[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 65.096586][ T27] audit: type=1800 audit(1575095776.602:25): pid=8634 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 65.124867][ T27] audit: type=1800 audit(1575095776.602:26): pid=8634 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 65.178307][ T27] audit: type=1800 audit(1575095776.612:27): pid=8634 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.121' (ECDSA) to the list of known hosts. 2019/11/30 06:36:28 fuzzer started 2019/11/30 06:36:29 dialing manager at 10.128.0.26:36687 2019/11/30 06:36:34 syscalls: 2592 2019/11/30 06:36:34 code coverage: enabled 2019/11/30 06:36:34 comparison tracing: enabled 2019/11/30 06:36:34 extra coverage: enabled 2019/11/30 06:36:34 setuid sandbox: enabled 2019/11/30 06:36:34 namespace sandbox: enabled 2019/11/30 06:36:34 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/30 06:36:34 fault injection: enabled 2019/11/30 06:36:34 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/30 06:36:34 net packet injection: enabled 2019/11/30 06:36:34 net device setup: enabled 2019/11/30 06:36:34 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/30 06:36:34 devlink PCI setup: PCI device 0000:00:10.0 is not available 06:39:02 executing program 0: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) 06:39:02 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = dup(r0) connect$rds(r1, &(0x7f0000000000)={0x6}, 0x10) syzkaller login: [ 230.691934][ T8800] IPVS: ftp: loaded support on port[0] = 21 [ 230.841001][ T8800] chnl_net:caif_netlink_parms(): no params data found [ 230.894372][ T8800] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.902889][ T8800] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.912381][ T8800] device bridge_slave_0 entered promiscuous mode [ 230.922126][ T8800] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.930785][ T8800] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.939239][ T8800] device bridge_slave_1 entered promiscuous mode [ 230.966756][ T8800] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 230.978920][ T8800] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 230.994296][ T8803] IPVS: ftp: loaded support on port[0] = 21 [ 231.009995][ T8800] team0: Port device team_slave_0 added 06:39:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x1481, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) [ 231.018075][ T8800] team0: Port device team_slave_1 added [ 231.087948][ T8800] device hsr_slave_0 entered promiscuous mode 06:39:02 executing program 3: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x1) open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 231.275200][ T8800] device hsr_slave_1 entered promiscuous mode [ 231.373606][ T8805] IPVS: ftp: loaded support on port[0] = 21 [ 231.491904][ T8807] IPVS: ftp: loaded support on port[0] = 21 06:39:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c9130001", 0x1f}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="2400000021002553e5e86e70af57bb2602000020001c000000ff000c080017", 0x1f) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 231.542740][ T8800] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 231.621242][ T8800] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 231.686544][ T8800] netdevsim netdevsim0 netdevsim2: renamed from eth2 06:39:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xd) r1 = dup(r0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x540b, 0x0) [ 231.786863][ T8800] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 231.799975][ T8810] IPVS: ftp: loaded support on port[0] = 21 [ 231.844556][ T8803] chnl_net:caif_netlink_parms(): no params data found [ 231.875696][ T8805] chnl_net:caif_netlink_parms(): no params data found [ 232.036417][ T8803] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.043567][ T8803] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.049411][ T8814] IPVS: ftp: loaded support on port[0] = 21 [ 232.057272][ T8803] device bridge_slave_0 entered promiscuous mode [ 232.066804][ T8803] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.073867][ T8803] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.081497][ T8803] device bridge_slave_1 entered promiscuous mode [ 232.104820][ T8805] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.111892][ T8805] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.120058][ T8805] device bridge_slave_0 entered promiscuous mode [ 232.129707][ T8805] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.136942][ T8805] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.145594][ T8805] device bridge_slave_1 entered promiscuous mode [ 232.180487][ T8803] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.228669][ T8803] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.250114][ T8805] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.263951][ T8807] chnl_net:caif_netlink_parms(): no params data found [ 232.288646][ T8803] team0: Port device team_slave_0 added [ 232.299491][ T8803] team0: Port device team_slave_1 added [ 232.308125][ T8805] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.338430][ T8800] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.371913][ T8807] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.379379][ T8807] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.388170][ T8807] device bridge_slave_0 entered promiscuous mode [ 232.438229][ T8805] team0: Port device team_slave_0 added [ 232.444176][ T8807] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.451603][ T8807] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.459683][ T8807] device bridge_slave_1 entered promiscuous mode [ 232.546875][ T8803] device hsr_slave_0 entered