[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 24.617063] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 28.984935] random: sshd: uninitialized urandom read (32 bytes read) [ 29.371320] random: sshd: uninitialized urandom read (32 bytes read) [ 30.086241] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.35' (ECDSA) to the list of known hosts. [ 35.732111] random: sshd: uninitialized urandom read (32 bytes read) 2018/08/29 21:28:21 fuzzer started [ 36.991820] random: cc1: uninitialized urandom read (8 bytes read) 2018/08/29 21:28:23 dialing manager at 10.128.0.26:41867 2018/08/29 21:28:32 syscalls: 1 2018/08/29 21:28:32 code coverage: enabled 2018/08/29 21:28:32 comparison tracing: enabled 2018/08/29 21:28:32 setuid sandbox: enabled 2018/08/29 21:28:32 namespace sandbox: enabled 2018/08/29 21:28:32 fault injection: enabled 2018/08/29 21:28:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/08/29 21:28:32 net packed injection: enabled 2018/08/29 21:28:32 net device setup: enabled [ 48.010057] random: crng init done 21:31:52 executing program 0: munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x181) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000040)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) accept4$bt_l2cap(r0, &(0x7f00000000c0), &(0x7f0000000100)=0xe, 0x80000) r2 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x4, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x8, 0x20}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r3, 0x7fff, 0x1f, 0x4}, 0x10) shmget$private(0x0, 0x4000, 0x10, &(0x7f0000ff9000/0x4000)=nil) write$cgroup_int(r0, &(0x7f0000000240)=0x800, 0x12) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000280)="b07a866d959e7b6cf1534b3b6a902e9068d096cd205db4bfee05a955f05e27ce10e882f6af366232fa59f8c64a009b7cbf14c1d1534effa778c8") r5 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x51a, 0xfffffffffffffffd, 0x8, 0x6, 0x0, 0x40, 0x10000, 0xc, 0x100000001, 0x7, 0x8, 0x0, 0x766, 0x8, 0xfffffffffffffffb, 0x61e7, 0x8, 0x8, 0x1, 0x4, 0x4, 0x401, 0x385, 0xb08a, 0x80000000, 0x7f, 0x7fffffff, 0x7, 0x0, 0x100000001, 0x1, 0x5, 0x3, 0x4, 0x4, 0x4, 0x0, 0x3, 0x6, @perf_bp={&(0x7f00000002c0), 0x1}, 0x8000, 0x2, 0xd1b9, 0x5, 0x20, 0x2, 0x6}, r1, 0x0, 0xffffffffffffffff, 0x2) ioctl$RTC_AIE_OFF(r2, 0x7002) syz_mount_image$msdos(&(0x7f0000000380)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x1000, 0x1, &(0x7f0000000500)=[{&(0x7f0000000400)="ff826761feb1f5452a153005d11153ffac5f17815f391afc00bc53c93050e085aff726e280657b73bbd5002873e657c8d13ba50a1f3ecbba0f04a8a1949898c0d2c7b16f96cf3eb61220450a406f2a970942e0c7de90bfd293f4930c1dbdbd8f6a0b2df9286da0c914cbc20b28e37863e4ee865abc4f14b5b94f79364ee9a1b3f18aa8977509fde350f09c1a98fc8fd51ff092d81d3d83b05e7dbbdf396383b06f589893adb780c3e0fbf6565bc976fc3e227c52a1ee169c8f69395b3975ecb4572998ea4036ab1fe4bc903fb3770b703715d7927b84049095febc2ad93e84608c9771c87d30a360d9b9d4dd66ddb74c1a9fa8", 0xf3}], 0x80, &(0x7f0000000540)={[{@nodots='nodots'}, {@dots='dots'}]}) ioctl$TCFLSH(r2, 0x540b, 0x3) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000580), &(0x7f00000005c0)) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000600)) ioctl$KVM_KVMCLOCK_CTRL(r4, 0xaead) getsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000640)={@remote, @multicast2}, &(0x7f0000000680)=0x8) r6 = dup(r2) ioctl$KVM_S390_INTERRUPT_CPU(r2, 0x4010ae94, &(0x7f00000006c0)={0x2, 0x2, 0x5}) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f0000000700)={r3, 0x3}, 0x8) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000740)=0x6e10d4c5, 0x4) ptrace$peekuser(0x3, r1, 0xffff) ioctl$KVM_KVMCLOCK_CTRL(r4, 0xaead) ptrace$peekuser(0x3, r1, 0x3) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000780)={0x1, 0x0, &(0x7f0000ff7000/0x3000)=nil}) 21:31:52 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x14800) connect(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x401, 0x4, 0x2, 0x4, {0xa, 0x4, 0x5, @dev={0xfe, 0x80, [], 0xb}, 0x7fff}}}, 0x80) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000140)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) recvfrom$packet(r1, &(0x7f0000000180)=""/13, 0xd, 0xe820ade4e6af05e3, &(0x7f0000000300)={0x11, 0x17, r2, 0x1, 0x7fff, 0x6, @dev={[], 0x15}}, 0x14) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000340)) r3 = getgid() lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r3, r4, r5) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000004c0)=""/237, &(0x7f00000005c0)=0xed) r6 = fcntl$getown(r0, 0x9) rt_sigqueueinfo(r6, 0x3, &(0x7f0000000600)={0x3f, 0x3, 0xff, 0x8}) syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x410000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000700)) splice(r0, &(0x7f0000000740), r1, &(0x7f0000000780), 0x9, 0x8) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000007c0)=0x5) fcntl$setownex(r1, 0xf, &(0x7f0000000800)={0x1, r6}) r7 = add_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000a00)="cc", 0x1, 0xffffffffffffffff) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000880)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000008c0)="704729b77bff3d93befa8695f99eb6a64df3d5c0e412f77cf6ccde6d5fb89c6329bde5a545ed8f34e1f58472cd204ba3976348119dbccf490df31d3cf571a129e41100a99f632714fa2e12c5ca29f1c29d99a31a33e5aefd109b230df3ea804f445a63b44ed8387a72363994aab221d2cc3a670c4a3f4eae5a4df61653b7a33cacebe36b22dbceb7e80df32b4652fe40582743e81e4aadc1c7f88d125d68058eb392591bbae3d5b17eb512bc0cb096180a3c3e4b", 0xb4, r7) clock_gettime(0x7, &(0x7f0000000a40)) pwrite64(r0, &(0x7f0000000a80)="893b3e825e3dd4ac70774173e716c6d82db311a2264589c284d8b7595393eb3d1a31b20ba2cac3dd655f20c77fdbb8080c6e8e1160c993b26474ed93ff0cb0534d7455071e1f3cad84e1aebe5b99eaccb5bf9ceef7a2b0bee69d", 0x5a, 0x42) syslog(0x0, &(0x7f0000000b00)=""/216, 0xd8) getegid() ioctl$KDSKBLED(r1, 0x4b65, 0x7fff) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000c00)={{0x1f8000000000, 0x38}}, 0x10) ioctl$KVM_RUN(r1, 0xae80, 0x0) 21:31:52 executing program 7: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000040)=""/4096) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000001040)='/dev/audio\x00', 0x101800, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000001080)=0x0) sched_rr_get_interval(r2, &(0x7f00000010c0)) kcmp(r2, r2, 0x5, r1, r0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000001100)={@hyper}) sendmsg$rds(r1, &(0x7f00000036c0)={0x0, 0x0, &(0x7f0000003340)=[{&(0x7f0000001140)=""/9, 0x9}, {&(0x7f0000001180)=""/15, 0xf}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/118, 0x76}, {&(0x7f0000002240)=""/255, 0xff}, {&(0x7f0000002340)=""/4096, 0x1000}], 0x6, &(0x7f0000003580)=[@fadd={0x58, 0x114, 0x6, {{0x0, 0x200}, &(0x7f00000033c0)=0x2, &(0x7f0000003400)=0x5, 0x1, 0x1, 0x3, 0x4, 0x2, 0xa95}}, @zcopy_cookie={0x18, 0x114, 0xc, 0xc114}, @zcopy_cookie={0x18, 0x114, 0xc, 0x80000000}, @mask_fadd={0x58, 0x114, 0x8, {{0x6}, &(0x7f0000003440)=0xe9c, &(0x7f0000003480)=0x4, 0x5ba9, 0x9, 0x5, 0x8, 0x2, 0x3}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000034c0)=""/116, 0x74}, &(0x7f0000003540)}}], 0x110, 0x40}, 0x800) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000003700)='/dev/full\x00', 0x80140, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) readahead(r1, 0x7, 0xfffffffffffff800) ioctl$VT_DISALLOCATE(r3, 0x5608) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003740)='/dev/ashmem\x00', 0x400, 0x0) setsockopt$inet_buf(r1, 0x0, 0x37, &(0x7f0000003780)="0ff879895150a6a41def101238999753e65b4b98b15319add252a173786f5e716bf6916a5566d9b04ad09785e6f3842c2a5c9e07bcb11d99019700700c1e80de81d333094610c493d16d42ac13be08ad14dc769e8aa72d6e6c0d3bb801178271a6582247264e540b8a1d59e9b0de402dfae20e620927640ed6a4c69b433eadd5e7f1813e7f3fc84a192221b0013a2ee9ce015201aaa2ccb1a656d1e491b59ee6f20b9df0b18bb22bd8c0d09124bb4809bb2e484509077d76306751413c52d5469da7", 0xc2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000003880)=""/15) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) connect$inet6(r3, &(0x7f00000038c0)={0xa, 0x4e23, 0x7, @mcast2, 0x7fff}, 0x1c) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000006, 0x810, r3, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000003900)='/dev/vcsa#\x00', 0x1ff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000039c0)={{0xa, 0x5, 0x2, 0xf3f3, 'syz1\x00', 0x96}, 0x5, 0x400, 0x6, r2, 0xa, 0xfff, 'syz0\x00', &(0x7f0000003940)=['/dev/vcsa#\x00', 'wlan0vboxnet1GPL\x00', '/dev/full\x00', '/dev/audio\x00', '/dev/ashmem\x00', '/dev/ashmem\x00', '/dev/vcsa#\x00', '\x00', '/dev/vcsa#\x00', 'keyringGPLmd5sum,mime_type&\x00'], 0x7c, [], [0x2, 0xff, 0x401, 0x5]}) bind$rds(r1, &(0x7f0000003b00)={0x2, 0x4e22, @multicast2}, 0x10) ioctl$void(r4, 0x5450) ioctl$KVM_S390_UCAS_MAP(r4, 0x4018ae50, &(0x7f0000003b40)={0x2, 0x289c, 0x68}) bind$rds(r3, &(0x7f0000003b80)={0x2, 0x4e23, @rand_addr=0x4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000003bc0)='/dev/full\x00') setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000003c00)=0x5, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000003c80)={{0x2, 0x0, 0x8, 0x3, 'syz0\x00', 0xd3ac}, 0x1, 0x10000170, 0x80, r2, 0x2, 0x2, 'syz1\x00', &(0x7f0000003c40)=['(.self}\\vboxnet1]self\x00', 'syz1\x00'], 0x1b, [], [0x2, 0x8, 0x6]}) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xa) perf_event_open(&(0x7f0000003e00)={0x0, 0x70, 0x8, 0x7fff, 0x3c52d19d, 0x100000000, 0x0, 0x3, 0x4, 0x7, 0x4, 0x0, 0x835b, 0x1, 0x0, 0xa33, 0x8, 0xe7c7, 0x3, 0x9e, 0x1, 0x9, 0x1, 0x81, 0x100000000, 0x5, 0x1, 0x4ff, 0x31b2, 0x3a99a9ce, 0x5, 0xe5, 0xe0c, 0x6, 0x2389647, 0xfffffffffffffe1f, 0x1, 0x9, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000003dc0), 0x4}, 0x1000, 0x20, 0x1, 0x5, 0x51, 0x1, 0x8}, r2, 0x1, r1, 0x8) 21:31:52 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10500, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x100) msgget(0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) chown(&(0x7f0000000080)='./file0\x00', r1, r4) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000001c0)={0x1, 0x1, 0x9, 0x3, 0x3}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000200)={@local, @remote, 0x0, 0x4, [@empty, @dev={0xac, 0x14, 0x14, 0xf}, @rand_addr=0x5, @multicast1]}, 0x20) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000240)={r0}) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000280)=""/106, &(0x7f0000000300)=0x6a) sendto$inet6(r0, &(0x7f0000000340)="bcc043248f", 0x5, 0xc810, 0x0, 0x0) getpeername$inet(r0, &(0x7f0000000380)={0x2, 0x0, @broadcast}, &(0x7f00000003c0)=0x10) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000400)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000540)={@loopback, @multicast2}, &(0x7f0000000580)=0xc) setsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f00000005c0)="1aceecf39191c540bb070e9870df5c14385555a1b2278f72686a69ad5299d04eb405fffbd92dcc79651740b922e501b04dafcbb519059471d5ea4b516cdee51e79af83b3f8bfd8b13df8cdb1bfa49ad2254d9e1d7bde366cd0e0bb82fdad5edc1a3e1b624b285a60f9b76a11c40bc655d843098f97f9ef91bef18011feb64522bf988e13f348910e4f5276eccf29434bc3174257c0e99e68610fbf721f5a3459fa744ff73aa98a4f56aada579388fbf057a4e795bea98e5f95944fa1eb26340bc43e90a3632fe116f5d73794e1a7c35f83", 0xd1) recvfrom$inet6(r0, &(0x7f00000006c0)=""/145, 0x91, 0x2041, &(0x7f0000000780)={0xa, 0x4e24, 0x4ba5, @mcast1, 0x30000}, 0x1c) sendmsg$nl_generic(r0, &(0x7f0000000900)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x200100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000800)={0x84, 0x2e, 0x600, 0x70bd29, 0x25dfdbff, {0x9}, [@typed={0x8, 0x44, @uid=r3}, @nested={0x68, 0x75, [@typed={0xc, 0x1e, @u64=0xff}, @typed={0x3c, 0x20, @str='ppp0wlan0[(vboxnet0selfmime_typenodevself$)-system+,)\x00'}, @typed={0x4, 0x19}, @generic, @typed={0x8, 0x1e, @pid=r2}, @typed={0x8, 0x93, @ipv4}, @typed={0x8, 0x8c, @fd=r0}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008080}, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000940)={'raw\x00', 0x2b, "4aca5c7120f8d4f73918ccf245e8a8f5d57dcaed0261519d8e0f4f22bbe6a1e13216dfe35b23f13b69ef60"}, &(0x7f00000009c0)=0x4f) clock_getres(0x7, &(0x7f0000000a00)) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000a80)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000b40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x300000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x14, r5, 0x10, 0x70bd28, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000b80)="ad846f1f088ebd0b01d367cb0be767a4b310af58a19f5741fd4936327ff3753016f0", 0x22) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000bc0)={0x8, 0x3b1f, 0xc96, 0x3ff, 0x9c4, 0x1, 0x0, 0x445f8b66, 0x4, 0x1}) r7 = socket$inet6(0xa, 0x3, 0x756) fstat(r7, &(0x7f0000000c00)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000c80)={0x5, 0x0, 0x7f, 0x4, 0x661}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000cc0)={0x8}, 0x1) r8 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x8, 0x100) name_to_handle_at(r8, &(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x2e, 0x81, "ac9bacded1cdaec73ca9a9ce0be683c2ae25fbde85a44e19ff436ada235c7858394935c61aeb"}, &(0x7f0000000dc0), 0x0) 21:31:52 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) recvmsg$kcm(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/126, 0x7e}, {&(0x7f00000010c0)=""/252, 0xfc}], 0x3, &(0x7f0000001200)=""/200, 0xc8, 0x938}, 0x1) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000001340)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000001380)='/dev/audio\x00', 0x101080, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000013c0)={{0x3, 0x3, 0x6, 0x0, 0x7}}) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000001400), &(0x7f0000001440)=0x40) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000001480)={0x0, 0x4c8f}, &(0x7f00000014c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000001500)={r2, 0x7fffffff}, &(0x7f0000001540)=0x8) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000001580)) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000015c0), &(0x7f0000001600)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000001640)=[@in={0x2, 0x4e24, @multicast1}], 0x10) ioctl$fiemap(r1, 0xc020660b, &(0x7f0000001680)={0x3, 0x9, 0x7, 0x46f7, 0x8, [{0x4, 0x7, 0x2, 0x0, 0x0, 0x2882}, {0x0, 0x3, 0x2, 0x0, 0x0, 0x4}, {0x401, 0x5df75116, 0x5, 0x0, 0x0, 0x602}, {0x3ff, 0xc0f, 0x80000000, 0x0, 0x0, 0x2a08}, {0x5, 0x9, 0x6, 0x0, 0x0, 0x8}, {0x10001, 0x6, 0x7fff, 0x0, 0x0, 0x402}, {0xfffffffffffff800, 0x8, 0x2, 0x0, 0x0, 0x480}, {0x35c, 0x0, 0x1f, 0x0, 0x0, 0x3380}]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000001900)={r3, 0x74, &(0x7f0000001880)=[@in6={0xa, 0x4e20, 0x3ff, @ipv4={[], [], @rand_addr=0x9}, 0x1}, @in6={0xa, 0x4e20, 0x100, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1d}}, 0x4}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1f}}, @in6={0xa, 0x4e21, 0x200, @mcast1, 0xff}, @in={0x2, 0x4e22, @broadcast}]}, &(0x7f0000001940)=0x10) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x1a89) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000001980)={0x7, {{0x2, 0x4e23, @remote}}}, 0x88) getsockopt$netlink(r0, 0x10e, 0x6, &(0x7f0000001a40)=""/163, &(0x7f0000001b00)=0xa3) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000001b40)={r2, 0x3, 0x1f, 0x8, 0x7fffffff, 0x100}, 0x14) fcntl$setstatus(r1, 0x4, 0x400) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000001b80)=""/215) write$P9_RREADLINK(r1, &(0x7f0000001c80)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r4 = semget$private(0x0, 0x3, 0x104) semctl$IPC_STAT(r4, 0x0, 0x2, &(0x7f0000001cc0)=""/207) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000001dc0)=""/194) semctl$GETALL(r4, 0x0, 0xd, &(0x7f0000001ec0)=""/245) r5 = syz_genetlink_get_family_id$team(&(0x7f0000002000)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002200)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002300)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002380)={0x0, @empty, @broadcast}, &(0x7f00000023c0)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000002500)={&(0x7f0000001fc0), 0xc, &(0x7f00000024c0)={&(0x7f0000002400)={0x98, r5, 0x4, 0x70bd27, 0x25dfdbfb, {}, [{{0x8, 0x1, r6}, {0x7c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff81}}, {0x8, 0x6, r7}}}]}}]}, 0x98}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) 