Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '[localhost]:20753' (ECDSA) to the list of known hosts. 2020/11/10 13:16:06 fuzzer started 2020/11/10 13:16:07 dialing manager at 10.0.2.10:44471 2020/11/10 13:16:07 syscalls: 3439 2020/11/10 13:16:07 code coverage: enabled 2020/11/10 13:16:07 comparison tracing: enabled 2020/11/10 13:16:07 extra coverage: enabled 2020/11/10 13:16:07 setuid sandbox: enabled 2020/11/10 13:16:07 namespace sandbox: enabled 2020/11/10 13:16:07 Android sandbox: /sys/fs/selinux/policy does not exist 2020/11/10 13:16:07 fault injection: enabled 2020/11/10 13:16:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/11/10 13:16:07 net packet injection: enabled 2020/11/10 13:16:07 net device setup: enabled 2020/11/10 13:16:07 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/11/10 13:16:07 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/11/10 13:16:07 USB emulation: enabled 2020/11/10 13:16:07 hci packet injection: enabled 2020/11/10 13:16:07 wifi device emulation: enabled 13:17:12 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x1100) 13:17:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f00000007c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 13:17:13 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x2) 13:17:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0xcc}}, 0x0) syzkaller login: [ 155.002192][ T9121] IPVS: ftp: loaded support on port[0] = 21 [ 155.113895][ T9121] chnl_net:caif_netlink_parms(): no params data found [ 155.186003][ T9121] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.196845][ T9121] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.210081][ T9121] device bridge_slave_0 entered promiscuous mode [ 155.227986][ T9121] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.239599][ T9121] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.250765][ T9121] device bridge_slave_1 entered promiscuous mode [ 155.276628][ T9123] IPVS: ftp: loaded support on port[0] = 21 [ 155.286397][ T9121] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 155.300911][ T9121] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 155.334349][ T9121] team0: Port device team_slave_0 added [ 155.351518][ T9121] team0: Port device team_slave_1 added [ 155.374037][ T9121] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 155.385530][ T9121] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 155.418859][ T9121] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 155.437270][ T9121] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 155.447867][ T9121] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 155.499232][ T9121] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 155.540085][ T9125] IPVS: ftp: loaded support on port[0] = 21 [ 155.553924][ T9121] device hsr_slave_0 entered promiscuous mode [ 155.566827][ T9121] device hsr_slave_1 entered promiscuous mode [ 155.586714][ T9127] IPVS: ftp: loaded support on port[0] = 21 [ 155.679115][ T9123] chnl_net:caif_netlink_parms(): no params data found [ 155.816844][ T9125] chnl_net:caif_netlink_parms(): no params data found [ 155.881714][ T9123] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.892687][ T9123] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.907566][ T9123] device bridge_slave_0 entered promiscuous mode [ 155.921472][ T9121] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 155.939166][ T9127] chnl_net:caif_netlink_parms(): no params data found [ 155.957360][ T9123] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.966578][ T9123] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.976041][ T9123] device bridge_slave_1 entered promiscuous mode [ 155.992329][ T9121] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 156.024831][ T9121] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 156.050980][ T9123] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.063021][ T9121] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 156.096752][ T9123] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 156.165725][ T9125] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.177787][ T9125] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.187112][ T9125] device bridge_slave_0 entered promiscuous mode [ 156.199339][ T9123] team0: Port device team_slave_0 added [ 156.220641][ T9127] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.232350][ T9127] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.248997][ T9127] device bridge_slave_0 entered promiscuous mode [ 156.263563][ T9125] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.274248][ T9125] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.283959][ T9125] device bridge_slave_1 entered promiscuous mode [ 156.297293][ T9123] team0: Port device team_slave_1 added [ 156.325661][ T9127] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.336227][ T9127] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.348120][ T9127] device bridge_slave_1 entered promiscuous mode [ 156.374855][ T9123] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 156.389882][ T9123] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 156.422459][ T9123] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 156.446063][ T9125] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.464973][ T9123] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 156.473323][ T9123] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 156.512448][ T9123] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 156.534817][ T9127] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.556220][ T9125] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 156.592232][ T9127] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 156.615756][ T9123] device hsr_slave_0 entered promiscuous mode [ 156.624645][ T9123] device hsr_slave_1 entered promiscuous mode [ 156.635920][ T9123] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 156.646159][ T9123] Cannot create hsr debugfs directory [ 156.655714][ T9125] team0: Port device team_slave_0 added [ 156.666944][ T9125] team0: Port device team_slave_1 added [ 156.686217][ T9127] team0: Port device team_slave_0 added [ 156.694743][ T9125] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 156.703772][ T9125] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 156.740927][ T9125] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 156.757955][ T9127] team0: Port device team_slave_1 added [ 156.772485][ T9125] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 156.782074][ T9125] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 156.818337][ T9125] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 156.846703][ T9127] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 156.855672][ T9127] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 156.891855][ T9127] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 156.921301][ T9127] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 156.933487][ T9127] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 156.964593][ T9127] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 157.010478][ T23] Bluetooth: hci0: command 0x0409 tx timeout [ 157.019794][ T9125] device hsr_slave_0 entered promiscuous mode [ 157.028756][ T9125] device hsr_slave_1 entered promiscuous mode [ 157.038370][ T9125] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 157.048488][ T9125] Cannot create hsr debugfs directory [ 157.062945][ T9127] device hsr_slave_0 entered promiscuous mode [ 157.071876][ T9127] device hsr_slave_1 entered promiscuous mode [ 157.079950][ T9127] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 157.090183][ T9127] Cannot create hsr debugfs directory [ 157.172584][ T9121] 8021q: adding VLAN 0 to HW filter on device bond0 [ 157.227042][ T9123] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 157.237070][ T9123] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 157.250401][ T7] Bluetooth: hci1: command 0x0409 tx timeout [ 157.262298][ T9123] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 157.271832][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 157.284436][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.308581][ T9123] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 157.331556][ T9121] 8021q: adding VLAN 0 to HW filter on device team0 [ 157.365015][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.381912][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.399160][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.408950][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.424205][ T5] Bluetooth: hci2: command 0x0409 tx timeout [ 157.425562][ T9127] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 157.449907][ T9127] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 157.464267][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.478826][ T9127] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 157.489727][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.505033][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.520474][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.530151][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.570101][ T23] Bluetooth: hci3: command 0x0409 tx timeout [ 157.570748][ T9127] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 157.632056][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 157.642165][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 157.655277][ T9125] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 157.666169][ T9125] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 157.682531][ T9125] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 157.693013][ T9125] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 157.710649][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 157.721189][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 157.730905][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 157.749356][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 157.786928][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 157.811756][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.821804][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.840344][ T9121] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 157.853204][ T9121] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 157.864652][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.875614][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.922806][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 157.931359][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 157.950592][ T9121] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 157.982842][ T9123] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.008515][ T9127] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.029064][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 158.039052][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.049813][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.059816][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.078348][ T9123] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.086822][ T9155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 158.096961][ T9155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.110674][ T9155] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.119946][ T9155] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.134086][ T9127] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.144345][ T9121] device veth0_vlan entered promiscuous mode [ 158.154965][ T9125] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.166119][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.179224][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.197167][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.212134][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.222764][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.231745][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.241466][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.252114][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.264959][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.278455][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.294149][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.306351][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.330574][ T9125] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.338571][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.350199][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.363624][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.372895][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.384017][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.395439][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.405509][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.414226][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.424167][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 158.435136][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.444378][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.454028][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 158.466805][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.481277][ T9121] device veth1_vlan entered promiscuous mode [ 158.492154][ T9158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.517681][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 158.527619][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 158.545580][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.563380][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.573873][ T9151] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.583380][ T9151] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.592455][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 158.604342][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 158.614324][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.624462][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.634805][ T9151] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.645731][ T9151] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.655645][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 158.666961][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 158.695483][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 158.706035][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.716660][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 158.730087][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.741292][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.750810][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 158.763996][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 158.775285][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.785122][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.810560][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 158.821373][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.831665][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 158.841386][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 158.851582][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 158.863033][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 158.872530][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.881876][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.893704][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 158.905631][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.916160][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.932241][ T9123] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 158.946783][ T9123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 158.964539][ T9155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.974135][ T9155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.985268][ T9155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.995293][ T9155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 159.014192][ T9125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 159.036370][ T9127] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 159.053014][ T9159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 159.067489][ T9159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 159.088032][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 159.089648][ T18] Bluetooth: hci0: command 0x041b tx timeout [ 159.100152][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 159.121500][ T9121] device veth0_macvtap entered promiscuous mode [ 159.151810][ T9121] device veth1_macvtap entered promiscuous mode [ 159.171595][ T9127] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.187613][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 159.201669][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 159.217077][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 159.240908][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 159.262191][ T9123] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.285531][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 159.295152][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 159.313356][ T9121] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 159.333425][ T9121] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 159.339953][ T5] Bluetooth: hci1: command 0x041b tx timeout [ 159.347565][ T9155] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 159.372075][ T9155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 159.385236][ T9155] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 159.396732][ T9155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 159.414202][ T9125] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.446595][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 159.462528][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 159.481506][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 159.494867][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.500156][ T5] Bluetooth: hci2: command 0x041b tx timeout [ 159.506206][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 159.531291][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.546369][ T9127] device veth0_vlan entered promiscuous mode [ 159.581695][ T9121] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.603835][ T9121] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.628725][ T9121] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.650135][ T3078] Bluetooth: hci3: command 0x041b tx timeout [ 159.660446][ T9121] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.732282][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 159.761673][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 159.778208][ T9127] device veth1_vlan entered promiscuous mode [ 159.800958][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 159.817922][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 159.832628][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.851799][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 159.863996][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.880722][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 159.894037][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 159.909287][ T9123] device veth0_vlan entered promiscuous mode [ 159.981185][ T9123] device veth1_vlan entered promiscuous mode [ 160.019223][ T9127] device veth0_macvtap entered promiscuous mode [ 160.034762][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 160.046711][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 160.060306][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 160.073492][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 160.091219][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 160.102111][ T9136] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 160.111760][ T9136] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 160.126462][ T9127] device veth1_macvtap entered promiscuous mode [ 160.139735][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 160.149042][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 160.162245][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 160.172677][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 160.182087][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 160.197408][ T9125] device veth0_vlan entered promiscuous mode [ 160.235996][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 160.248729][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 