promiscuous mode [ 232.595139][ T8803] device hsr_slave_1 entered promiscuous mode [ 232.644841][ T8803] debugfs: Directory 'hsr0' with parent '/' already present! [ 232.653716][ T8805] team0: Port device team_slave_1 added [ 232.661616][ T8807] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.677136][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.685507][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.703076][ T8810] chnl_net:caif_netlink_parms(): no params data found [ 232.716327][ T8807] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.728938][ T8800] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.764383][ T8807] team0: Port device team_slave_0 added [ 232.804878][ T8807] team0: Port device team_slave_1 added [ 232.827848][ T8803] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 232.948281][ T8805] device hsr_slave_0 entered promiscuous mode [ 232.985312][ T8805] device hsr_slave_1 entered promiscuous mode [ 233.024900][ T8805] debugfs: Directory 'hsr0' with parent '/' already present! [ 233.064052][ T8803] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 233.099598][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.109172][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.117704][ T8813] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.124908][ T8813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.132987][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.174825][ T8810] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.182565][ T8810] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.193282][ T8810] device bridge_slave_0 entered promiscuous mode [ 233.213181][ T8803] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 233.298455][ T8807] device hsr_slave_0 entered promiscuous mode [ 233.335149][ T8807] device hsr_slave_1 entered promiscuous mode [ 233.374826][ T8807] debugfs: Directory 'hsr0' with parent '/' already present! [ 233.382523][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.391693][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.403318][ T2864] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.410417][ T2864] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.418958][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.427785][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.444167][ T8810] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.452643][ T8810] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.460636][ T8810] device bridge_slave_1 entered promiscuous mode [ 233.480932][ T8803] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 233.547801][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.559608][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.568829][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 233.593297][ T8805] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 233.650258][ T8810] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 233.679317][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 233.688334][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.696915][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.705356][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.713971][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.722361][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.730956][ T8805] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 233.778656][ T8805] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 233.836487][ T8814] chnl_net:caif_netlink_parms(): no params data found [ 233.857446][ T8810] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 233.875535][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 233.883745][ T8805] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 233.947423][ T8807] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 234.002088][ T8807] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 234.039628][ T8807] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 234.098881][ T8807] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 234.172172][ T8810] team0: Port device team_slave_0 added [ 234.182098][ T8810] team0: Port device team_slave_1 added [ 234.228466][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 234.236900][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 234.278084][ T8810] device hsr_slave_0 entered promiscuous mode [ 234.315325][ T8810] device hsr_slave_1 entered promiscuous mode [ 234.366654][ T8810] debugfs: Directory 'hsr0' with parent '/' already present! [ 234.395393][ T8800] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 234.402589][ T8814] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.410746][ T8814] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.418901][ T8814] device bridge_slave_0 entered promiscuous mode [ 234.429231][ T8814] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.437132][ T8814] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.444934][ T8814] device bridge_slave_1 entered promiscuous mode [ 234.511167][ T8814] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.536628][ T8814] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.563736][ T8810] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 234.608657][ T8810] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 234.650141][ T8810] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 234.687744][ T8810] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 234.758616][ T8814] team0: Port device team_slave_0 added [ 234.799672][ T8814] team0: Port device team_slave_1 added [ 234.827779][ T8803] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.914472][ T8821] sg_write: data in/out 262577/32 bytes for SCSI command 0x4-- guessing data in; [ 234.914472][ T8821] program syz-executor.0 not setting count and/or reply_len properly [ 234.948461][ T8814] device hsr_slave_0 entered promiscuous mode [ 234.995114][ T8814] device hsr_slave_1 entered promiscuous mode [ 235.023773][ T8821] sg_write: data in/out 262577/32 bytes for SCSI command 0x4-- guessing data in; [ 235.023773][ T8821] program syz-executor.0 not setting count and/or reply_len properly [ 235.041608][ T8814] debugfs: Directory 'hsr0' with parent '/' already present! 