21:31:52 executing program 4: socketpair(0x9, 0x0, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VT_ACTIVATE(r1, 0x5606, 0x1) r2 = semget$private(0x0, 0x0, 0x40) semctl$GETZCNT(r2, 0x2, 0xf, &(0x7f0000000040)=""/51) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000080)=""/138) syz_mount_image$nfs4(&(0x7f0000000140)='nfs4\x00', &(0x7f0000000180)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="5affb4085f129fd5ee", 0x9, 0x7}], 0x201000, &(0x7f0000000240)=':}eth1bdevproc-\x00') ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000280)={0xfffffffffffffbff, 0x10001, 0x1}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0x95) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000300)) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000340)=""/145) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0x4) ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000440)={0x100000000, 0x2, 0x1}) r4 = dup2(r3, r3) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0x4, &(0x7f0000000480)=0x100000001, 0x4) fsetxattr(r3, &(0x7f00000004c0)=@known='com.apple.system.Security\x00', &(0x7f0000000500)='proc\x00', 0x5, 0x1) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) truncate(&(0x7f0000000540)='./file0\x00', 0x7fff) fcntl$addseals(r4, 0x409, 0x4) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000580)=@dstopts={0x2e, 0xf, [], [@jumbo={0xc2, 0x4, 0x7ff}, @generic={0x4, 0x76, "06fa84fddb2c82c96d99884cd292d70eaabb40db3836ce7ed7aeb3786e078b4547443cf6dd7c6b31ce2bc10d769f59a849df1e6caf41d1aa7712198d593b50a9072d105004866d55853f0cd464cab3aa5617ac3430c75b13395c975f48520e2e5cac02bcb76a5c9e7ba16ac6ddb8a9b9775c8d309978"}]}, 0x88) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000640)={0x0, 0x2, 0x7, 0xfffffffffffffff9, 0x10000, 0xfffffffffffffff8}, &(0x7f0000000680)=0x14) setsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000006c0)={r5, 0x1f}, 0x8) getsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000700), &(0x7f0000000740)=0x4) r6 = getpid() process_vm_readv(r6, &(0x7f0000001b00)=[{&(0x7f0000000780)=""/1, 0x1}, {&(0x7f00000007c0)=""/189, 0xbd}, {&(0x7f0000000880)=""/135, 0x87}, {&(0x7f0000000940)=""/214, 0xd6}, {&(0x7f0000000a40)=""/158, 0x9e}, {&(0x7f0000000b00)=""/4096, 0x1000}], 0x6, &(0x7f0000001d40)=[{&(0x7f0000001b80)=""/204, 0xcc}, {&(0x7f0000001c80)=""/159, 0x9f}], 0x2, 0x0) r7 = syz_open_dev$dmmidi(&(0x7f0000001d80)='/dev/dmmidi#\x00', 0x5, 0x301000) accept$unix(r7, 0x0, &(0x7f0000001dc0)) socketpair(0xa, 0x4, 0xf1, &(0x7f0000001e00)) getsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000001e40)=""/52, &(0x7f0000001e80)=0x34) open(&(0x7f0000001ec0)='./file0\x00', 0x602040, 0x2) getsockopt$inet6_opts(r7, 0x29, 0x3f, &(0x7f0000001f00)=""/186, &(0x7f0000001fc0)=0xba) 21:31:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) bind$bt_hci(r0, &(0x7f00000000c0)={0x1f, r1, 0x1}, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x729746b3, 0x0, 0x9, 0x4b49}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x3, 0x1, 0x20a, 0xffffffff80000001, 0x100000001, 0x1, 0x7, 0x4, r2}, 0x20) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x200f1526, r3}, &(0x7f00000002c0)={0x4, 0x4, 0x4, 0xf2, 0x80, 0x1}) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000300)={0x74, 0x0, [0x400, 0x2, 0xb67b, 0x20]}) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x2000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000400)) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2010000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x40, r5, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x21}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x20008010) renameat2(r0, &(0x7f0000000580)='./file1\x00', r0, &(0x7f00000005c0)='./file0\x00', 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000600)={0x1ff, 0x70a0137cc3dc687e, 0xeb, 0x0, r2}, &(0x7f0000000640)=0x10) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000680)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x1}) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000006c0)=""/176) keyctl$set_reqkey_keyring(0xe, 0x2) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000780)={{0xff8, 0x10001, 0x4, 0xffffffffffff8000, 0x1ff, 0xfffffffffffffffb}, 0x9}) pause() setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000007c0), 0x4) bind$pptp(r0, &(0x7f0000000800)={0x18, 0x2, {0x2, @broadcast}}, 0x1e) ioctl$TIOCSBRK(r0, 0x5427) r6 = syz_open_dev$dmmidi(&(0x7f0000000840)='/dev/dmmidi#\x00', 0x0, 0x1) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000880)) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000008c0)={0xfffffffffffffeff, {{0xa, 0x4e23, 0x51a, @mcast2, 0x8}}}, 0x88) fcntl$setlease(r6, 0x400, 0x1) setsockopt$inet_dccp_int(r0, 0x21, 0x1f, &(0x7f0000000980)=0x6014, 0x4) syz_open_dev$midi(&(0x7f00000009c0)='/dev/midi#\x00', 0x4, 0x200000) 21:31:52 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') write$P9_RREMOVE(r0, &(0x7f0000000040)={0x7, 0x7b, 0x1}, 0x7) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f00000001c0)={'nat\x00', 0x0, 0x4, 0xf8, [], 0x1, &(0x7f0000000080)=[{}], &(0x7f00000000c0)=""/248}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000280)=0x7e000000000000, 0x4) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000340)={0x2713, 0x2, 0x1004, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000380)) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000003c0), 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x28, &(0x7f0000000400)}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000480)={0x0, r0, 0x2, 0x1}, 0x14) sendfile(r0, r0, &(0x7f00000004c0), 0x100000001) bind$vsock_stream(r0, &(0x7f0000000500)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) epoll_create(0x401) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x90, &(0x7f00000005c0)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e22, 0x3, @remote, 0x6890}, @in6={0xa, 0x4e23, 0xa4, @local, 0x1f}, @in6={0xa, 0x4e21, 0x4, @empty, 0x9}, @in6={0xa, 0x4e24, 0x0, @empty, 0x4}, @in={0x2, 0x4e24, @multicast2}]}, &(0x7f00000006c0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000700)={r1, 0xffffffff, 0x9, 0x8, 0x3da, 0xfffffffffffffffc}, &(0x7f0000000740)=0x14) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000780)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) getsockname$packet(r3, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000800)=0x14) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000840)={r2, 0x7626}, &(0x7f0000000880)=0x8) mq_open(&(0x7f00000008c0)='\x00', 0x40, 0x4, &(0x7f0000000900)={0x7fffffff, 0x3f, 0x2, 0x9, 0x5, 0x8, 0xffffffff80000001, 0x5}) getsockname$packet(r3, &(0x7f0000000940), &(0x7f0000000980)=0x14) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000009c0)={{0xffffffffffffffff, 0x0, 0x9, 0x2, 0xfb02}}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000a00)={r1, 0xfad0}, &(0x7f0000000a40)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000a80)={r4, 0x3ff}, &(0x7f0000000ac0)=0x8) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000b00)=0x880, 0x4) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) sendmsg$rds(r3, &(0x7f0000002200)={&(0x7f0000000b40)={0x2, 0x4e22}, 0x10, &(0x7f0000002140)=[{&(0x7f0000000b80)=""/200, 0xc8}, {&(0x7f0000000c80)=""/19, 0x13}, {&(0x7f0000000cc0)=""/57, 0x39}, {&(0x7f0000000d00)=""/216, 0xd8}, {&(0x7f0000000e00)=""/22, 0x16}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/156, 0x9c}, {&(0x7f0000001f00)=""/104, 0x68}, {&(0x7f0000001f80)=""/151, 0x97}, {&(0x7f0000002040)=""/235, 0xeb}], 0xa, 0x0, 0x0, 0x10}, 0x20000000) syz_open_dev$admmidi(&(0x7f0000002240)='/dev/admmidi#\x00', 0xfffffffffffffffa, 0x80000) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000002280)={0x4, @remote}) ioctl$KDSETMODE(r3, 0x4b3a, 0x8) [ 247.009760] IPVS: ftp: loaded support on port[0] = 21 [ 247.028908] IPVS: ftp: loaded support on port[0] = 21 [ 247.035023] IPVS: ftp: loaded support on port[0] = 21 [ 247.036681] IPVS: ftp: loaded support on port[0] = 21 [ 247.052391] IPVS: ftp: loaded support on port[0] = 21 [ 247.063059] IPVS: ftp: loaded support on port[0] = 21 [ 247.083405] IPVS: ftp: loaded support on port[0] = 21 [ 247.093654] IPVS: ftp: loaded support on port[0] = 21 [ 249.619974] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.626497] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.652667] device bridge_slave_0 entered promiscuous mode [ 249.690909] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.697342] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.719712] device bridge_slave_0 entered promiscuous mode [ 249.747519] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.753935] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.764050] device bridge_slave_0 entered promiscuous mode [ 249.775581] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.781986] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.796527] device bridge_slave_0 entered promiscuous mode [ 249.816731] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.823188] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.833116] device bridge_slave_0 entered promiscuous mode [ 249.840521] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.846961] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.879408] device bridge_slave_0 entered promiscuous mode [ 249.900088] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.906593] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.920429] device bridge_slave_1 entered promiscuous mode [ 249.940076] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.946584] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.963554] device bridge_slave_1 entered promiscuous mode [ 249.976133] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.982534] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.990875] device bridge_slave_1 entered promiscuous mode [ 249.999512] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.005919] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.013435] device bridge_slave_1 entered promiscuous mode [ 250.023937] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.030356] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.045211] device bridge_slave_0 entered promiscuous mode [ 250.053140] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.059619] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.067732] device bridge_slave_1 entered promiscuous mode [ 250.076996] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.083536] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.096504] device bridge_slave_0 entered promiscuous mode [ 250.108470] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.117613] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.126149] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.132688] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.148574] device bridge_slave_1 entered promiscuous mode [ 250.166382] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.172816] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.205793] device bridge_slave_1 entered promiscuous mode [ 250.213689] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.222999] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.229434] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.241982] device bridge_slave_1 entered promiscuous mode [ 250.256170] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 250.265203] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 250.273145] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.288221] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.299406] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.315537] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.362718] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 250.436432] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.445500] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 250.455525] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 250.464735] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 250.494726] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 250.605216] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 250.748643] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.791051] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.827159] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.937134] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.955985] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 250.965088] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 250.979222] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.001999] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.012941] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.022137] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.040497] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.128563] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.135619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.151117] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.160381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.174635] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.184917] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.198753] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.226058] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.237455] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.248174] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.255945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.282608] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.289569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.303685] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.317192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.349619] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.356570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.389408] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.396539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.412483] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.419509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.434501] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.441665] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.449596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.461175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.485075] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.515444] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.522348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.539339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.576804] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.585920] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.604044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.631580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.660016] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.666922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.692527] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.699471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.857476] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 251.873779] team0: Port device team_slave_0 added [ 251.949682] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 251.965341] team0: Port device team_slave_0 added [ 251.993944] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 252.006375] team0: Port device team_slave_0 added [ 252.031659] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 252.052405] team0: Port device team_slave_0 added [ 252.075825] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.087488] team0: Port device team_slave_1 added [ 252.109911] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 252.126092] team0: Port device team_slave_0 added [ 252.141190] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 252.151333] team0: Port device team_slave_0 added [ 252.172703] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.191188] team0: Port device team_slave_1 added [ 252.197898] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.211627] team0: Port device team_slave_1 added [ 252.217056] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 252.226423] team0: Port device team_slave_0 added [ 252.236665] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 