160.259858][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 160.269816][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 160.298956][ T9123] device veth0_macvtap entered promiscuous mode [ 160.311942][ T9127] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 160.327449][ T9127] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 160.359121][ T9127] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 160.375268][ T2976] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 160.375965][ T9125] device veth1_vlan entered promiscuous mode [ 160.389334][ T2976] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 160.408344][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 160.420374][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 160.432795][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 160.446160][ T9127] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 160.464165][ T9127] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 160.481087][ T9127] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 160.495070][ T9123] device veth1_macvtap entered promiscuous mode [ 160.506325][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 160.534626][ T3342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 160.559998][ T9127] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 160.583241][ T9127] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 160.599236][ T9127] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 160.614398][ T9127] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 160.641434][ T9121] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 160.683309][ T9123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 160.705842][ T9123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 13:17:19 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) [ 160.720019][ T9123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 160.751534][ T9123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 13:17:19 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0xc0, 0x180) [ 160.767544][ T9123] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 160.794206][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 13:17:20 executing program 0: lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0xee01) [ 160.805342][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 160.830606][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 160.845685][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 13:17:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) [ 160.865001][ T9125] device veth0_macvtap entered promiscuous mode [ 160.883458][ T9123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 13:17:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000400)) [ 160.896300][ T9123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 160.917599][ T9123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 160.937814][ T9123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 160.954708][ T9123] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 160.989081][ T9125] device veth1_macvtap entered promiscuous mode [ 161.016764][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 161.039290][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 161.052369][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 161.065007][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 161.081417][ T9123] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.096583][ T9123] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.110829][ T9123] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.122791][ T9123] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.145919][ T9136] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 161.159681][ T9136] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 161.165629][ T9125] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 161.172659][ T3078] Bluetooth: hci0: command 0x040f tx timeout [ 161.187486][ T9125] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.208779][ T9125] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 161.227284][ T9125] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.239999][ T9125] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 161.253045][ T9125] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.269871][ T9125] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 161.292353][ T9125] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 161.304850][ T9125] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.316586][ T9125] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 161.332294][ T9125] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.345901][ T9125] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 161.360988][ T9125] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.373685][ T9125] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 161.390543][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 161.399299][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 161.408645][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 161.419791][ T9151] Bluetooth: hci1: command 0x040f tx timeout [ 161.420089][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 161.438123][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 161.454502][ T2976] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 161.456934][ T9125] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.465085][ T2976] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 161.475628][ T9125] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.498326][ T9125] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.508328][ T9125] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.527646][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 161.596971][ T3078] Bluetooth: hci2: command 0x040f tx timeout [ 161.603386][ T9136] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 161.618564][ T9136] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 161.632184][ T9180] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 161.654853][ T9136] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 161.668778][ T9136] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 161.673886][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 161.683861][ T9180] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 161.688648][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 161.704735][ T9136] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 161.710899][ T3753] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 161.721320][ T9136] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 161.741226][ T3078] Bluetooth: hci3: command 0x040f tx timeout [ 161.744346][ T9180] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 13:17:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 13:17:21 executing