06:39:06 executing program 0: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) [ 235.071487][ T8803] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.102041][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.110249][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.185099][ C0] hrtimer: interrupt took 37302 ns [ 235.185115][ T8805] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.234502][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.251397][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.260847][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.267935][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.277182][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.294965][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.303429][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.323077][ T2864] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.326242][ T8828] sg_write: data in/out 262577/32 bytes for SCSI command 0x4-- guessing data in; [ 235.326242][ T8828] program syz-executor.0 not setting count and/or reply_len properly [ 235.330200][ T2864] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.356360][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.365708][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.392187][ T8807] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.423215][ T8805] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.445021][ T8814] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 235.478176][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.486859][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.495399][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.502964][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.510709][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.519177][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 06:39:07 executing program 0: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) [ 235.546170][ T8814] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 235.578800][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.595523][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.612028][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.634260][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.642513][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.650427][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.659478][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.668527][ T2864] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.675627][ T2864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.680596][ T8835] sg_write: data in/out 262577/32 bytes for SCSI command 0x4-- guessing data in; [ 235.680596][ T8835] program syz-executor.0 not setting count and/or reply_len properly [ 235.688269][ T8803] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 235.716046][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.728838][ T8807] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.751445][ T8814] netdevsim netdevsim5 netdevsim2: renamed from eth2 06:39:07 executing program 0: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) [ 235.797211][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.809458][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.820049][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.834615][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.850478][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.860180][ T2864] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.867301][ T2864] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.882425][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.891847][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.923922][ T8839] sg_write: data in/out 262577/32 bytes for SCSI command 0x4-- guessing data in; [ 235.923922][ T8839] program syz-executor.0 not setting count and/or reply_len properly [ 235.927132][ T8810] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.968448][ T8814] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 236.002544][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 06:39:07 executing program 0: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) [ 236.011823][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.020933][ T2864] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.028059][ T2864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.036603][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.046122][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.054479][ T2864] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.061588][ T2864] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.074231][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.083672][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.150768][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 236.161811][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 236.177153][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 236.190759][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 236.196094][ T8843] sg_write: data in/out 262577/32 bytes for SCSI command 0x4-- guessing data in; [ 236.196094][ T8843] program syz-executor.0 not setting count and/or reply_len properly [ 236.202444][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.230511][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.239950][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.255853][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.264655][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 236.278401][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.293700][ T8810] 8021q: adding VLAN 0 to HW filter on device team0 06:39:07 executing program 0: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) [ 236.325950][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.334423][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.343648][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.353813][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.363368][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 236.377906][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.387731][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 236.399292][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.408288][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 236.422688][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.450067][ T8805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.470237][ T8807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.494825][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 236.502777][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 236.509820][ T8847] sg_write: data in/out 262577/32 bytes for SCSI command 0x4-- guessing data in; [ 236.509820][ T8847] program syz-executor.0 not setting count and/or reply_len properly [ 236.517712][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 236.542121][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.550958][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.565486][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.572559][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.587100][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.595980][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.604291][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.611378][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.621278][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 236.640091][ T8803] 8021q: adding VLAN 0 to HW filter on device batadv0 06:39:08 executing program 0: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) [ 236.663851][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 236.672287][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 236.696095][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 236.703568][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 236.758908][ T8805] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 236.783244][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.802429][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.808092][ T8851] sg_write: data in/out 262577/32 bytes for SCSI command 0x4-- guessing data in; [ 236.808092][ T8851] program syz-executor.0 not setting count and/or reply_len properly [ 236.814358][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.843850][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.853171][ T2864] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 236.922478][ T8807] 8021q: adding VLAN 0 to HW filter on device batadv0 06:39:08 executing program 0: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) 06:39:08 executing program 1: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) [ 236.967803][ T8810] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 236.987474][ T8810] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 237.002875][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.040589][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.062923][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 237.076557][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 237.084020][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.092996][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.134556][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 237.205191][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 237.212644][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 237.256332][ T8859] sg_write: data in/out 262577/32 bytes for SCSI command 0x4-- guessing data in; [ 237.256332][ T8859] program syz-executor.0 not setting count and/or reply_len properly 06:39:08 executing program 2: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) [ 237.301305][ T8814] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.364532][ T8810] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 237.427321][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.443873][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.461561][ T8862] sg_write: data in/out 262577/21 bytes for SCSI command 0x4-- guessing data in; [ 237.461561][ T8862] program syz-executor.1 not setting count and/or reply_len properly [ 237.463906][ T8814] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.508557][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.545832][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.589547][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.596687][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.632327][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.641504][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.657142][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.670637][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.677769][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.691820][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.708741][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.725434][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.734042][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.743881][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.753180][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.782173][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.794412][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.805490][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.813826][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.823067][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.835210][ T8814] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 237.889453][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 237.905417][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 237.920804][ T8814] 8021q: adding VLAN 0 to HW filter on device batadv0 06:39:09 executing program 3: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x1) open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 06:39:09 executing program 0: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) 06:39:09 executing program 1: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) 06:39:09 executing program 2: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) 06:39:09 executing program 5: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) 06:39:09 executing program 4: syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2000, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 06:39:09 executing program 4: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x1) open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 06:39:10 executing program 1: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) 06:39:10 executing program 0: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) 06:39:10 executing program 2: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) 06:39:10 executing program 5: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) 06:39:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000940)={0xe0, 0x13, 0x7, 0x0, 0x0, {0x0, 0xf0ffff, 0x600}, [@nested={0xcc, 0x0, [@generic="532c3e889a65766b1c614d", @typed={0x8, 0x0, @u32}, @generic="152b378a4d835dc7be6023405a59a33b78fe3e293863b1801c2457c243cb049712ff443be62062b3ba9afd2b3a7fa0c08aa29a08c0062478b666741bc9fb7451945c7a780163d5443224294b1dcb49b1a99d19b028afb7a31b459dc5469e1d4b9e7ca0113838abbd00aa8b10db99086e5c25cbd56abc200079431854bb9f3ca5a6845b4add3c1b1a4a15b07b55dc076baed10f9206b79ef3d31ed66b2dd3f24580d4d529c31c2503dbcaafc31e6b002e2255"]}]}, 0xe0}}, 0x0) 06:39:10 executing program 3: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x1) open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 06:39:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup(r1) dup2(r2, r0) pselect6(0x40, &(0x7f0000000000)={0xb}, 0x0, 0x0, 0x0, 0x0) 06:39:10 executing program 5: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) r2 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="60074000d50104000012000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1"], 0x3f) r3 = syz_open_dev$sg(0x0, 0x0, 0x163882) write$binfmt_aout(r3, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d50104000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913"], 0x49) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRES32, @ANYRES64, @ANYRESHEX, @ANYBLOB="c4fb3e015072819ece8d9105fbbb9f5ec212a329beb1c298a50c6aaf06375d9bd40378f23fb5ec6f1c0fef0845ad8a69f709e2132fab09362535eca64d25c6876bed3101bd0e23e835066badc8b5c0b73899ea28023bb9d18e8f85d740b833f3173daf0db7ac4dbec93513bbeaf30926fb366154ccd6961fc7736ceff3852a0e7e67732f08157cb68a2dedf0bc93932ece77ad509e168d678e3c57a3c80ed9b9a0bdd894e898bb37312ba6b901a6cb7d39a70ac3e21971da872e1548eb2687069de01fa532e214e3244b7e76d384d9017d44728bd2952c73e054687a17", @ANYPTR64, @ANYBLOB="a86c7e2dd2c0e274e8439ed3e1ca4ea45c3f380878c0d26caf9323d368c03ced36ba2df15129d2421d5273c8e20ae7cc5ddab979eff21e11ae5337176a6ad0c2dd32feb454a5bdf68022e600"/90, @ANYRESOCT, @ANYRES16, @ANYRES64=0x0], 0x17e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) 06:39:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x32, &(0x7f00006ed000), &(0x7f0000000000)=0x4) 06:39:11 executing program 4: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x1) open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 06:39:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x383, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0xffffff97, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0xf6}]}}}, @IFLA_ADDRESS={0xc, 0xa, @dev}]}, 0x48}}, 0x0) 06:39:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup(r1) dup2(r2, r0) pselect6(0x40, &(0x7f0000000000)={0xb}, 0x0, 0x0, 0x0, 0x0) 06:39:11 executing program 0: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file1\x00', 0x4000000000000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000100)="584653428af75a4cd5e299fab200d5b8d497696803272b4792bc7e0128b3be68091b8fb28375b8c2b8d400b5a1b37d94ff7f00000000000031a36ef513b156d561206925e179dbff866f2cd4ee385546ba87c550bf02749ed0c761f96adf27dc119bcd365121d8", 0x67}], 0x0, 0x0) [ 239.812456][ T8982] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 239.836328][ T8982] netlink: 'syz-executor.2': attribute type 7 has an invalid length. 