252.253178] team0: Port device team_slave_0 added [ 252.270051] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.287446] team0: Port device team_slave_1 added [ 252.296445] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 252.305719] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.324808] team0: Port device team_slave_1 added [ 252.338960] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 252.345915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.362086] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.381176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.399978] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.408945] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.417046] team0: Port device team_slave_1 added [ 252.424863] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 252.432449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.440741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.466036] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 252.475353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 252.484528] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.498114] team0: Port device team_slave_1 added [ 252.506669] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 252.514069] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.525007] team0: Port device team_slave_1 added [ 252.538890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.556359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.589433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.603715] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.611214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.619082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.628707] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 252.635950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.644513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.655032] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 252.664762] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 252.675757] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 252.684660] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 252.695685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.715917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.734833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.752155] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.765562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.773556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.781327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.788960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.797344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 252.804839] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 252.814141] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 252.826195] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 252.838603] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 252.847574] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 252.855004] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 252.862436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.876177] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.911887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.937052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.961176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.970109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.977830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.985754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.993586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.001209] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.008794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.016696] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.024122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.031992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.043224] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 253.052727] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.059849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.070764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.079035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.096406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.113144] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 253.120378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.128583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.144079] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.154978] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 253.162195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.174228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.201459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.222019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.234591] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 253.241626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.249808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.269070] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.276312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.291996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.310860] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.323351] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.353989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.378144] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.385761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.404957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.424044] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 253.433409] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 253.446390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.461049] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.483052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.512081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.586821] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.594214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.606575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.658795] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 253.666077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.685449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.814704] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.821937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.834155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.707453] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.713994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.721041] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.727447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.761171] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 254.823564] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.829983] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.836674] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.843112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.899995] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 254.916964] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.923365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.930080] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.936479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.981601] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 255.052433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 255.070319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 255.095418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 255.133852] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.140315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.147034] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.153441] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.175685] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 255.184849] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.191288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.197973] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.204383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.215617] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 255.380995] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.387419] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.394130] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.400534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.443498] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 255.450376] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.456769] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.463503] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.469907] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.491753] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 255.525454] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.531893] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.538618] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.545043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.609917] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 256.083506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.096964] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.134577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.151225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.159092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.186555] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.250380] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.280365] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.447665] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.474531] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.583515] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.684058] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 261.767621] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.811042] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 261.935336] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 261.953988] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.003647] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 262.028482] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 262.121925] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 262.242124] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.248371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.259983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.364012] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 262.430915] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.437411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.446027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.500483] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.507039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.515209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.546361] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 262.599171] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.606363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.620010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.653100] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.659540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.668747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.776354] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.782568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.794935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.846565] 8021q: adding VLAN 0 to HW filter on device team0 [ 262.975140] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.990529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 263.004553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.026167] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.187463] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 263.199504] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.227919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 263.244068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.273666] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.294761] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.324640] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.562150] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.806761] 8021q: adding VLAN 0 to HW filter on device team0 21:32:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x0, 0x0) syz_mount_image$ceph(&(0x7f0000000180)='ceph\x00', &(0x7f0000000300)='./bus\x00', 0x2, 0x1, &(0x7f0000000740)=[{&(0x7f00000004c0)}], 0x1100000, &(0x7f00000006c0)='msdos\x00') mknodat(r1, &(0x7f0000000280)='./bus/file0\x00', 0x8000, 0x1) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141046, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x8, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) getsockopt$inet_tcp_buf(r2, 0x6, 0xd, &(0x7f0000000500)=""/187, &(0x7f00000005c0)=0xbb) stat(&(0x7f00000000c0)='./bus\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x3, r3) epoll_create(0x81) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(r2, r2, &(0x7f0000000040), 0x8080fffffffe) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x2008200) write$eventfd(r4, &(0x7f0000000080), 0x8) sendfile(r2, r2, &(0x7f0000000380), 0x1000000020000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000340)={0x0, 0x8000, 0x5, 0x1f, 0x0}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000480)={r5, 0x9, 0x0, 0x3}, &(0x7f00000004c0)=0x10) 21:32:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-pclmul\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x8dffffff00000000, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) [ 266.835312] hrtimer: interrupt took 58957 ns [ 266.884508] FAT-fs (loop0): invalid media value (0x39) [ 266.890076] FAT-fs (loop0): Can't find a valid FAT filesystem 21:32:12 executing program 7: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x2, 0x4, 0x9, 0x7, 0x0, 0x9, 0x22010, 0x0, 0x9, 0x0, 0x2, 0x4f, 0x7575, 0x6, 0x4, 0x456a, 0x1ff, 0xe45b, 0xffffffffffffffff, 0x5, 0x5, 0xbe24, 0x1, 0x400, 0x100000000, 0x1, 0x9, 0x2, 0x6ceb, 0x3, 0x6, 0xfffffffffffffff8, 0x2, 0xae85, 0x1, 0xf51, 0x0, 0x1, 0x1, @perf_bp={&(0x7f00000000c0)}, 0x40, 0x5, 0x1000, 0x6, 0xfff, 0x5, 0x100000001}, r1, 0x6, r0, 0xa) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x48020000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000016600)=ANY=[]) [ 267.054375] FAT-fs (loop0): invalid media value (0x39) [ 267.059805] FAT-fs (loop0): Can't find a valid FAT filesystem [ 267.070629] QAT: Invalid ioctl 21:32:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x4) io_setup(0xfe, &(0x7f0000000100)=0x0) socket(0x1e, 0x1000000000005, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140), 0x5ee}]) 21:32:12 executing program 6: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000140)={0x56aa, 0x12, 0x0, 0xffffffffffffffff}) eventfd(0x5) mmap(&(0x7f0000004000/0x4000)=nil, 0x2, 0x0, 0x6012, r1, 0x2000) [ 267.236579] F2FS-fs (loop7): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 267.244505] F2FS-fs (loop7): Can't find valid F2FS filesystem in 1th superblock [ 267.263065] F2FS-fs (loop7): invalid crc value 21:32:12 executing program 3: socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_getres(0xfffffffffffffffc, &(0x7f0000000100)) [ 267.322014] F2FS-fs (loop7): invalid crc value [ 267.328221] F2FS-fs (loop7): Failed to get valid F2FS checkpoint [ 267.339500] x86/PAT: syz-executor6:6584 map pfn RAM range req write-combining for [mem 0x188542000-0x188542fff], got write-back 21:32:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x4) io_setup(0xfe, &(0x7f0000000100)=0x0) socket(0x1e, 0x1000000000005, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140), 0x5ee}]) [ 267.384132] F2FS-fs (loop7): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 267.391395] F2FS-fs (loop7): Can't find valid F2FS filesystem in 1th superblock 21:32:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200001, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000500)={{0x4, 0x6, 0x9e6c, 0x3f, 'syz1\x00', 0x4}, 0x0, [0x5, 0x5, 0x8000, 0x7, 0x7, 0x8, 0x1, 0x36, 0x7ff, 0x200, 0x100, 0x0, 0x3ff, 0x7, 0x9, 