3] __hrtimer_run_queues+0x364/0xe40 [ 297.459517][ C3] ? tick_sched_do_timer+0x1b0/0x1b0 [ 297.459517][ C3] ? hrtimer_init+0x330/0x330 [ 297.459517][ C3] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 297.459517][ C3] ? ktime_get_update_offsets_now+0x2ce/0x430 [ 297.459517][ C3] hrtimer_interrupt+0x314/0x770 [ 297.459517][ C3] smp_apic_timer_interrupt+0x160/0x610 [ 297.459517][ C3] apic_timer_interrupt+0xf/0x20 [ 297.459517][ C3] RIP: 0010:icmp6_send+0x0/0x1f90 [ 297.459517][ C3] Code: 44 89 45 c0 e8 61 4f 37 fb 44 8b 45 c0 e9 9e fe ff ff 4c 89 f7 e8 b0 4e 37 fb e9 58 fe ff ff 90 66 2e 0f 1f 84 00 00 00 00 00 <4c> 8d 54 24 08 48 83 e4 f0 41 ff 72 f8 55 48 89 e5 48 8d 85 50 fe [ 297.459517][ C3] RSP: 0018:ffff88807ed09388 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 297.459517][ C3] RAX: ffff888061be4580 RBX: 0000000000000001 RCX: 0000000000000000 [ 297.459517][ C3] RDX: 0000000000000003 RSI: 0000000000000001 RDI: ffff88806bee9200 [ 297.459517][ C3] RBP: ffff88807ed093c0 R08: 0000000000000000 R09: ffffed100fda7045 [ 297.459517][ C3] R10: ffffed100fda7044 R11: ffff88807ed38223 R12: 0000000000000003 [ 297.459517][ C3] R13: ffff88806bee9200 R14: 0000000000000000 R15: ffffffff867abd00 [ 297.459517][ C3] ? apic_timer_interrupt+0xa/0x20 [ 297.459517][ C3] ? icmpv6_push_pending_frames+0x540/0x540 [ 297.459517][ C3] ? icmpv6_send+0xec/0x220 [ 297.459517][ C3] ip6_link_failure+0x2b/0x530 [ 297.459517][ C3] ? inet6_rtm_getroute+0x1460/0x1460 [ 297.459517][ C3] vti_tunnel_xmit+0x7d9/0x17a0 [ 297.459517][ C3] ? vti_rcv_tunnel+0x1a0/0x1a0 [ 297.459517][ C3] ? __this_cpu_preempt_check+0x2c/0x190 [ 297.459517][ C3] ? __this_cpu_preempt_check+0x2c/0x190 [ 297.459517][ C3] dev_hard_start_xmit+0x1a3/0x9b0 [ 297.459517][ C3] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.459517][ C3] __dev_queue_xmit+0x2b05/0x35c0 [ 297.459517][ C3] ? mark_held_locks+0xa4/0xf0 [ 297.459517][ C3] ? __local_bh_enable_ip+0x15a/0x270 [ 297.459517][ C3] ? _raw_write_unlock_bh+0x2c/0x30 [ 297.459517][ C3] ? __local_bh_enable_ip+0x15a/0x270 [ 297.459517][ C3] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 297.459517][ C3] ? __local_bh_enable_ip+0x70/0x270 [ 297.459517][ C3] ? _raw_write_unlock_bh+0x2c/0x30 [ 297.459517][ C3] ? ___neigh_create+0xdb4/0x2560 [ 297.459517][ C3] ? mark_held_locks+0xf0/0xf0 [ 297.459517][ C3] ? debug_smp_processor_id+0x33/0x18a [ 297.459517][ C3] dev_queue_xmit+0x18/0x20 [ 297.459517][ C3] ? dev_queue_xmit+0x18/0x20 [ 297.459517][ C3] neigh_direct_output+0x16/0x20 [ 297.459517][ C3] ip6_finish_output2+0x109a/0x25c0 [ 297.459517][ C3] ? ip6_mtu+0x2e6/0x450 [ 297.459517][ C3] ? ip6_frag_next+0xb20/0xb20 [ 297.459517][ C3] ? lock_downgrade+0x920/0x920 [ 297.459517][ C3] ? rcu_read_lock_held+0x9c/0xb0 [ 297.459517][ C3] ? __kasan_check_read+0x11/0x20 [ 297.459517][ C3] __ip6_finish_output+0x444/0xaa0 [ 297.459517][ C3] ? __ip6_finish_output+0x444/0xaa0 [ 297.459517][ C3] ip6_finish_output+0x38/0x1f0 [ 297.459517][ C3] ip6_output+0x25e/0x880 [ 297.459517][ C3] ? ip6_finish_output+0x1f0/0x1f0 [ 297.459517][ C3] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 297.459517][ C3] ? __ip6_finish_output+0xaa0/0xaa0 [ 297.459517][ C3] ? rcu_read_lock_held_common+0x130/0x130 [ 297.459517][ C3] ndisc_send_skb+0xf1f/0x1490 [ 297.459517][ C3] ? nf_hook.constprop.0+0x560/0x560 [ 297.459517][ C3] ? memset+0x32/0x40 [ 297.459517][ C3] ndisc_send_rs+0x134/0x720 [ 297.459517][ C3] addrconf_rs_timer+0x30f/0x6e0 [ 297.459517][ C3] ? ipv6_get_lladdr+0x490/0x490 [ 297.459517][ C3] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 297.459517][ C3] call_timer_fn+0x1ac/0x780 [ 297.459517][ C3] ? ipv6_get_lladdr+0x490/0x490 [ 297.459517][ C3] ? msleep_interruptible+0x150/0x150 [ 297.459517][ C3] ? ipv6_get_lladdr+0x490/0x490 [ 297.459517][ C3] run_timer_softirq+0x6c3/0x1790 [ 297.459517][ C3] ? add_timer+0x930/0x930 [ 297.459517][ C3] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 297.459517][ C3] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 297.459517][ C3] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 297.459517][ C3] __do_softirq+0x262/0x98c [ 297.459517][ C3] ? sched_clock_cpu+0x14e/0x1b0 [ 297.459517][ C3] irq_exit+0x19b/0x1e0 [ 297.459517][ C3] smp_apic_timer_interrupt+0x1a3/0x610 [ 297.459517][ C3] apic_timer_interrupt+0xf/0x20 [ 297.459517][ C3] [ 297.459517][ C3] RIP: 0010:_raw_spin_unlock_irq+0x4f/0x80 [ 297.459517][ C3] Code: c0 68 34 13 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 33 48 83 3d 12 6a 96 01 00 74 20 fb 66 0f 1f 44 00 00 01 00 00 00 e8 e7 ab d3 f9 65 8b 05 18 54 85 78 85 c0 74 06 41 [ 297.459517][ C3] RSP: 0018:ffff888061bdf7f8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 297.459517][ C3] RAX: 1ffffffff122668d RBX: ffff888061be4580 RCX: 0000000000000000 [ 297.459517][ C3] RDX: dffffc0000000000 RSI: 0000000000000006 RDI: ffff888061be4e14 [ 297.459517][ C3] RBP: ffff888061bdf800 R08: ffff888061be4580 R09: 0000000000000000 [ 297.459517][ C3] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88807ed37380 [ 297.459517][ C3] R13: ffff888061a74500 R14: 0000000000000000 R15: 0000000000000001 [ 297.459517][ C3] ? _raw_spin_unlock_irq+0x23/0x80 [ 297.459517][ C3] finish_task_switch+0x147/0x750 [ 297.459517][ C3] ? finish_task_switch+0x119/0x750 [ 297.459517][ C3] __schedule+0x8e9/0x1f30 [ 297.459517][ C3] ? __sched_text_start+0x8/0x8 [ 297.459517][ C3] ? preempt_schedule+0x4b/0x60 [ 297.459517][ C3] preempt_schedule_common+0x4f/0xe0 [ 297.459517][ C3] preempt_schedule+0x4b/0x60 [ 297.459517][ C3] ___preempt_schedule+0x16/0x18 [ 297.459517][ C3] try_to_wake_up+0xbcc/0x1a80 [ 297.459517][ C3] ? futex_wake+0x41d/0x4d0 [ 297.459517][ C3] ? migrate_swap_stop+0x9f0/0x9f0 [ 297.459517][ C3] ? lock_downgrade+0x920/0x920 [ 297.459517][ C3] ? __kasan_check_write+0x14/0x20 [ 297.459517][ C3] ? __wake_q_add.isra.0+0x23/0xa0 [ 297.459517][ C3] wake_up_q+0xb2/0x140 [ 297.459517][ C3] futex_wake+0x429/0x4d0 [ 297.459517][ C3] ? get_futex_key+0x1b10/0x1b10 [ 297.459517][ C3] ? __kasan_check_read+0x11/0x20 [ 297.459517][ C3] ? __kasan_check_read+0x11/0x20 [ 297.459517][ C3] do_futex+0x358/0x1de0 [ 297.459517][ C3] ? __might_fault+0x12b/0x1e0 [ 297.459517][ C3] ? find_held_lock+0x35/0x130 [ 297.459517][ C3] ? futex_exit_release+0x70/0x70 [ 297.459517][ C3] ? lock_downgrade+0x920/0x920 [ 297.459517][ C3] ? __kasan_check_read+0x11/0x20 [ 297.459517][ C3] ? _copy_to_user+0x118/0x160 [ 297.459517][ C3] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 297.459517][ C3] __x64_sys_futex+0x3f7/0x590 [ 297.459517][ C3] ? do_futex+0x1de0/0x1de0 [ 297.459517][ C3] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 297.459517][ C3] ? do_syscall_64+0x26/0x790 [ 297.459517][ C3] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.459517][ C3] ? do_syscall_64+0x26/0x790 [ 297.459517][ C3] ? lockdep_hardirqs_on+0x421/0x5e0 [ 297.459517][ C3] ? trace_hardirqs_on+0x67/0x240 [ 297.459517][ C3] do_syscall_64+0xfa/0x790 [ 297.459517][ C3] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.459517][ C3] RIP: 0033:0x45a759 [ 297.459517][ C3] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.459517][ C3] RSP: 002b:00007fadc8170cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 297.459517][ C3] RAX: ffffffffffffffda RBX: 000000000071bfb0 RCX: 000000000045a759 [ 297.459517][ C3] RDX: 00000000004ae22d RSI: 0000000000000081 RDI: 000000000071bfb4 [ 297.459517][ C3] RBP: 000000000071bfa8 R08: 0000000000000002 R09: 0000000000000000 [ 297.459517][ C3] R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000071bfb4 [ 297.459517][ C3] R13: 00007fff13499e6f R14: 00007fadc8151000 R15: 0000000000000003