06:39:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup(r1) dup2(r2, r0) pselect6(0x40, &(0x7f0000000000)={0xb}, 0x0, 0x0, 0x0, 0x0) 06:39:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 240.028360][ T8986] BUG: unable to handle page fault for address: fffff52002f00000 [ 240.036229][ T8986] #PF: supervisor read access in kernel mode [ 240.037496][ T8982] kobject: 'bridge1' (0000000004303145): kobject_uevent_env [ 240.042201][ T8986] #PF: error_code(0x0000) - not-present page [ 240.042209][ T8986] PGD 21ffee067 P4D 21ffee067 PUD aa11c067 PMD 60c57067 PTE 0 [ 240.049689][ T8982] kobject: 'bridge1' (0000000004303145): fill_kobj_path: path = '/devices/virtual/net/bridge1' [ 240.055536][ T8986] Oops: 0000 [#1] PREEMPT SMP KASAN [ 240.055550][ T8986] CPU: 1 PID: 8986 Comm: syz-executor.0 Not tainted 5.4.0-next-20191129-syzkaller #0 [ 240.055558][ T8986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.055665][ T8986] RIP: 0010:xfs_sb_read_verify+0xf0/0x540 [ 240.055683][ T8986] Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 18 04 00 00 4d 8b ac 24 30 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e a7 03 00 00 41 8b 75 00 bf 58 [ 240.123358][ T8986] RSP: 0018:ffffc90002e37918 EFLAGS: 00010a06 [ 240.129425][ T8986] RAX: dffffc0000000000 RBX: 1ffff920005c6f26 RCX: ffffc90002199000 [ 240.137395][ T8986] RDX: 1ffff92002f00000 RSI: ffffffff82a97e3b RDI: ffff8880a358eda0 [ 240.145365][ T8986] RBP: ffffc90002e37af8 R08: ffff8880a7ee6400 R09: ffffed1015ce7045 [ 240.153337][ T8986] R10: ffffed1015ce7044 R11: ffff8880ae738223 R12: ffff8880a358ec80 [ 240.161307][ T8986] R13: ffffc90017800000 R14: ffffc90002e37ad0 R15: ffff88805ce04000 [ 240.169282][ T8986] FS: 00007f3df355a700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 240.178212][ T8986] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 240.184796][ T8986] CR2: fffff52002f00000 CR3: 00000000a7eb7000 CR4: 00000000001406e0 [ 240.192773][ T8986] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 240.194366][ T4092] kobject: 'loop1' (0000000077409aca): kobject_uevent_env [ 240.200734][ T8986] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 240.200745][ T8986] Call Trace: [ 240.200832][ T8986] ? blk_insert_cloned_request+0x530/0x530 06:39:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup(r1) dup2(r2, r0) pselect6(0x40, &(0x7f0000000000)={0xb}, 0x0, 0x0, 0x0, 0x0) 06:39:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 240.200854][ T8986] ? xfs_sb_write_verify+0x470/0x470 [ 240.215010][ T4092] kobject: 'loop1' (0000000077409aca): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 240.215908][ T8986] ? __bio_add_page+0x550/0x550 [ 240.215993][ T8986] ? __kasan_check_read+0x11/0x20 [ 240.216013][ T8986] ? blk_finish_plug+0x8f/0xa2 [ 240.255131][ T8986] ? _xfs_buf_ioapply+0xa35/0x10f0 [ 240.260369][ T8986] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 240.266508][ T8986] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 240.272031][ T8986] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 240.277991][ T8986] xfs_buf_ioend+0x3f9/0xde0 [ 240.282562][ T8986] __xfs_buf_submit+0x391/0xe70 [ 240.287444][ T8986] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 240.293237][ T8986] xfs_buf_read_uncached+0x164/0x550 [ 240.298515][ T8986] xfs_readsb+0x2c6/0x530 [ 240.302841][ T8986] ? xfs_initialize_perag+0x560/0x560 [ 240.308197][ T8986] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 240.313997][ T8986] xfs_fc_fill_super+0x3e7/0x11c0 [ 240.319107][ T8986] get_tree_bdev+0x414/0x650 [ 240.323686][ T8986] ? xfs_mount_free+0x80/0x80 [ 240.328355][ T8986] xfs_fc_get_tree+0x1d/0x30 [ 240.332972][ T8986] vfs_get_tree+0x8e/0x300 [ 240.337414][ T8986] do_mount+0x135a/0x1b50 [ 240.341724][ T8986] ? copy_mount_string+0x40/0x40 [ 240.346682][ T8986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.352901][ T8986] ? copy_mount_options+0x2e8/0x3f0 [ 240.358078][ T8986] ksys_mount+0xdb/0x150 [ 240.362300][ T8986] __x64_sys_mount+0xbe/0x150 [ 240.366995][ T8986] do_syscall_64+0xfa/0x790 [ 240.371481][ T8986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.377349][ T8986] RIP: 0033:0x45d0ca [ 240.381227][ T8986] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 240.400857][ T8986] RSP: 002b:00007f3df3559a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 240.409284][ T8986] RAX: ffffffffffffffda RBX: 00007f3df3559b40 RCX: 000000000045d0ca [ 240.417240][ T8986] RDX: 00007f3df3559ae0 RSI: 0000000020000080 RDI: 00007f3df3559b00 [ 240.425188][ T8986] RBP: 0000000000000001 R08: 00007f3df3559b40 R09: 00007f3df3559ae0 [ 240.433145][ T8986] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 240.441094][ T8986] R13: 00000000004ca26c R14: 00000000004e28a8 R15: 00000000ffffffff [ 240.449049][ T8986] Modules linked in: [ 240.452936][ T8986] CR2: fffff52002f00000 [ 240.457077][ T8986] ---[ end trace 499fd6727b3bdf9f ]--- [ 240.462521][ T8986] RIP: 0010:xfs_sb_read_verify+0xf0/0x540 [ 240.468217][ T8986] Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 18 04 00 00 4d 8b ac 24 30 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e a7 03 00 00 41 8b 75 00 bf 58 [ 240.487800][ T8986] RSP: 0018:ffffc90002e37918 EFLAGS: 00010a06 [ 240.493858][ T8986] RAX: dffffc0000000000 RBX: 1ffff920005c6f26 RCX: ffffc90002199000 [ 240.501809][ T8986] RDX: 1ffff92002f00000 RSI: ffffffff82a97e3b RDI: ffff8880a358eda0 [ 240.509765][ T8986] RBP: ffffc90002e37af8 R08: ffff8880a7ee6400 R09: ffffed1015ce7045 [ 240.517712][ T8986] R10: ffffed1015ce7044 R11: ffff8880ae738223 R12: ffff8880a358ec80 [ 240.525664][ T8986] R13: ffffc90017800000 R14: ffffc90002e37ad0 R15: ffff88805ce04000 [ 240.533625][ T8986] FS: 00007f3df355a700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 240.542531][ T8986] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 240.549100][ T8986] CR2: fffff52002f00000 CR3: 00000000a7eb7000 CR4: 00000000001406e0 [ 240.557070][ T8986] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 240.565017][ T8986] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 240.572981][ T8986] Kernel panic - not syncing: Fatal exception [ 240.580336][ T8986] Kernel Offset: disabled [ 240.584670][ T8986] Rebooting in 86400 seconds..