0x5, 0x6c9, 0x2, 0x7, 0xf418, 0x508, 0x4c2b, 0x3000000, 0x6, 0x4, 0x20, 0x7, 0x16, 0x0, 0x81, 0x3f, 0x81, 0xbf, 0x6, 0x7, 0x7, 0x400, 0x1, 0x6, 0x4, 0x0, 0x9, 0x7f, 0x401, 0xfffffffffffffffd, 0x9, 0xfffffffffffffff7, 0x7822, 0x3, 0x8, 0x5, 0x1, 0xffff, 0x5, 0x2, 0x1, 0x0, 0x6, 0x7fff, 0x7, 0xfff, 0x3fcb7bf, 0x1000, 0x5, 0xd52b, 0x6d, 0x0, 0x7fffffff, 0x0, 0xfff, 0xe244, 0x5, 0x9, 0x7, 0x9, 0x3, 0x9, 0x5, 0x2a00000000000, 0xf81, 0x4, 0x3, 0x7ff, 0x9, 0x80000001, 0xce6, 0x4f, 0x456, 0x26, 0x8, 0x6, 0x1, 0x100, 0x294a, 0x9, 0x4, 0x200, 0x3dce, 0x0, 0x5, 0xe391, 0x5, 0x3, 0x8, 0x4, 0x4, 0x1, 0x40, 0x2, 0x3, 0x2, 0x8, 0x2000000000000000, 0x3, 0x2, 0x0, 0x9, 0x80, 0x4, 0x3, 0x2, 0x1f8, 0x0, 0x7ff, 0x5, 0x6, 0x7fff]}) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r2 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) r4 = fcntl$dupfd(r3, 0x0, r2) mkdirat$cgroup(r4, &(0x7f0000000040)='syz0\x00', 0x1ff) close(r2) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000280)={0x4c, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="12634840000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f00000000c0)=ANY=[], @ANYBLOB="9c29000000020000"], 0x0, 0x0, &(0x7f0000000500)}) [ 267.459249] F2FS-fs (loop7): invalid crc value 21:32:12 executing program 6: pipe(&(0x7f00000004c0)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/sequencer2\x00') ioctl$RTC_PIE_ON(r0, 0x7005) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000600), 0xc, &(0x7f0000000700)={&(0x7f00000007c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40080}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xff4c) [ 267.506746] F2FS-fs (loop7): invalid crc value [ 267.511645] F2FS-fs (loop7): Failed to get valid F2FS checkpoint 21:32:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={&(0x7f0000000040), 0xc, &(0x7f0000000640)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010000104000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000001800000000010069703667726500000c00020008000c0000000000"], 0x3c}}, 0x0) 21:32:12 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xc000000000000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000580)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000600)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f0000000640)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002a00)=[{&(0x7f00000006c0)=""/238, 0xee}, {&(0x7f00000007c0)=""/133, 0x85}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/117, 0x75}, {&(0x7f0000001900)=""/152, 0x98}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)}], 0x7, &(0x7f0000002a80)=""/173, 0xad, 0x100}, 0x2) accept$packet(0xffffffffffffffff, &(0x7f0000003240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003280)=0xfffffffffffffe6c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000032c0)={0x0, @dev, @multicast1}, &(0x7f0000003300)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000003340)={@dev, 0x0}, &(0x7f0000003380)=0x14) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) accept(0xffffffffffffff9c, &(0x7f00000033c0)=@hci={0x1f, 0x0}, &(0x7f0000003440)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000003800)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000037c0)={&(0x7f0000003480)={0x314, r1, 0x21, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}]}}, {{0x8, 0x1, r3}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r5}, {0x1b0, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x61d}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0xf1, 0x8, 0x3}, {0x0, 0xcdd, 0xff, 0x35e5}, {0x1, 0x4, 0x7ff, 0x6}, {0x2, 0x7, 0x200, 0xffffffff}, {0x3, 0x9, 0x100000001, 0x2}, {0x2, 0x21af, 0x100, 0xf3}, {0x5, 0x5, 0xffffffffffffffb9, 0x200000000000000}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6471}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0xb0, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xb5}}}]}}]}, 0x314}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) r11 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r11, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r12 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r13 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r13, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r13, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r12, 0xc0306201, &(0x7f0000007000)={0x4c, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000058000000000000006000000000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES64=0x0, @ANYBLOB="0000000000000000852a747000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="010000002dbfb72994337a38822faf343ede000000000000000000000000000936203b000000"], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='0\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0001000000000000"], 0x0, 0x0, &(0x7f0000002000)}) 21:32:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000440)={0x6, &(0x7f0000001740)=[{0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}]}) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r3 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0x2}, 0x240, 0x1, 0xfffffffffffffff8, 0x7, 0xea7, 0xffff, 0x7}, r3, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='bfs\x00', 0x5010, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') clock_gettime(0x0, &(0x7f0000001900)={0x0, 0x0}) futimesat(r1, &(0x7f0000000480)='./file0\x00', &(0x7f0000001940)={{0x0, 0x2710}, {r5, r6/1000+30000}}) sendfile(r2, r4, &(0x7f0000000000), 0x80000002) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = getegid() fchown(r7, 0x0, r8) mkdir(&(0x7f0000001700)='./file0\x00', 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000001a00)=ANY=[@ANYBLOB="300000002000010400000021000000000200000000000008000b000000000008000f0000000000180000000000000000165ea11319a05b6a47fe38a4b8be8751255f776ba6e6126df28f6abe41c4e18d41ea1c2dbbab55d94fa58b2a708ef2e7510ca763992a1c20f78131570f025333300da2ce1828e0c8999195fe3535e00139209dcad484552688016c8043b0792adf56ee008768e2bee123f9d6973c53b59848e4583d66ade0cf2e819fd5e7d8c6c26d74b2431c976d5210d6806ab42ca82884d01a0b9a42b9ad9a71a9db1d333770d2a1b214f7ffff49955388c641d9f3a8fb3cffffffff13734ad9985ecc34ae40324a909cb2cf371d8726df1742318db038592449adadf22f19d341409bd3f732b4fcb869ade9b7d13a48ca0a81be2171f7229d898ba524af44bfced51b464c275e28930198e3a3d176e83cdec18bb5f74059f3a3d995c9"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f00000004c0)='./file0\x00', &(0x7f00000019c0)='./file0\x00') ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000018c0)={0x80000000, 0xc0000}) sendfile(r7, r0, &(0x7f0000001980)=0xffffffb, 0x3) fstatfs(r0, &(0x7f00000001c0)=""/216) [ 267.582906] binder: release 6603:6604 transaction 2 out, still active [ 267.589758] binder: undelivered TRANSACTION_COMPLETE [ 267.600148] binder: 6603:6604 transaction failed 29189/0, size 0-0 line 2787 [ 267.607490] binder: send failed reply for transaction 2, target dead [ 267.704508] netlink: 28 bytes leftover after parsing attributes in process `syz-executor3'. [ 267.714580] binder_alloc: binder_alloc_mmap_handler: 6603 20001000-20004000 already mapped failed -16 [ 267.730111] binder: BINDER_SET_CONTEXT_MGR already set [ 267.743511] binder: 6611:6614 ioctl 40046207 0 returned -16 21:32:13 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x2b) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x42040) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000080)={0x3, 0x8, [0x4, 0xffffffffffffffcd]}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000000)}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000003740)="1bb6e2a674cc41e96fb2d732889138c2ee60a9042c461029ec4d496e55fba6015d08f690135abd7e1b1587c7e380e2cdca595c1e56b1635e6c3f4452d0fc84647fa6afd396794eae98f9b53151048a297d7342967496a01ea897592c9c1cd5faa71d619480fcd6688341f7b631dc0ca2ab25542bc28294faa3ef143b7bbec25610f60aa0f1ca4915111fe50c6ee18d4c71bdd469b2bef2d0653465a018c95edebc20cdd91d955ded39577099e011b882a1389ac990e3479db2f67154b4da2cf2ec5f20643afba767fd19861a63888d1a81646c9042f664d98d72254c94bfea2726fa6ac994a482080a8740282de5e80022e76904bc1f857b2fd041020ef3c5cf9f993c1ff73bfc56812f27796c39f31647fc2739b1e3deef088a423728183af747f99550b7c94489004fba6d0a5207d2943669fe7d5d8986e43a26d7598ef7a247441f1576547ade32191c04cc4efb6ce41d8999e136bc3aa0f2366f2d1c1b098c669e28692064fa5d61056bc04dba9b5019fa60c350e7e9025d6e1129242e37cd03472ccb214be37788fe1ecf3d209ffd1857fb01f653f202276c32bf73495a11521db00e6439adcd5593ee1f66bc9b0c78fd49da57625bf252629a2ae0dc5a08c6c41694917653a763d3dcc8740ad5b0ed08e08438a15b456d62f5da2f98bbf8b198abc5debcebc0b3995868510bb0eb5237d0f8f8224ce8d6238737a87f5f5d6255fcda93a288767b7b9a2a701b19fa19694b8f74ffbdb1fc81556a1abcd1acabba16381eb89ab8e3d1160e13d6ca3b172947ede0e1d9df26d156c073d94f3841113f46ca71b44615d7e15088239859317246786ce0fd0509a918dda7f91623c7c3fd6623202bec7724be0165de0a69356acb6f7a4a5047a6cf5a67664e17a446a90dbb80ce03ff892451920cf1f89129219dde2f80b723bbdbcf1a54a2a046acebee754fa4ecebb859be364a9dc7ce53e89246af82e14527822f0af46064b96d0d7d45b1c0e69dea099476378287805cf18699298c1a42bb9f4e9b8acb1bcbba8ef9abcd4db27b2a7ad1d6677c0a79cd1b4b69b7af211f2554b122c72fc7d1b92c556555e55ba4586f0399ef2a2198f72be6df2130547ee7d02f74566307781b7da34736dcfdd63816e5def8353d36183cfc0d9cf7460cdd2f66d5f93bfcc5a5e1bdeb70e9ec60204ffe3ba874fc37a245cd5ecb46a0858818e5d41658c33196516a8275c2622c2d831552d1be40124a0175e0451228b52fae4dd73c5d2503ff862294b3034a9f0114daad6e39e24d0d45276b4406b33e25617edf8aaf383db13f97f2580db2d040c0a71d15c186bdcf46cd25328a45de222886da5253292d6c7c51b3aaa9df434a93427cc490b17eb3ced0cd2d9bc2430bfb33b8a56f508bc789bda7e40c03a340d96f8cbc2ac83323b68fefffc050dae75d394520c28d5c967d2aafa2657d77b3137418de623c40cf0307acc7b1d8ae07f29ae4764a33e75c0dbf785674d7b851c498a47f2c13f581fc02dbe992216b392df11576b32defcec402dbc988b7faa53698b8e1a9274ffc75d9b50ebcd1c284a786a7bb08d15e8d9e20610154bc1c00224355ef2f53dc9ae1e0de8232745eae82ed2f0fa26aeccd613a9399dfcb0c8745bd60ae06993d2c467303768ce2707057d44e87be71245f4c8cf1ddf94dc81506b2060322086aaff7b804d35613bb7a599d4f162be44e81ccadf1455d76bc02e12aecb95cbd5e9737ebccfdfbf18613a4faa8cbdc34f828c189509c319a4c685c8d3fa99e007aad6468ec279b30bf7e10f4c32e5c70751e122cdf94ebac0933a59483e2e790e04429c3d93284aaa4f9e21d6879431ca94d4c49b86dad4ec2b79b68d1", 0x52d}], 0x1, &(0x7f0000000a80)}}], 0x2, 0x0) [ 267.752106] binder: BINDER_SET_CONTEXT_MGR already set [ 267.762028] binder_alloc: 6603: binder_alloc_buf, no vma [ 267.767727] binder: 6611:6614 transaction failed 29189/-3, size 88-96 line 2970 [ 267.778840] binder: 6603:6604 ioctl 40046207 0 returned -16 21:32:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="736563757269747900000000000000000000000000000000000000000000000002001bea1058000000000000000000000000000000000000000000000000000000000000000000002a9a2221fe240879d3e57f0d61b61a644af6b43a4e77ae7b24d00c1206061a493a512087178f85121b46348a8ca9bfb80a7190eaabd68556905fda73583ec9da573bea6c2551e12f6e4e96ff1fe294e26ae15cebc2f53281b3b9f51cbf97b70d3b2bdafcc68a9b057c2e9099ae44f30a82d73e1ecff814d78de59ff01bc69bd8e3d850181e935257d3ceac9c5e995c1287d48221a1a8508ec3c59b9180e100e649995881008c8830f736eb947c961757897df8b86d1ba78645716ff5429bd3ad7648029c8c76ce5e336df13b3735d7dd41360b7d62f4b685c3d0229cdf84c0b86fed38c52df3caad0467e9951d2f0e3b8a8352847246504b164730b774eeee61cfe0b82edd54198f6bbd0c9c35e92062f6391ce970a7e8fe9535"], 0x1) [ 267.810582] binder_alloc: 6603: binder_alloc_buf, no vma [ 267.816257] binder: 6603:6616 transaction failed 29189/-3, size 0-0 line 2970 [ 267.840416] binder: undelivered TRANSACTION_ERROR: 29189 [ 267.847163] binder: 6603:6632 got reply transaction with no transaction stack [ 267.854634] binder: 6603:6632 transaction failed 29201/-71, size 0-0 line 2762 [ 267.870647] binder: BINDER_SET_CONTEXT_MGR already set 21:32:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) fchown(r2, r3, r4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@mcast1, @mcast1, @loopback, 0x2, 0x1, 0x8, 0x0, 0x0, 0x10000, r5}) io_setup(0x4, &(0x7f00000001c0)=0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) move_pages(r7, 0x6, &(0x7f0000000200)=[&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x7000)=nil, &(0x7f0000ffc000/0x2000)=nil], &(0x7f0000000240)=[0x4], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x4) io_getevents(r6, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000000)={0x77359400}) close(r2) socket$rds(0x15, 0x5, 0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x3ab101a9a86b}]) 21:32:13 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000180)=0x2, 0xe9) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6gretap0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000080), 0x195, 0x1, &(0x7f0000000100)={0x11, 0x0, r1}, 0x8) r2 = getegid() lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000000)=[r3]) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() getgroups(0x4, &(0x7f0000000140)=[0xee00, 0xffffffffffffffff, 0xee00, 0xee00]) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000001c0)={'ifb0\x00', 0xff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) r8 = getgid() lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f0000000400)=[r2, r3, r4, r5, r6, r7, r8, r9]) [ 267.903849] capability: warning: `syz-executor3' uses 32-bit capabilities (legacy support in use) [ 267.913994] binder: 6611:6614 ioctl 40046207 0 returned -16 21:32:13 executing program 7: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x2, 0x4, 0x9, 0x7, 0x0, 0x9, 0x22010, 0x0, 0x9, 0x0, 0x2, 0x4f, 0x7575, 0x6, 0x4, 0x456a, 0x1ff, 0xe45b, 0xffffffffffffffff, 0x5, 0x5, 0xbe24, 0x1, 0x400, 0x100000000, 0x1, 0x9, 0x2, 0x6ceb, 0x3, 0x6, 0xfffffffffffffff8, 0x2, 0xae85, 0x1, 0xf51, 0x0, 0x1, 0x1, @perf_bp={&(0x7f00000000c0)}, 0x40, 0x5, 0x1000, 0x6, 0xfff, 0x5, 0x100000001}, r1, 0x6, r0, 0xa) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x48020000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000016600)=ANY=[]) [ 267.947910] binder: undelivered TRANSACTION_ERROR: 29189 21:32:13 executing program 0: delete_module(&(0x7f0000000140)='$},\x00', 0xa00) syz_emit_ethernet(0xbd, &(0x7f0000000040)={@dev={[], 0x10}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [{[{0x9100, 0x0, 0x0, 0x2}], {0x8100, 0x7a8, 0x2, 0x81}}], {@ipx={0x8137, {0xffff, 0xa7, 0x8001, 0x14, {@random, @random="e4c69a358377", 0x8001}, {@broadcast, @random="c96f6c3a95aa", 0x80}, "2adf82c4fde5cccee051af51ad5aa397917a94bc630f690e5e0b2f50d78bea2518ad677b1e96025d0a7b3e4cbcf1253324e8c66d970f6b7b81151da9447a22e8dd0d0423f6929184abcbfe87fd8c5c6309772d876f4e1da8bcd09eec32ea10ef3268cde3d9c0551701ae849e06fd151e07e96515f2d342843ed753fce79e2fc77f905ecf619a5012ea"}}}}, &(0x7f0000000100)={0x0, 0x4, [0xcd6, 0x6d, 0xc50, 0xed6]}) syz_emit_ethernet(0x3e, &(0x7f0000000300)={@random="77b0e1efedfa", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x14, 0x0, 0x0, @empty, "000000081e84d84b2db57b8a0af02ad8c4fda114"}}}}}, &(0x7f0000000000)={0x0, 0x4, [0x0, 0xfffffffffffffffc]}) 21:32:13 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4002, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) [ 268.005658] binder: undelivered TRANSACTION_ERROR: 29201 [ 268.013774] binder: undelivered TRANSACTION_ERROR: 29190 21:32:13 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f00000000c0)='./file0\x00', r1, r3, 0x500) mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, &(0x7f0000000440)="497a31041a0b79b2ea8cde6bc7455f3a45aab09863e7d78bf915d641c098d07a42cc500269486e595419d04a54b278070278d7bef9e3fdd81fbbb0cb7bf3f9f09df47eac63154d9bc009ecc7a8ede45e39f58360af518c") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000500)={0x0, @in6={{0xa, 0x4e21, 0x95, @empty, 0x3ff}}, 0x6, 0x1f, 0xfb6b, 0x7, 0x3}, &(0x7f00000005c0)=0x98) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000600)={r4, 0x101}, 0x8) fchownat(r0, &(0x7f00000004c0)='./file0\x00', r2, r3, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d303047ec8e630000000000000000000000000000"]) 21:32:13 executing program 6: r0 = socket(0x11, 0x80002, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)={0x0, 0x4, [0x0, 0x0, 0x0, 0x2f]}) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x80) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000001c0)={0x0, 0xfffffffffffffffc, 0x401, 0x3}) 21:32:13 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x46a3, 0x400000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x0, 0x3, [0x8, 0x0, 0x0]}, &(0x7f00000002c0)=0xe) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d9, 0x0, 0x0, 0x0, 0x6, 0x39e]}, 0x75, r3}) r4 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x4, 0x400001) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000400)={0x401, 0xfff, 0x8000, 0x4, 0x0, 0x8, 0x0, 0x8001, r2}, 0x20) linkat(r0, &(0x7f0000000500)='./file0\x00', r0, &(0x7f0000000540)='./file0\x00', 0x400) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000480), &(0x7f00000004c0)=0x4) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x1d, r3}) r5 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r5, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x3, 0x3]}, @empty, @loopback, 0x3, 0x0, 0x0, 0x0, 0x100000000, 0x1c0270, r3}) r6 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="0a00001c2c766856c3d5b9fd45b091f531ab59449713744c435db3f477f731f0ebe12b878420a95ef9cbdb0adffb500b2e429f68c508fd84e91f61b598d436a6ae7f2d68c9756b1fccd3e4d68d69f2ff7a8ba756ecc2281e5274fc8a8f2d21cdaa638d12ffe83ab7115c41202538f567deb7e2c73eb52cb882271545", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000300)=0xb) r7 = semget(0x3, 0x0, 0x2e2) semtimedop(r7, &(0x7f00000001c0)=[{0x4, 0x80, 0x1000}, {0x3, 0x1, 0x800}, {0x7, 0x6, 0x1000}, {0x0, 0x80000000, 0x800}, {0x7, 0x100000001, 0x1000}, {0x1, 0xffffffffffffff00, 0x800}, {0x7, 0x845}, {0x6, 0x1, 0x1800}], 0x8, &(0x7f0000000200)) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r4, 0x28, 0x1, &(0x7f0000000440), 0x8) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r8, 0x117, 0x5, 0x0, 0x10) capset(&(0x7f0000866ffc)={0x19980330}, &(0x7f00001dd000)={0x0, 0x0, 0x0, 0x4b1f}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x240000, 0x0) ioctl$VHOST_SET_VRING_BASE(r9, 0x4008af12, &(0x7f0000000040)={0x3, 0xffffffffffffe7d1}) 21:32:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x0, 0x180) mkdirat$cgroup(r4, &(0x7f0000000200)='syz1\x00', 0x1ff) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)=ANY=[@ANYRES32=r2, @ANYBLOB], &(0x7f0000000100)=0x8) r6 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r6, 0x80404521, &(0x7f0000000c00)=""/4096) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r5}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000000840000000100000000000010470000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 21:32:13 executing program 0: r0 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0xa, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000240)={'raw\x00', 0x1000, "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"}, &(0x7f00000000c0)=0x1024) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x1d, 0x1, 0x0, 0x0, {0xe, 0x34000}, [@nested={0x8, 0x3, [@generic='!']}]}, 0x1c}}, 0x0) [ 268.248682] tmpfs: No value for mount option 'Iz1 y²êŒÞkÇE_:Eª°˜cç׋ùÖAÀ˜ÐzBÌPiHnYTÐJT²xx×¾ùãýØ»°Ë{óùðô~¬cM›À ìǨíä^9õƒ`¯QŒ' 21:32:13 executing program 6: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101201, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x200000, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x5) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000003, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x8dffffff, 0x2]}, 0x10) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) shutdown(r1, 0x1) 21:32:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x69f, 0x6, [0x8, 0x8, 0xffffffffffffffff, 0x2, 0xef8, 0x6]}, &(0x7f0000000280)=0x14) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000380)=r1, 0x4) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000002c0)={r1, @in={{0x2, 0x4e22, @local}}}, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000100)=0x90) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000003c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000240), 0x8) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x4e26, @broadcast}, 0x10) 21:32:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x7) setsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f00000000c0)="6db196cc65e945ac3dab8457ecf30f1ad9186caed016a66a58f61100906749978a737edf5572399a9ed831ee63329056c689f913321f07301009cded2e21955af0dfc52eb55ca8c702dd8ba55ae5672e71b53213740b39d75ea5886afd62f080253a0b917999b08d1e465b4a74600bdd6105f8dce962f9bf60ee1cf7c842c3d4e44a9b4481ab24d289474e94f13422c654bae3a1c145e29f7457393f", 0x9c) ioctl(r0, 0x8912, &(0x7f0000000240)="025cc80700145f8f764070") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x200, 0x0, 0xff, 0xd, 0x20000000009}, 0x20) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400000, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000080)={0x1, 0x4}) 21:32:14 executing program 7: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000070000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x188) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000180)={0x401, 0x97, 0x4, 0x8, 0x3, 0x2}) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000b00)) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="160000006f010001000000002df90000000000000000"], 0x16) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x888800, &(0x7f0000000a80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}, {@cache_loose='cache=loose'}]}}) creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) 21:32:14 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) write$P9_RRENAMEAT(r1, &(0x7f00000001c0)={0x7}, 0x7) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000200)=0x8) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f00000002c0)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000240)=0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000280)=r2) sendfile(r1, r1, &(0x7f00000000c0), 0x7f8) geteuid() r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@local}}}, &(0x7f0000000640)=0xe8) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000ec0)=0x2) 21:32:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000440)={0x6, &(0x7f0000001740)=[{0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}]}) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r3 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0x2}, 0x240, 0x1, 0xfffffffffffffff8, 0x7, 0xea7, 0xffff, 0x7}, r3, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='bfs\x00', 0x5010, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') clock_gettime(0x0, &(0x7f0000001900)={0x0, 0x0}) futimesat(r1, &(0x7f0000000480)='./file0\x00', &(0x7f0000001940)={{0x0, 0x2710}, {r5, r6/1000+30000}}) sendfile(r2, r4, &(0x7f0000000000), 0x80000002) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = getegid() fchown(r7, 0x0, r8) mkdir(&(0x7f0000001700)='./file0\x00', 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000001a00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f00000004c0)='./file0\x00', &(0x7f00000019c0)='./file0\x00') ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000018c0)={0x80000000, 0xc0000}) sendfile(r7, r0, &(0x7f0000001980)=0xffffffb, 0x3) fstatfs(r0, &(0x7f00000001c0)=""/216) 21:32:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000440)={0x6, &(0x7f0000001740)=[{0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}]}) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r3 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0x2}, 0x240, 0x1, 0xfffffffffffffff8, 0x7, 0xea7, 0xffff, 0x7}, r3, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='bfs\x00', 0x5010, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') clock_gettime(0x0, &(0x7f0000001900)={0x0, 0x0}) futimesat(r1, &(0x7f0000000480)='./file0\x00', &(0x7f0000001940)={{0x0, 0x2710}, {r5, r6/1000+30000}}) sendfile(r2, r4, &(0x7f0000000000), 0x80000002) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = getegid() fchown(r7, 0x0, r8) mkdir(&(0x7f0000001700)='./file0\x00', 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000001a00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f00000004c0)='./file0\x00', &(0x7f00000019c0)='./file0\x00') ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000018c0)={0x80000000, 0xc0000}) sendfile(r7, r0, &(0x7f0000001980)=0xffffffb, 0x3) fstatfs(r0, &(0x7f00000001c0)=""/216) 21:32:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000440)={0x6, &(0x7f0000001740)=[{0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}]}) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r3 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0x2}, 0x240, 0x1, 0xfffffffffffffff8, 0x7, 0xea7, 0xffff, 0x7}, r3, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='bfs\x00', 0x5010, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') clock_gettime(0x0, &(0x7f0000001900)={0x0, 0x0}) futimesat(r1, &(0x7f0000000480)='./file0\x00', &(0x7f0000001940)={{0x0, 0x2710}, {r5, r6/1000+30000}}) sendfile(r2, r4, &(0x7f0000000000), 0x80000002) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = getegid() fchown(r7, 0x0, r8) mkdir(&(0x7f0000001700)='./file0\x00', 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000001a00)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f00000004c0)='./file0\x00', &(0x7f00000019c0)='./file0\x00') ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000018c0)={0x80000000, 0xc0000}) sendfile(r7, r0, &(0x7f0000001980)=0xffffffb, 0x3) fstatfs(r0, &(0x7f00000001c0)=""/216) 21:32:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000061186000000000000000ae0bd021059cba699cf900000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 21:32:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66696c65300a95d5491c384b3fd8c91f220a0e994d32099dbda75cab6538a67730ab9231e4c0d760568f96a1b9cb97fb789b0b494bbfbecd13f969649d848d839fdc3ae2fd"], 0xb) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x3, 0x9, 0xffffffffffffff81, 0x9, 0x0, 0x1, 0x4200, 0xa, 0xafe, 0xfffffffffffffffe, 0x80000000, 0x5, 0x4, 0x80000001, 0xfffffffffffffffc, 0x1000, 0x20, 0x1, 0xa1c, 0x4, 0x8, 0x6, 0x10000, 0x80000000, 0xf9, 0x6, 0x0, 0x7, 0xfffffffffffff000, 0x8, 0x5, 0x7fff, 0x8c, 0x80000000, 0x8, 0xffffffffa2319144, 0x0, 0x10000, 0x2, @perf_bp={&(0x7f0000000200), 0x9}, 0x0, 0x1, 0x1, 0x5, 0x3, 0x1, 0x8}, r0, 0x8, 0xffffffffffffff9c, 0x8) close(r0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000140)={'veth0_to_bridge\x00', @ifru_map={0xfffffffffffffffc, 0x9, 0x7, 0x3, 0x3, 0x1}}) 21:32:14 executing program 7: r0 = socket(0x1e, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000004b40)={'syz_tun\x00', 0x0}) ioctl$void(r0, 0x5451) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x40, 0x0) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000140)=0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x33c, &(0x7f0000000000)=@raw=[@exit], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xb9, &(0x7f00000012c0)=""/185, 0x0, 0x0, [], r1}, 0x48) 21:32:14 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x3) r1 = timerfd_create(0x0, 0x0) r2 = dup(r1) read(r1, &(0x7f0000000240)=""/172, 0xca) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0x40085400, &(0x7f0000000080)={0x1fd}) ioctl$KIOCSOUND(r2, 0x4b2f, 0x3) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000040)={r3}) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x0) 21:32:14 executing program 7: r0 = socket(0x1e, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000004b40)={'syz_tun\x00', 0x0}) ioctl$void(r0, 0x5451) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x40, 0x0) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000140)=0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x33c, &(0x7f0000000000)=@raw=[@exit], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xb9, &(0x7f00000012c0)=""/185, 0x0, 0x0, [], r1}, 0x48) 21:32:14 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x3, &(0x7f0000000400)=[{&(0x7f0000000100)="8e99880cea1f09c7c743b7ffccdd01da1be5d0d530c1d9b770952620d51bb8d975acafcc51c7deb87beb37367b905522dda92902e64e3761011754c632a6b629add3e26046604461138f70c3d353e2efe254f15f88ad7847d1937e6f7f968625bcb4dd4caa7b579687b0140786025973c07ef200ea3ad9108f749ed7945575b3e2576f6b2e9ea42d97aafc3ed6ed4565d1932444", 0x94, 0xc2}, {&(0x7f00000001c0)="5754bdea844c75f2d364ece0d1b67b67e0179b38cc13205095b602cbb8307cccfa29f93e242e2d68ec4e094670fe6619b4b959cd72ca3156779d75fbdcdfbaa0465f023e1ff8abb13ed51b5df8db46f533059a5264764755f65f807c2506a660d1354461c3c285f524e66d2c67382fbc29711a6c29ce8b31b4ecb9d2b5cfd10862b01313d66f275f7d7e9b228e916331988d3a2fb841bb2cdb74f6bcb9219c3ba9299522c5a3", 0xa6, 0x9d}, {&(0x7f0000000300)="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", 0xff, 0x100}], 0x20000, &(0x7f0000000280)='procwlan1wlan0\x00') socket$inet6(0xa, 0x2, 0x41b4) sendmmsg(r0, &(0x7f0000002000)=[{{&(0x7f0000000080)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}, {{&(0x7f0000001c00)=@in={0x2, 0x4e23, @broadcast}, 0x80, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="100000000000000002000000"], 0x10}}], 0x2, 0x0) 21:32:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000440)={0x6, &(0x7f0000001740)=[{0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}]}) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r3 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0x2}, 0x240, 0x1, 0xfffffffffffffff8, 0x7, 0xea7, 0xffff, 0x7}, r3, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='bfs\x00', 0x5010, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') clock_gettime(0x0, &(0x7f0000001900)={0x0, 0x0}) futimesat(r1, &(0x7f0000000480)='./file0\x00', &(0x7f0000001940)={{0x0, 0x2710}, {r5, r6/1000+30000}}) sendfile(r2, r4, &(0x7f0000000000), 0x80000002) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = getegid() fchown(r7, 0x0, r8) mkdir(&(0x7f0000001700)='./file0\x00', 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000001a00)=ANY=[@ANYBLOB="300000002000010400000021000000000200000000000008000b000000000008000f0000000000180000000000000000165ea11319a05b6a47fe38a4b8be8751255f776ba6e6126df28f6abe41c4e18d41ea1c2dbbab55d94fa58b2a708ef2e7510ca763992a1c20f78131570f025333300da2ce1828e0c8999195fe3535e00139209dcad484552688016c8043b0792adf56ee008768e2bee123f9d6973c53b59848e4583d66ade0cf2e819fd5e7d8c6c26d74b2431c976d5210d6806ab42ca82884d01a0b9a42b9ad9a71a9db1d333770d2a1b214f7ffff49955388c641d9f3a8fb3cffffffff13734ad9985ecc34ae40324a909cb2cf371d8726df1742318db038592449adadf22f19d341409bd3f732b4fcb869ade9b7d13a48ca0a81be2171f7229d898ba524af44bfced51b464c275e28930198e3a3d176e83cdec18bb5f74059f3a3d995c9"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f00000004c0)='./file0\x00', &(0x7f00000019c0)='./file0\x00') ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000018c0)={0x80000000, 0xc0000}) sendfile(r7, r0, &(0x7f0000001980)=0xffffffb, 0x3) fstatfs(r0, &(0x7f00000001c0)=""/216) 21:32:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66696c65300a95d5491c384b3fd8c91f220a0e994d32099dbda75cab6538a67730ab9231e4c0d760568f96a1b9cb97fb789b0b494bbfbecd13f969649d848d839fdc3ae2fd"], 0xb) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x3, 0x9, 0xffffffffffffff81, 0x9, 0x0, 0x1, 0x4200, 0xa, 0xafe, 0xfffffffffffffffe, 0x80000000, 0x5, 0x4, 0x80000001, 0xfffffffffffffffc, 0x1000, 0x20, 0x1, 0xa1c, 0x4, 0x8, 0x6, 0x10000, 0x80000000, 0xf9, 0x6, 0x0, 0x7, 0xfffffffffffff000, 0x8, 0x5, 0x7fff, 0x8c, 0x80000000, 0x8, 0xffffffffa2319144, 0x0, 0x10000, 0x2, @perf_bp={&(0x7f0000000200), 0x9}, 0x0, 0x1, 0x1, 0x5, 0x3, 0x1, 0x8}, r0, 0x8, 0xffffffffffffff9c, 0x8) close(r0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000140)={'veth0_to_bridge\x00', @ifru_map={0xfffffffffffffffc, 0x9, 0x7, 0x3, 0x3, 0x1}}) 21:32:14 executing program 6: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101201, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x200000, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x5) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000003, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x8dffffff, 0x2]}, 0x10) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) shutdown(r1, 0x1) 21:32:14 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r1 = gettid() fremovexattr(r0, &(0x7f0000000240)=@random={'btrfs.', '/dev/dsp\x00'}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) write$UHID_CREATE2(r2, &(0x7f00000005c0)={0xb, 'syz0\x00', 'syz1\x00', 'syz1\x00', 0x8d, 0x8, 0x1797, 0x2810dc42, 0x2, 0xfffffffffffffff8, "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"}, 0x3c2) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x0, 0x1000, 0x8, 0x3, 0x8, 0x1, 0x5}, &(0x7f0000000040)={0x7, 0x853, 0x7, 0x7, 0x5, 0x600000000, 0x1, 0x5}, &(0x7f0000000080)={0x3ff, 0x8, 0xff, 0x10001, 0xfffffffeffffffff, 0x100000001, 0x0, 0xa05e}, &(0x7f0000000140)={r3, r4+30000000}, &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) [ 269.424868] device bridge_slave_1 left promiscuous mode [ 269.431065] bridge0: port 2(bridge_slave_1) entered disabled state 21:32:14 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, "aea1e9635ed770e9101ad2044a844adf05cff1448d9b171416891550588dd6cbdbc5cae876c68420acda73b90550e9c527dc36aa9cc80b8b8e8bcdb1cdf233f7", "3295b1a2e6e3c87ba86244721febd81648c6e2976179ffffffffffffa407269a4c018996e50a322d3285695b0bfdab6abf9bfc36e2e49b8958afb1215cd37b41", "54e38ccac0efbcd832dd5d6a69b41720881550e07023c0ba5d78b38ee5717a1b"}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x80400) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000180)) 21:32:14 executing program 1: io_cancel(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)="740622c106d5d163c034080b45f3617d5cc30d538da1e45a6b33e8c9cf0486d51cd108cfc5c94cc10122599faa0ee17039cf895f8a28a0aa7bb3a85f897e67b10b0273a317", 0x45}, &(0x7f0000000240)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = socket$inet_smc(0x2b, 0x1, 0x0) read(r1, &(0x7f0000465f8e)=""/114, 0x47) openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x2000, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xf6b, 0x200000) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x4008240b, &(0x7f0000000080)={r2}) close(r1) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000c22ff0)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 269.587766] device bridge_slave_0 left promiscuous mode [ 269.593430] bridge0: port 1(bridge_slave_0) entered disabled state 21:32:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f0000000040)=ANY=[@ANYBLOB="14cbef91936f6ae82098a641ffffffffbac42c64f497d9000004080000f6334e458ade79528e07aeaf36ada61fcc3a3a0c823d53ec6a4c"], 0x14}}, 0x0) 21:32:15 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3, 0x80000) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, r0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r2, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40085203, &(0x7f00000000c0)) 21:32:15 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_BMAP(r4, &(0x7f0000000140)={0x18, 0x0, 0x8, {0x1ff}}, 0x18) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f00000004c0)={0x7b, 0x0, [0x4b564d02]}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000000c0)={0x7, 0x0, 0x0, 0x9, 0xee, 0x8}) 21:32:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[], 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x101000, 0x40) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0xf) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000340)=0x1, 0x4) recvmsg(r1, &(0x7f0000000180)={&(0x7f0000000080)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000003c0)=""/75, 0x4b}, 0x0) write$UHID_DESTROY(r2, &(0x7f0000000140), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000440)={{{@in=@loopback, @in=@loopback, 0x4e20, 0x0, 0x4e20, 0xfffffffffffffd1c, 0xa, 0x20, 0x20, 0x2b, r3, r4}, {0x1ff, 0xffffffff, 0x2, 0xaec5, 0x0, 0x7, 0x6, 0x8}, {0x1, 0x9, 0x3, 0x8}, 0x5, 0x6e6bb5, 0x0, 0x0, 0x2, 0x1}, {{@in, 0x4d4, 0x32}, 0xa, @in=@local, 0x3505, 0x3, 0x2, 0xb06, 0x1ff, 0xecea, 0xffff}}, 0xe8) [ 269.767626] IPVS: ftp: loaded support on port[0] = 21 [ 269.774819] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 269.803445] team0 (unregistering): Port device team_slave_1 removed 21:32:15 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440)={0x0, 0x0, 0x1}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='veno\x00', 0x5) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) getsockname$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000200)=0x1c) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) ptrace$pokeuser(0x6, r2, 0x6, 0x8) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) [ 269.822776] team0 (unregistering): Port device team_slave_0 removed [ 269.841744] bond0 (unregistering): Releasing backup interface bond_slave_1 21:32:15 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x5, 0x1) bind$unix(r0, &(0x7f0000000340)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(r1, r1, 0x80000) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000140)={'syzkaller1\x00', {0x2, 0x4e20}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000200)={@my=0x0}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}], 0x10) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000240)={"626f6e645f736c6176655f30000e00", {0x2, 0x0, @rand_addr=0x80000000}}) close(r2) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x18}}}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000280)={0x8001, 0x6, 0x100000000000000, 0x1ff, 0xff}, 0x14) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="04593d00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000000c0)=0x14) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000100)={r5, 0x7, 0x3, [0x4, 0x3, 0x80000001]}, 0xe) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000080)=0xffffffffffffff9c) accept4$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c, 0x0) [ 269.900435] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 269.948373] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 269.982632] bond0 (unregistering): Released all slaves 21:32:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) tee(r0, r0, 0x197, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:32:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x8, {{0x2, 0x200000004, @broadcast}}}, 0xc39bb0b9467abf03) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x2400, 0x0) r2 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000001c0), 0xfa) r3 = semget$private(0x0, 0x4, 0x144) semctl$SETVAL(r3, 0x0, 0x10, &(0x7f0000000240)=0x53) bind$bt_sco(r2, &(0x7f0000000700)={0x1f, {0x9, 0x4, 0x8, 0x80000000, 0x3, 0x7}}, 0x8) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3b9ac9ff}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x10000, 0x0) ioctl$TIOCSWINSZ(r5, 0x5414, &(0x7f0000000140)={0x7, 0x0, 0xfff}) personality(0x800000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000300)={0x0, 0xfffffffffffff3d7}, &(0x7f0000000340)=0x8) ioctl$TIOCSBRK(r5, 0x5427) ioctl$ASHMEM_SET_PROT_MASK(r5, 0x40087705, &(0x7f0000000280)={0x3, 0x81}) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, &(0x7f0000000440), 0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f00000003c0)={0x7ff, 0x4, 0x6, 0x0, 0x6, 0x3273, 0x10001, 0x0, r6}, 0x20) r7 = add_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000100)=0x7) keyctl$setperm(0x5, r7, 0x22000) ioctl$FICLONERANGE(r5, 0x4020940d, &(0x7f0000000200)={r5, 0x0, 0x2, 0xffffffffffffff80, 0x4}) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000180)=0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000580)=r8) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000400)={0x7, 0x8, 0x7, 0x1000}, 0x8) fcntl$lock(r4, 0x0, &(0x7f0000000680)={0x2, 0x3, 0xeff, 0x3ff, r8}) syslog(0x4, &(0x7f0000000600)=""/69, 0xffffffffffffffbe) gettid() ioctl$sock_bt_bnep_BNEPCONNADD(r5, 0x400442c8, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) 21:32:15 executing program 7: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x8, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x2008200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x8, 0x0, 0x10000) write$eventfd(r1, &(0x7f0000000080), 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f00000000c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000380), 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000400), 0x4) 23:18:54 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000680)='cpuset.cpu_exclusive\x00', 0x2, 0x0) socket$inet6(0xa, 0xa, 0xb) write$cgroup_int(r1, &(0x7f0000000100)=0xe3e3, 0x12) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x9}, &(0x7f00000000c0)=0x8) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x9) [ 271.690818] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.697396] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.719395] device bridge_slave_0 entered promiscuous mode [ 271.805573] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.812073] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.836544] device bridge_slave_1 entered promiscuous mode [ 271.917080] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 271.960756] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 272.193139] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 272.287794] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 272.406231] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 272.413333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 272.640619] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 272.660126] team0: Port device team_slave_0 added [ 272.725950] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 272.734105] team0: Port device team_slave_1 added [ 272.776645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 272.822764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 272.871902] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 272.885099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.894671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.956839] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 272.964134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.975646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.992914] device bridge_slave_1 left promiscuous mode [ 272.998481] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.024397] device bridge_slave_0 left promiscuous mode [ 273.030009] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.132886] team0 (unregistering): Port device team_slave_1 removed [ 273.145943] team0 (unregistering): Port device team_slave_0 removed [ 273.160727] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 273.282403] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 273.383988] bond0 (unregistering): Released all slaves [ 274.035821] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.042321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.049050] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.055480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.093138] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 274.498392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 276.340987] 8021q: adding VLAN 0 to HW filter on device bond0 [ 276.487362] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 276.634248] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 276.640550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.648476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.800718] 8021q: adding VLAN 0 to HW filter on device team0 01:05:41 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000080)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) syz_open_pts(r0, 0x400807) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000100)) 01:05:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x10eff5bfca45c79e, 0x0, 0xa}, 0xfffffffffffffd3d) 01:05:41 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = semget$private(0x0, 0x8000000000000003, 0x49) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)=[0x7, 0x2]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) read(r2, &(0x7f0000000040)=""/41, 0x29) setsockopt$inet_mreqsrc(r3, 0x0, 0x4, &(0x7f0000013ff4)={@local, @rand_addr, @multicast2}, 0xc) ioctl(r3, 0x6, &(0x7f0000000280)="925b980adcb252da9050923afcc77d446f369ea336ac3b2b29b188f4ea8dfc95292c25884956f7d2b4525180e61bfbdc19ed452a812a151477a9b99d13ff8827691d403f5eefd1daf05722c6fc79684fab1f18716b3fa3ccd597b7a477ced5b470774524f78afbe0f296043ce8b4f55c4f5602cc3eda91c360ec9bfc4f09f1598450ce18020f674b39387be86a66ed3461614bc720f8ff035719e826d9a725f7dcfda93dfcefe70a6eb72cdb4c027f966c6ff60f2741c92ccf82755a9e951e5c8599d052f9b0472a051cfe90a4f928ef12") ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000012000/0x200000)=nil, 0x200000}) 01:05:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) tee(r0, r0, 0x197, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:05:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0xd}}, 0xf0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000280)) setsockopt(r0, 0x0, 0x6, &(0x7f0000000000)="802e9cb38e4e1e1a524ed7c4f348142fd4a0f4f964934c52f7e453ccd254658730fabdb2a101de73fa4ebea319a83bf74a0da01e84ad3ef518e7da1686cf32ef4adacfa2cc4021fcd05fed037446a32d956c5bbfefbb1a5fdd09a3db6d9ba3192eee4452baf0bec0415d", 0x6a) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000800)={@remote}, 0x14) setrlimit(0x3, &(0x7f00000002c0)={0x8001, 0x9}) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x3ff, 0x8000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x4, 0x5, 0x3, 0x100000000, 0x8}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={r2, 0x5b, 0xf75}, &(0x7f0000000240)=0x8) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x4000, 0x0) flistxattr(r3, &(0x7f0000000300)=""/37, 0x25) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000440)=0x20, 0x4) 01:05:41 executing program 5: inotify_init1(0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x20000) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x400, 0xdb3}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={r1, @in6={{0xa, 0x4e20, 0x7fff, @mcast2}}, 0x2, 0x81}, 0x90) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r2, &(0x7f0000000480), 0x10000000000001e1, 0x0) close(r2) 01:05:41 executing program 7: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000180)={0x100000000}) perf_event_open(&(0x7f000001d000)={0x10000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8200, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000100)) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)=""/142, &(0x7f0000000300)=""/9, &(0x7f0000000e80)=""/4096}) socket$pptp(0x18, 0x1, 0x2) read$FUSE(0xffffffffffffffff, &(0x7f0000000640), 0x1000) ioctl$UI_DEV_CREATE(r0, 0x5501) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x800000000000001e, 0x811, r2, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{0x0, 0xff}, {0x5, 0x4}]}) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000140)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000440)={0x0, 0x8001, 0x40, 0x9, 0x0, 0x4000004}, 0x14) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) [ 277.958787] FAULT_FLAG_ALLOW_RETRY missing 30 [ 277.963626] CPU: 0 PID: 7116 Comm: syz-executor6 Not tainted 4.19.0-rc1+ #213 [ 277.970911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.980276] Call Trace: [ 277.982893] dump_stack+0x1c9/0x2b4 [ 277.986547] ? dump_stack_print_info.cold.2+0x52/0x52 [ 277.991755] ? kasan_check_write+0x14/0x20 [ 277.995999] ? do_raw_spin_lock+0xc1/0x200 [ 278.000264] handle_userfault.cold.33+0x43/0x52 [ 278.004978] ? userfaultfd_ioctl+0x5420/0x5420 [ 278.009575] ? mark_held_locks+0x160/0x160 [ 278.013833] ? print_usage_bug+0xc0/0xc0 [ 278.017906] ? print_usage_bug+0xc0/0xc0 [ 278.021987] ? userfaultfd_ctx_put+0x810/0x810 [ 278.026582] ? print_usage_bug+0xc0/0xc0 [ 278.030664] ? __lock_acquire+0x7fc/0x5020 [ 278.034912] ? graph_lock+0x170/0x170 [ 278.038753] ? find_held_lock+0x36/0x1c0 [ 278.042840] ? lock_downgrade+0x8f0/0x8f0 [ 278.047007] ? kasan_check_read+0x11/0x20 [ 278.051163] ? do_raw_spin_unlock+0xa7/0x2f0 [ 278.055583] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 278.060181] ? kasan_check_write+0x14/0x20 [ 278.064430] ? do_raw_spin_lock+0xc1/0x200 [ 278.068682] __handle_mm_fault+0x389e/0x4350 [ 278.073111] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 278.077963] ? graph_lock+0x170/0x170 [ 278.081809] ? lock_downgrade+0x8f0/0x8f0 [ 278.085975] ? handle_mm_fault+0x8c4/0xc80 [ 278.090221] ? handle_mm_fault+0x8c4/0xc80 [ 278.094476] ? kasan_check_read+0x11/0x20 [ 278.098632] ? rcu_is_watching+0x8c/0x150 [ 278.102787] ? __do_page_fault+0x620/0xe50 [ 278.107033] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 278.111724] handle_mm_fault+0x53e/0xc80 [ 278.115799] ? __handle_mm_fault+0x4350/0x4350 [ 278.120405] ? find_vma+0x34/0x190 [ 278.123963] __do_page_fault+0x620/0xe50 [ 278.128046] ? mm_fault_error+0x380/0x380 [ 278.132206] ? ip_options_get_from_user+0x38/0xf0 [ 278.137056] ? graph_lock+0x170/0x170 [ 278.140864] ? __sys_setsockopt+0x1c5/0x3b0 [ 278.145188] ? __x64_sys_setsockopt+0xbe/0x150 [ 278.149789] ? do_syscall_64+0x1b9/0x820 [ 278.153867] do_page_fault+0xf6/0x7a4 [ 278.157678] ? vmalloc_sync_all+0x30/0x30 [ 278.161834] ? error_entry+0x76/0xd0 [ 278.165556] ? trace_hardirqs_off_caller+0xbb/0x2b0 [ 278.170749] ? find_held_lock+0x36/0x1c0 [ 278.174815] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.179668] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 278.184707] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.189566] page_fault+0x1e/0x30 [ 278.193029] RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 [ 278.198657] Code: 4c 8b 5e 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 <4c> 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 [ 278.217563] RSP: 0018:ffff88018f67f700 EFLAGS: 00010203 [ 278.222951] RAX: 0000000000000004 RBX: 000000000000000c RCX: 0000000000000001 [ 278.230224] RDX: 0000000000000004 RSI: 0000000020013ff4 RDI: ffff8801c597c2a0 [ 278.237496] RBP: ffff88018f67f738 R08: ffffed0038b2f856 R09: ffffed0038b2f854 [ 278.244767] R10: ffffed0038b2f855 R11: 0000000000000003 R12: 0000000020014000 [ 278.252039] R13: 0000000020013ff4 R14: ffff8801c597c2a0 R15: 00007ffffffff000 [ 278.259355] ? _copy_from_user+0x10d/0x150 [ 278.263609] ip_options_get_from_user+0x8d/0xf0 [ 278.268290] do_ip_setsockopt.isra.13+0x1ba6/0x3e70 [ 278.273330] ? ip_ra_control+0x640/0x640 [ 278.277412] ? find_held_lock+0x36/0x1c0 [ 278.281492] ? lock_downgrade+0x8f0/0x8f0 [ 278.285653] ? kasan_check_read+0x11/0x20 [ 278.289805] ? rcu_is_watching+0x8c/0x150 [ 278.293964] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 278.298658] ? __fget+0x4d5/0x740 [ 278.302126] ? ksys_dup3+0x690/0x690 [ 278.305870] ? lock_downgrade+0x8f0/0x8f0 [ 278.310042] ? kasan_check_read+0x11/0x20 [ 278.314195] ? do_raw_spin_unlock+0xa7/0x2f0 [ 278.318619] ? __fget_light+0x2f7/0x440 [ 278.322597] ? do_raw_spin_lock+0xc1/0x200 [ 278.326838] ? fget_raw+0x20/0x20 [ 278.330307] ? _raw_spin_unlock+0x22/0x30 [ 278.334466] ? kcov_ioctl+0x56/0x1f0 [ 278.338187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.343736] ip_setsockopt+0x4c/0x140 [ 278.347547] tcp_setsockopt+0x93/0xe0 [ 278.351364] sock_common_setsockopt+0x9a/0xe0 [ 278.355872] __sys_setsockopt+0x1c5/0x3b0 [ 278.360032] ? kernel_accept+0x310/0x310 [ 278.364100] ? lockdep_hardirqs_on+0x421/0x5c0 [ 278.368688] ? trace_hardirqs_on+0xbd/0x2c0 [ 278.373016] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 278.378562] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.383935] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 278.389077] __x64_sys_setsockopt+0xbe/0x150 [ 278.393498] do_syscall_64+0x1b9/0x820 [ 278.397394] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 278.402789] ? syscall_return_slowpath+0x5e0/0x5e0 [ 278.407739] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 278.412762] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 278.417790] ? recalc_sigpending_tsk+0x180/0x180 [ 278.422555] ? kasan_check_write+0x14/0x20 [ 278.426805] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.431670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.436863] RIP: 0033:0x457089 [ 278.440075] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:05:41 executing program 1: socket$inet6(0xa, 0xf, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c48875e05b18a4cb3a9cd12dcea440d899c22cebd3b6abf62d996addb07aa3cde470652b3a471b4a7fa2f3fdf6e034d8000000004b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x6611, &(0x7f0000000040)) accept(0xffffffffffffffff, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000000140)=0x80) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000001380)={@empty, @loopback, 0x0}, &(0x7f00000022c0)=0xc) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@ll={0x11, 0x1a, r1, 0x1, 0x2, 0x6, @local}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000003380)=[{0x10, 0x104}], 0x10}, 0x8040) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000013c0)) gettid() getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004400), &(0x7f0000004a00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004540)={{{@in6=@ipv4, @in=@rand_addr}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000004640)=0xe8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004800), 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{&(0x7f0000000a40)=@ipx, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/46, 0x2e}, {&(0x7f0000000c40)=""/240, 0xf0}, {&(0x7f0000000d40)=""/144, 0x90}], 0x5, &(0x7f0000000e80)=""/240, 0xf0}, 0x7}, {{&(0x7f0000000f80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001000)=""/230, 0xe6}, {&(0x7f0000001100)=""/6, 0x6}, {&(0x7f0000001140)=""/212, 0xd4}, {&(0x7f0000001240)=""/101, 0x65}, {&(0x7f00000012c0)=""/162, 0xa2}, {&(0x7f0000001400)=""/102, 0x66}, {&(0x7f0000001480)=""/230, 0xe6}], 0x7, &(0x7f0000001600)=""/150, 0x96, 0xb15}, 0x39a}, {{&(0x7f00000016c0)=@in={0x2, 0x0, @rand_addr}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001740)=""/146, 0x92}, {&(0x7f0000001900)=""/175, 0xaf}, {&(0x7f00000019c0)=""/66, 0x42}, {&(0x7f0000001a40)=""/212, 0xd4}, {&(0x7f0000001b40)=""/163, 0xa3}, {&(0x7f0000001c00)=""/190, 0xbe}, {&(0x7f0000001380)}, {&(0x7f0000001d00)=""/105, 0x69}], 0x8, &(0x7f0000001e40)=""/253, 0xfd, 0x200}, 0x1}, {{&(0x7f0000001f40)=@generic, 0x80, &(0x7f00000023c0)=[{&(0x7f00000020c0)=""/110, 0x6e}, {&(0x7f0000002140)=""/249, 0xf9}, {&(0x7f0000002240)=""/110, 0x6e}, {&(0x7f00000022c0)}, {&(0x7f0000002300)=""/146, 0x92}], 0x5, &(0x7f0000002440)=""/82, 0x52, 0xffffffff897e22cf}, 0x9}, {{&(0x7f0000002a00)=@generic, 0x80, &(0x7f0000002c40)=[{&(0x7f0000002a80)=""/199, 0xc7}, {&(0x7f0000002b80)=""/81, 0x51}], 0x2, &(0x7f0000002c80)=""/215, 0xd7}, 0x80000000}], 0x5, 0x10040, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000440)={0x0, 0x33f1}, &(0x7f0000000480)=0x8) epoll_pwait(0xffffffffffffffff, &(0x7f00000009c0)=[{}, {}, {}, {}], 0x4, 0xff, &(0x7f0000000a00)={0x7fff}, 0x8) [ 278.458981] RSP: 002b:00007f79249d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 278.466699] RAX: ffffffffffffffda RBX: 00007f79249da6d4 RCX: 0000000000457089 [ 278.473970] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000006 [ 278.481623] RBP: 0000000000930140 R08: 000000000000000c R09: 0000000000000000 [ 278.488893] R10: 0000000020013ff4 R11: 0000000000000246 R12: 00000000ffffffff [ 278.496168] R13: 00000000004d4e60 R14: 00000000004c924a R15: 0000000000000001 01:05:41 executing program 4: r0 = socket(0x2000000011, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'lo\x00', &(0x7f0000000080)=@ethtool_sfeatures={0x3b, 0x1, [{}]}}) 01:05:41 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) write(r0, &(0x7f0000000140)="89e93a08c494a588e6f634e43285f65f02e055236f31aca2de304d73726373fb7e5f60136cf41015223b25c84da9b9d393f33bc3e0e7ce405c386e27cccb7c9c6b3737e493363aacea7c1d6fa6640dd1736fc39f94e81326e59d993e617747250b7568ba738ed8d6397bae9f8146bd018de36f2f0d1f0084f4b3ec4596c447f0", 0x80) 01:05:42 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) read(r0, &(0x7f0000000300)=""/182, 0xb6) write$FUSE_ATTR(r0, &(0x7f00000001c0)={0x78, 0x0, 0x1, {0x800000000007, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100c}}}, 0x78) [ 278.738700] IPVS: ftp: loaded support on port[0] = 21 [ 278.799580] CUSE: unknown device info "" [ 278.803845] CUSE: DEVNAME unspecified [ 278.865022] CUSE: unknown device info "" [ 278.869315] CUSE: DEVNAME unspecified [ 279.832984] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.839432] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.847079] device bridge_slave_0 entered promiscuous mode [ 279.888807] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.895322] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.902981] device bridge_slave_1 entered promiscuous mode [ 279.943930] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 279.984614] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 280.110667] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 280.155481] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 280.352350] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 280.359958] team0: Port device team_slave_0 added [ 280.401961] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 280.410554] team0: Port device team_slave_1 added [ 280.454005] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 280.498994] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 280.544407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 280.587783] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 280.595046] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 280.611769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 281.039370] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.045821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.052562] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.058986] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.066897] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 281.610558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 282.643037] 8021q: adding VLAN 0 to HW filter on device bond0 [ 282.792171] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 282.940207] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 282.946493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 282.956647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.104585] 8021q: adding VLAN 0 to HW filter on device team0 [ 432.458469] INFO: task syz-executor0:4476 blocked for more than 140 seconds. [ 432.465957] Not tainted 4.19.0-rc1+ #213 [ 432.470612] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 432.478629] syz-executor0 D22504 4476 1 0x00000004 [ 432.484319] Call Trace: [ 432.486963] __schedule+0x87c/0x1df0 [ 432.490735] ? retint_kernel+0x10/0x10 [ 432.494709] ? __sched_text_start+0x8/0x8 [ 432.498917] ? graph_lock+0x170/0x170 [ 432.502767] ? lock_downgrade+0x8f0/0x8f0 [ 432.506974] ? kasan_check_read+0x11/0x20 [ 432.511174] ? rcu_is_watching+0x8c/0x150 [ 432.515378] ? find_held_lock+0x36/0x1c0 [ 432.519513] schedule+0xfb/0x450 [ 432.522997] ? __schedule+0x1df0/0x1df0 [ 432.527034] ? kasan_check_read+0x11/0x20 [ 432.531290] ? do_raw_spin_unlock+0xa7/0x2f0 [ 432.535761] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 432.540408] ? __ww_mutex_add_waiter.part.15+0x120/0x120 [ 432.545930] ? mutex_destroy+0x200/0x200 [ 432.550054] ? do_raw_spin_lock+0xc1/0x200 [ 432.554394] schedule_preempt_disabled+0x10/0x20 [ 432.559218] __mutex_lock+0xbf9/0x1700 [ 432.563173] ? vfat_lookup+0xf1/0x640 [ 432.567051] ? mutex_trylock+0x2b0/0x2b0 [ 432.571173] ? d_alloc_parallel+0x833/0x1eb0 [ 432.575642] ? d_alloc_parallel+0x833/0x1eb0 [ 432.580118] ? kasan_check_read+0x11/0x20 [ 432.584333] ? rcu_is_watching+0x8c/0x150 [ 432.588558] ? __lookup_slow+0x1e6/0x540 [ 432.592689] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 432.597446] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 432.603050] ? d_alloc_parallel+0xb65/0x1eb0 [ 432.607540] ? print_usage_bug+0xc0/0xc0 [ 432.611677] ? __d_lookup_rcu+0xaa0/0xaa0 [ 432.615877] ? graph_lock+0x170/0x170 [ 432.619734] ? __lock_acquire+0x7fc/0x5020 [ 432.624028] ? graph_lock+0x170/0x170 [ 432.627890] ? graph_lock+0x170/0x170 [ 432.631837] ? find_held_lock+0x36/0x1c0 [ 432.635966] mutex_lock_nested+0x16/0x20 [ 432.640087] ? mutex_lock_nested+0x16/0x20 [ 432.644380] vfat_lookup+0xf1/0x640 [ 432.648088] ? __lockdep_init_map+0x105/0x590 [ 432.652657] ? vfat_find_form+0x120/0x120 [ 432.656875] ? lockdep_init_map+0x9/0x10 [ 432.661019] ? __init_waitqueue_head+0x9e/0x150 [ 432.665773] ? init_wait_entry+0x1c0/0x1c0 [ 432.670097] __lookup_slow+0x2b5/0x540 [ 432.674057] ? vfs_unlink+0x510/0x510 [ 432.677939] ? down_read+0xb5/0x1d0 [ 432.681620] ? lookup_slow+0x49/0x80 [ 432.685434] ? __down_interruptible+0x700/0x700 [ 432.690158] ? lookup_fast+0x470/0x12a0 [ 432.694211] ? __follow_mount_rcu.isra.35.part.36+0x890/0x890 [ 432.700170] lookup_slow+0x57/0x80 [ 432.703779] walk_component+0x94a/0x2630 [ 432.707912] ? trace_hardirqs_on+0xbd/0x2c0 [ 432.712299] ? alloc_empty_file+0x72/0x170 [ 432.716590] ? path_init+0x15ed/0x1fc0 [ 432.720570] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 432.725740] ? path_init+0x1fc0/0x1fc0 [ 432.729705] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 432.734780] ? set_root+0x42e/0x820 [ 432.738487] ? lookup_open+0x1b90/0x1b90 [ 432.742600] ? trace_hardirqs_on+0xbd/0x2c0 [ 432.747473] ? rcu_is_watching+0x8c/0x150 [ 432.751679] ? path_openat+0x20f/0x5300 [ 432.755722] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 432.760902] ? debug_mutex_init+0x2d/0x60 [ 432.765119] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 432.770204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.776035] ? security_inode_permission+0xd2/0x100 [ 432.781135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.786749] ? vfat_hashi+0x14d/0x3a0 [ 432.790614] link_path_walk.part.42+0xa6e/0x1540 [ 432.795473] ? pick_link+0xb00/0xb00 [ 432.799253] ? walk_component+0x2630/0x2630 [ 432.803661] ? find_held_lock+0x36/0x1c0 [ 432.807804] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 432.812887] ? percpu_counter_add_batch+0xf2/0x150 [ 432.818284] path_openat+0x268/0x5300 [ 432.822139] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 432.826887] ? graph_lock+0x170/0x170 [ 432.830752] ? path_lookupat.isra.45+0xc00/0xc00 [ 432.835596] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 432.840708] ? expand_files.part.8+0x571/0x9c0 [ 432.845361] ? find_held_lock+0x36/0x1c0 [ 432.849492] ? lock_downgrade+0x8f0/0x8f0 [ 432.853707] ? do_sys_open+0x3a2/0x720 [ 432.857655] ? kasan_check_read+0x11/0x20 [ 432.861877] ? do_raw_spin_unlock+0xa7/0x2f0 [ 432.866346] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 432.871000] ? __lock_is_held+0xb5/0x140 [ 432.875114] ? _raw_spin_unlock+0x22/0x30 [ 432.879330] ? __alloc_fd+0x34e/0x710 [ 432.883189] ? usercopy_warn+0x120/0x120 [ 432.887333] do_filp_open+0x255/0x380 [ 432.891198] ? may_open_dev+0x100/0x100 [ 432.895283] ? get_unused_fd_flags+0x122/0x1a0 [ 432.899922] ? __alloc_fd+0x710/0x710 [ 432.903798] do_sys_open+0x584/0x720 [ 432.907586] ? filp_open+0x80/0x80 [ 432.911188] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 432.916366] __x64_sys_open+0x7e/0xc0 [ 432.920239] do_syscall_64+0x1b9/0x820 [ 432.924204] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 432.929655] ? syscall_return_slowpath+0x5e0/0x5e0 [ 432.934645] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.939559] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 432.944642] ? prepare_exit_to_usermode+0x291/0x3b0 [ 432.949729] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.954648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.959892] RIP: 0033:0x455190 [ 432.963141] Code: 24 98 00 00 00 48 89 14 24 e8 dc ef ff ff 48 8b 44 24 10 48 8b 4c 24 08 48 8b 54 24 70 48 39 d0 0f 85 69 01 00 00 48 8b 9c 24 <10> 01 00 00 48 89 1c 24 48 89 54 24 08 48 89 4c 24 10 48 89 44 24 [ 432.982118] RSP: 002b:00007ffd52af8670 EFLAGS: 00000202 ORIG_RAX: 0000000000000002 [ 432.989906] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000455190 [ 432.997248] RDX: 0000000000000000 RSI: 0000000000090800 RDI: 00000000004c1d68 [ 433.004588] RBP: 000000000000011b R08: 0000000000000001 R09: 0000000001d47940 [ 433.011927] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000011 [ 433.019249] R13: 0000000000041e5a R14: 000000000000000a R15: badc0ffeebadface [ 433.026655] INFO: task syz-executor0:6810 blocked for more than 140 seconds. [ 433.033906] Not tainted 4.19.0-rc1+ #213 [ 433.038527] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 433.046561] syz-executor0 D22104 6810 4476 0x00000004 [ 433.052273] Call Trace: [ 433.054929] __schedule+0x87c/0x1df0 [ 433.058701] ? __sched_text_start+0x8/0x8 [ 433.062912] ? graph_lock+0x170/0x170 [ 433.066758] ? find_held_lock+0x36/0x1c0 [ 433.070888] ? mark_held_locks+0xc9/0x160 [ 433.075125] schedule+0xfb/0x450 [ 433.078554] ? lock_downgrade+0x8f0/0x8f0 [ 433.082757] ? __schedule+0x1df0/0x1df0 [ 433.086807] ? kasan_check_read+0x11/0x20 [ 433.091027] ? do_raw_spin_unlock+0xa7/0x2f0 [ 433.095511] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 433.100174] ? __wake_up_locked_key_bookmark+0x20/0x20 [ 433.105530] ? kasan_check_write+0x14/0x20 [ 433.109835] ? do_raw_spin_lock+0xc1/0x200 [ 433.114138] d_alloc_parallel+0x1456/0x1eb0 [ 433.118526] ? print_usage_bug+0xc0/0xc0 [ 433.122682] ? __d_lookup_rcu+0xaa0/0xaa0 [ 433.126877] ? graph_lock+0x170/0x170 [ 433.130768] ? __lock_acquire+0x7fc/0x5020 [ 433.135058] ? graph_lock+0x170/0x170 [ 433.138940] ? wake_up_q+0x100/0x100 [ 433.142733] ? graph_lock+0x170/0x170 [ 433.146609] ? find_held_lock+0x36/0x1c0 [ 433.150732] ? __lockdep_init_map+0x105/0x590 [ 433.155314] ? __lockdep_init_map+0x105/0x590 [ 433.159868] ? lockdep_init_map+0x9/0x10 [ 433.164009] ? __init_waitqueue_head+0x9e/0x150 [ 433.168766] ? init_wait_entry+0x1c0/0x1c0 [ 433.173072] ? retint_kernel+0x10/0x10 [ 433.177025] __lookup_slow+0x1e6/0x540 [ 433.180991] ? vfs_unlink+0x510/0x510 [ 433.184853] ? down_read+0xb5/0x1d0 [ 433.188538] ? lookup_slow+0x49/0x80 [ 433.192298] ? __down_interruptible+0x700/0x700 [ 433.197035] ? lookup_slow+0x19/0x80 [ 433.200809] lookup_slow+0x57/0x80 [ 433.204419] walk_component+0x94a/0x2630 [ 433.208528] ? trace_hardirqs_on+0xbd/0x2c0 [ 433.212921] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 433.217738] ? path_init+0x1fc0/0x1fc0 [ 433.221700] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 433.226507] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 433.232042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 433.236860] ? retint_kernel+0x10/0x10 [ 433.240828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.246435] ? security_inode_permission+0xd2/0x100 [ 433.251526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.257126] ? vfat_hashi+0x14d/0x3a0 [ 433.261003] link_path_walk.part.42+0xa6e/0x1540 [ 433.265813] ? pick_link+0xb00/0xb00 [ 433.269608] ? walk_component+0x2630/0x2630 [ 433.274009] ? find_held_lock+0x36/0x1c0 [ 433.278157] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 433.283254] ? percpu_counter_add_batch+0xf2/0x150 [ 433.288296] path_openat+0x268/0x5300 [ 433.292171] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 433.296906] ? graph_lock+0x170/0x170 [ 433.300773] ? path_lookupat.isra.45+0xc00/0xc00 [ 433.305583] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 433.310669] ? expand_files.part.8+0x571/0x9c0 [ 433.315306] ? find_held_lock+0x36/0x1c0 [ 433.319452] ? lock_downgrade+0x8f0/0x8f0 [ 433.323658] ? kasan_check_read+0x11/0x20 [ 433.327886] ? do_raw_spin_unlock+0xa7/0x2f0 [ 433.332353] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 433.337004] ? __lock_is_held+0xb5/0x140 [ 433.341160] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 433.345979] ? lockdep_hardirqs_on+0x421/0x5c0 [ 433.350614] ? retint_kernel+0x10/0x10 [ 433.354561] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 433.359551] do_filp_open+0x255/0x380 [ 433.363426] ? may_open_dev+0x100/0x100 [ 433.367471] ? retint_kernel+0x10/0x10 [ 433.371443] ? do_sys_open+0x554/0x720 [ 433.375393] do_sys_open+0x584/0x720 [ 433.379200] ? filp_open+0x80/0x80 [ 433.382854] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 433.388042] __x64_sys_open+0x7e/0xc0 [ 433.391902] do_syscall_64+0x1b9/0x820 [ 433.395850] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 433.401285] ? syscall_return_slowpath+0x5e0/0x5e0 [ 433.406292] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.411187] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 433.416296] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 433.421367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.426977] ? prepare_exit_to_usermode+0x291/0x3b0 [ 433.432050] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.436959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.442194] RIP: 0033:0x410dc1 [ 433.445456] Code: c7 84 24 80 00 00 00 00 00 00 00 48 c7 84 24 88 00 00 00 00 00 00 00 48 c7 84 24 90 00 00 00 00 00 00 00 48 8d 05 0f 5e 04 00 <48> 89 44 24 78 48 8d 44 24 50 48 89 84 24 80 00 00 00 48 8d 84 24 [ 433.464406] RSP: 002b:00007f4bf9f3bbb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 433.472197] RAX: ffffffffffffffda RBX: 00007f4bf9f3c6d4 RCX: 0000000000410dc1 [ 433.479508] RDX: 00007f4bf9f3bbdf RSI: 0000000000000002 RDI: 00007f4bf9f3bbd0 [ 433.486830] RBP: 0000000000930140 R08: 0000000000000000 R09: 000000000000000f [ 433.494148] R10: 0000000000000004 R11: 0000000000000293 R12: 00000000ffffffff [ 433.501499] R13: 00000000004d6b70 R14: 00000000004ca09a R15: 0000000000000001 [ 433.508849] [ 433.508849] Showing all locks held in the system: [ 433.515255] 1 lock held by khungtaskd/774: [ 433.519542] #0: 000000003b54bedd (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x428 [ 433.528293] 2 locks held by rsyslogd/4339: [ 433.532578] #0: 0000000007573dd6 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 433.540651] #1: 00000000b782fce4 (fs_reclaim){+.+.}, at: is_bpf_text_address+0x0/0x170 [ 433.548894] 2 locks held by getty/4429: [ 433.552915] #0: 00000000d9751e37 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 433.561220] #1: 000000009ac7bcd3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 433.570214] 2 locks held by getty/4430: [ 433.574230] #0: 00000000f6ace46c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 433.582606] #1: 000000003637699d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 433.591542] 2 locks held by getty/4431: [ 433.595564] #0: 0000000099ea96e2 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 433.603870] #1: 00000000e368957a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 433.612808] 2 locks held by getty/4432: [ 433.616823] #0: 00000000cb5aa5b6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 433.625148] #1: 00000000c104cdc4 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 433.634070] 2 locks held by getty/4433: [ 433.638092] #0: 0000000086fe5649 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 433.646405] #1: 00000000c34bc738 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 433.655364] 2 locks held by getty/4434: [ 433.659369] #0: 0000000085ace632 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 433.667706] #1: 000000007214535f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 433.676643] 2 locks held by getty/4435: [ 433.680662] #0: 00000000deee3161 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 433.688978] #1: 0000000039372710 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 433.697927] 2 locks held by syz-executor0/4476: [ 433.702649] #0: 0000000081956b9d (&sb->s_type->i_mutex_key#18){++++}, at: lookup_slow+0x49/0x80 [ 433.712181] #1: 00000000307aab2e (&sbi->s_lock){+.+.}, at: vfat_lookup+0xf1/0x640 [ 433.719994] 3 locks held by syz-executor0/6809: [ 433.724746] 1 lock held by syz-executor0/6810: [ 433.729362] #0: 0000000081956b9d (&sb->s_type->i_mutex_key#18){++++}, at: lookup_slow+0x49/0x80 [ 433.738421] [ 433.740086] ============================================= [ 433.740086] [ 433.747153] NMI backtrace for cpu 0 [ 433.750823] CPU: 0 PID: 774 Comm: khungtaskd Not tainted 4.19.0-rc1+ #213 [ 433.757752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.767107] Call Trace: [ 433.769710] dump_stack+0x1c9/0x2b4 [ 433.773351] ? dump_stack_print_info.cold.2+0x52/0x52 [ 433.778571] ? vprintk_default+0x28/0x30 [ 433.782655] ? lapic_can_unplug_cpu.cold.29+0x3f/0x3f [ 433.787856] nmi_cpu_backtrace.cold.3+0x48/0x88 [ 433.792533] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 433.797214] ? lapic_can_unplug_cpu.cold.29+0x3f/0x3f [ 433.802431] nmi_trigger_cpumask_backtrace+0x151/0x192 [ 433.807723] arch_trigger_cpumask_backtrace+0x14/0x20 [ 433.812925] watchdog+0xb39/0x1040 [ 433.816495] ? reset_hung_task_detector+0xd0/0xd0 [ 433.821357] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 433.826481] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 433.831597] ? lockdep_hardirqs_on+0x421/0x5c0 [ 433.836187] ? trace_hardirqs_on+0xbd/0x2c0 [ 433.840513] ? kasan_check_read+0x11/0x20 [ 433.844761] ? __kthread_parkme+0xd7/0x1b0 [ 433.849007] ? kasan_check_write+0x14/0x20 [ 433.853253] ? do_raw_spin_lock+0xc1/0x200 [ 433.857503] ? __kthread_parkme+0x58/0x1b0 [ 433.861753] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 433.867296] ? __kthread_parkme+0x106/0x1b0 [ 433.871639] kthread+0x35a/0x420 [ 433.875025] ? reset_hung_task_detector+0xd0/0xd0 [ 433.879876] ? kthread_bind+0x40/0x40 [ 433.883688] ret_from_fork+0x3a/0x50 [ 433.887496] Sending NMI from CPU 0 to CPUs 1: [ 433.893400] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 1.190 msecs [ 433.894044] NMI backtrace for cpu 1 [ 433.894051] CPU: 1 PID: 6809 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #213 [ 433.894059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.894063] RIP: 0010:__find_get_block+0x1ae/0xdf0 [ 433.894077] Code: 89 9d 90 fe ff ff 48 85 db 74 c0 e8 4c 1c a6 ff 48 8d 7b 18 48 89 f8 48 c1 e8 03 42 80 3c 28 00 0f 85 8f 0a 00 00 4c 8b 7b 18 <48> 8b bd b0 fe ff ff 4c 89 fe e8 d3 1c a6 ff 4c 39 bd b0 fe ff ff [ 433.894082] RSP: 0018:ffff88018869e908 EFLAGS: 00000046 [ 433.894091] RAX: 1ffff10039271203 RBX: ffff8801c9389000 RCX: ffffc90001e1c000 [ 433.894097] RDX: 0000000000040000 RSI: ffffffff81d6a434 RDI: ffff8801c9389018 [ 433.894103] RBP: ffff88018869ea98 R08: ffff8801b4b4e780 R09: fffff94000dcafae [ 433.894109] R10: fffff94000dcafae R11: ffffea0006e57d77 R12: 0000000000000002 [ 433.894115] R13: dffffc0000000000 R14: 0000000000000002 R15: 00000000000004a9 [ 433.894122] FS: 00007f4bf9f5d700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 433.894128] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 433.894134] CR2: 0000000002048000 CR3: 0000000192c2f000 CR4: 00000000001406e0 [ 433.894137] Call Trace: [ 433.894141] ? retint_kernel+0x10/0x10 [ 433.894145] ? block_invalidatepage+0x510/0x510 [ 433.894150] ? init_page_buffers+0x3e2/0x530 [ 433.894155] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 433.894159] ? unlock_page+0x1d1/0x2c0 [ 433.894163] ? wake_up_page_bit+0x5b0/0x5b0 [ 433.894168] ? mark_buffer_dirty+0x650/0x650 [ 433.894172] __getblk_gfp+0x2be/0xb10 [ 433.894176] ? __find_get_block+0xdf0/0xdf0 [ 433.894180] ? graph_lock+0x170/0x170 [ 433.894184] ? graph_lock+0x170/0x170 [ 433.894188] ? graph_lock+0x170/0x170 [ 433.894192] ? rcu_read_lock_sched_held+0x108/0x120 [ 433.894196] __bread_gfp+0x2d/0x310 [ 433.894200] fat__get_entry+0x59c/0xa30 [ 433.894204] ? check_same_owner+0x340/0x340 [ 433.894208] ? copy_overflow+0x30/0x30 [ 433.894212] ? vfat_lookup+0xf1/0x640 [ 433.894216] fat_search_long+0x33b/0x15d0 [ 433.894221] ? kasan_check_read+0x11/0x20 [ 433.894225] ? rcu_is_watching+0x8c/0x150 [ 433.894229] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 433.894239] ? fat_parse_short+0x2cb0/0x2cb0 [ 433.894244] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 433.894249] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 433.894254] ? mark_held_locks+0xc9/0x160 [ 433.894258] ? __d_lookup_rcu+0xaa0/0xaa0 [ 433.894262] ? retint_kernel+0x10/0x10 [ 433.894266] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 433.894271] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 433.894276] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 433.894280] ? graph_lock+0x170/0x170 [ 433.894284] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 433.894288] vfat_find+0x16d/0x1a0 [ 433.894292] vfat_lookup+0x107/0x640 [ 433.894296] ? __lockdep_init_map+0x105/0x590 [ 433.894300] ? vfat_find_form+0x120/0x120 [ 433.894304] ? lockdep_init_map+0x9/0x10 [ 433.894309] ? __init_waitqueue_head+0x9e/0x150 [ 433.894313] ? init_wait_entry+0x1c0/0x1c0 [ 433.894317] __lookup_slow+0x2b5/0x540 [ 433.894321] ? vfs_unlink+0x510/0x510 [ 433.894325] ? down_read+0xb5/0x1d0 [ 433.894329] ? lookup_slow+0x49/0x80 [ 433.894333] ? __down_interruptible+0x700/0x700 [ 433.894337] lookup_slow+0x57/0x80 [ 433.894341] walk_component+0x94a/0x2630 [ 433.894345] ? lockdep_hardirqs_on+0x421/0x5c0 [ 433.894349] ? retint_kernel+0x10/0x10 [ 433.894353] ? path_init+0x1fc0/0x1fc0 [ 433.894357] ? set_root+0x4ac/0x820 [ 433.894362] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 433.894366] ? set_root+0x42e/0x820 [ 433.894370] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 433.894374] ? retint_kernel+0x10/0x10 [ 433.894378] ? vfat_hashi+0x19e/0x3a0 [ 433.894382] ? vfat_hashi+0x1eb/0x3a0 [ 433.894394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.894399] ? vfat_hashi+0x14d/0x3a0 [ 433.894403] link_path_walk.part.42+0xa6e/0x1540 [ 433.894407] ? pick_link+0xb00/0xb00 [ 433.894411] ? walk_component+0x2630/0x2630 [ 433.894422] ? retint_kernel+0x10/0x10 [ 433.894426] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 433.894431] ? percpu_counter_add_batch+0xf2/0x150 [ 433.894435] path_openat+0x268/0x5300 [ 433.894439] ? retint_kernel+0x10/0x10 [ 433.894443] ? graph_lock+0x170/0x170 [ 433.894448] ? path_lookupat.isra.45+0xc00/0xc00 [ 433.894452] ? expand_files.part.8+0x5a7/0x9c0 [ 433.894456] ? find_held_lock+0x36/0x1c0 [ 433.894461] ? lock_downgrade+0x8f0/0x8f0 [ 433.894465] ? lockdep_hardirqs_on+0x421/0x5c0 [ 433.894469] ? kasan_check_read+0x11/0x20 [ 433.894474] ? do_raw_spin_unlock+0xa7/0x2f0 [ 433.894478] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 433.894482] ? __lock_is_held+0xb5/0x140 [ 433.894486] ? _raw_spin_unlock+0x22/0x30 [ 433.894490] ? __alloc_fd+0x34e/0x710 [ 433.894494] do_filp_open+0x255/0x380 [ 433.894498] ? may_open_dev+0x100/0x100 [ 433.894503] ? get_unused_fd_flags+0x122/0x1a0 [ 433.894507] ? __alloc_fd+0x710/0x710 [ 433.894511] do_sys_open+0x584/0x720 [ 433.894514] ? filp_open+0x80/0x80 [ 433.894518] __x64_sys_open+0x7e/0xc0 [ 433.894522] do_syscall_64+0x1b9/0x820 [ 433.894527] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 433.894532] ? syscall_return_slowpath+0x5e0/0x5e0 [ 433.894537] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.894542] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 433.894547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.894551] ? prepare_exit_to_usermode+0x291/0x3b0 [ 433.894556] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.894561] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.894564] RIP: 0033:0x410dc1 [ 433.894578] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 433.894583] RSP: 002b:00007f4bf9f5cbb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 433.894593] RAX: ffffffffffffffda RBX: 00007f4bf9f5d6d4 RCX: 0000000000410dc1 [ 433.894599] RDX: 00007f4bf9f5cbdf RSI: 0000000000000002 RDI: 00007f4bf9f5cbd0 [ 433.894605] RBP: 00000000009300a0 R08: 0000000000000000 R09: 000000000000000f [ 433.894612] R10: 0000000000000004 R11: 0000000000000293 R12: 00000000ffffffff [ 433.894618] R13: 00000000004d6b70 R14: 00000000004ca09a R15: 0000000000000000 [ 433.894653] Kernel panic - not syncing: hung_task: blocked tasks [ 434.490038] CPU: 0 PID: 774 Comm: khungtaskd Not tainted 4.19.0-rc1+ #213 [ 434.496977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.506341] Call Trace: [ 434.508965] dump_stack+0x1c9/0x2b4 [ 434.512619] ? dump_stack_print_info.cold.2+0x52/0x52 [ 434.517829] ? printk_safe_log_store+0x2f0/0x2f0 [ 434.522600] panic+0x238/0x4e7 [ 434.525804] ? add_taint.cold.5+0x16/0x16 [ 434.529987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.535554] ? nmi_trigger_cpumask_backtrace+0x13a/0x192 [ 434.541019] ? printk_safe_flush+0xd7/0x130 [ 434.545360] watchdog+0xb4a/0x1040 [ 434.548937] ? reset_hung_task_detector+0xd0/0xd0 [ 434.553801] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 434.558920] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 434.564036] ? lockdep_hardirqs_on+0x421/0x5c0 [ 434.568628] ? trace_hardirqs_on+0xbd/0x2c0 [ 434.572960] ? kasan_check_read+0x11/0x20 [ 434.577117] ? __kthread_parkme+0xd7/0x1b0 [ 434.581373] ? kasan_check_write+0x14/0x20 [ 434.585637] ? do_raw_spin_lock+0xc1/0x200 [ 434.589896] ? __kthread_parkme+0x58/0x1b0 [ 434.594156] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 434.599704] ? __kthread_parkme+0x106/0x1b0 [ 434.604042] kthread+0x35a/0x420 [ 434.607441] ? reset_hung_task_detector+0xd0/0xd0 [ 434.612303] ? kthread_bind+0x40/0x40 [ 434.616121] ret_from_fork+0x3a/0x50 [ 434.620313] Dumping ftrace buffer: [ 434.623951] (ftrace buffer empty) [ 434.627648] Kernel Offset: disabled [ 434.631265] Rebooting in 86400 seconds..