program 2: r0 = socket(0x2, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f0000000140)) 13:17:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, 0x0, 0x0) 13:17:21 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 13:17:21 executing program 1: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) 13:17:21 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) 13:17:21 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x1, 0x0) 13:17:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) 13:17:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') write$P9_RRENAMEAT(r0, 0x0, 0x0) 13:17:21 executing program 1: open$dir(&(0x7f0000003dc0)='./file0\x00', 0xc0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x0) 13:17:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 13:17:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f0000000180)) 13:17:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) 13:17:21 executing program 0: open$dir(&(0x7f0000003dc0)='./file0\x00', 0x402042, 0x8a) 13:17:21 executing program 2: r0 = socket(0x2, 0x2, 0x0) fstat(r0, &(0x7f0000000000)) 13:17:21 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) chmod(&(0x7f00000002c0)='./file0\x00', 0x5) 13:17:21 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWRITE(r0, &(0x7f0000000040)={0xb}, 0xfffffea2) 13:17:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000700), 0x0, 0x0) 13:17:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') futimesat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 13:17:21 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff}) accept4$unix(r0, 0x0, 0x0, 0x0) 13:17:21 executing program 2: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$9p(r0, 0x0, 0xffffffffffffff92) 13:17:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000040)={@rand_addr, @initdev}, &(0x7f0000000080)=0x8) 13:17:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000200)) 13:17:21 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xe040, 0x43) [ 162.185345][ T46] kauditd_printk_skb: 1 callbacks suppressed [ 162.185361][ T46] audit: type=1800 audit(1605014241.377:31): pid=9262 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16564 res=0 errno=0 [ 162.225741][ T46] audit: type=1800 audit(1605014241.377:32): pid=9262 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16564 res=0 errno=0 13:17:22 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, 0x0) 13:17:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) 13:17:22 executing program 2: open$dir(&(0x7f0000003dc0)='./file0\x00', 0xc0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x42c8c0, 0x0) 13:17:22 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000040), &(0x7f0000000000)=0x4) 13:17:22 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x4) 13:17:22 executing program 3: open$dir(&(0x7f0000003dc0)='./file0\x00', 0xc0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000001940)='./file0\x00', 0x200201, 0x0) 13:17:22 executing program 0: getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)) setgid(r0) 13:17:22 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0x0) 13:17:22 executing program 3: keyctl$reject(0x13, 0x0, 0x0, 0x0, 0xffffffffffffffff) 13:17:22 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x4) 13:17:22 executing program 0: r0 = memfd_create(&(0x7f0000000140)='\xc9\xc7\xd1\x919\xa6\xef\xee\xd4\x81mH\x89\x029\xb5\r\x1aQ\xf0)\v\x13\xdbt\v@l;\xac~\xec\x04\x93MDX\xe3\\\b7e\x10\x13\x8a)\xa3\"2(8\xea*\xfe\xeeF\xe9\v\xdb\xc3\x03A6\xb5\xcc\xf4\xbe\x80\xb3\xfccdK\x8f\xc5\x18\xdd\xce\xfdq\xde\xf6\x87TS\x00\x00\x00', 0x0) r1 = dup2(r0, r0) preadv(r1, &(0x7f00000022c0), 0x0, 0x0, 0x0) 13:17:22 executing program 2: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x70302, 0x0) 13:17:22 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, 0x0) 13:17:22 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/tcp\x00') setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) 13:17:22 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) ioctl$CHAR_RAW_IOOPT(r0, 0x1279, 0x0) 13:17:22 executing program 0: r0 = memfd_create(&(0x7f0000000140)='\xc9\xc7\xd1\x919\xa6\xef\xee\xd4\x81mH\x89\x029\xb5\r\x1aQ\xf0)\v\x13\xdbt\v@l;\xac~\xec\x04\x93MDX\xe3\\\b7e\x10\x13\x8a)\xa3\"2(8\xea*\xfe\xeeF\xe9\v\xdb\xc3\x03A6\xb5\xcc\xf4\xbe\x80\xb3\xfccdK\x8f\xc5\x18\xdd\xce\xfdq\xde\xf6\x87TS\x00\x00\x00', 0x0) r1 = dup2(r0, r0) preadv(r1, &(0x7f00000022c0), 0x0, 0x0, 0x0) 13:17:22 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, 0x0) 13:17:22 executing program 1: setresgid(0xee01, 0x0, 0x0) 13:17:22 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, 0x0) 13:17:22 executing program 3: open$dir(&(0x7f0000003dc0)='./file0\x00', 0xc0, 0x0) r0 = getuid() getresgid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) lchown(&(0x7f0000000000)='./file0\x00', r0, r1) 13:17:22 executing program 0: r0 = eventfd(0xfffffff7) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/182, 0xb6}], 0x1) 13:17:22 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x280440, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x10) 13:17:22 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x125f, 0x0) 13:17:22 executing program 3: open$dir(&(0x7f0000003dc0)='./file0\x00', 0xc0, 0x0) r0 = getuid() getresgid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) lchown(&(0x7f0000000000)='./file0\x00', r0, r1) 13:17:22 executing program 0: r0 = socket(0x2, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x0) [ 163.259626][ T3078] Bluetooth: hci0: command 0x0419 tx timeout 13:17:22 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(r0, 0x0, 0x0) 13:17:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$netlink(r0, 0x0, &(0x7f0000000080)) 13:17:22 executing program 3: r0 = socket(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) 13:17:22 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2804c0, 0x0) 13:17:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f00000001c0)) 13:17:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) bind$unix(r0, 0x0, 0x0) 13:17:22 executing program 2: open$dir(&(0x7f0000003dc0)='./file0\x00', 0xc0, 0x0) stat(&(0x7f0000000280)='./file0/file0\x00', 0x0) 13:17:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x70b942, 0x100) 13:17:22 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\xc9\xc7\xd1\x919\xa6\xef\xee\xd4\x81mH\x89\x029\xb5\r\x1aQ\xf0)\v\x13\xdbt\v@l;\xac~\xec\x04\x93MDX\xe3\\\b7e\x10\x13\x8a)\xa3\"2(8\xea*\xfe\xeeF\xe9\v\xdb\xc3\x03A6\xb5\xcc\xf4\xbe\x80\xb3\xfccdK\x8f\xc5\x18\xdd\xce\xfdq\xde\xf6\x87TS\x00\x00\x00', 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 13:17:22 executing program 2: shmget(0x3, 0x3000, 0x40, &(0x7f0000ffd000/0x3000)=nil) 13:17:22 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4040, 0x0) 13:17:22 executing program 2: lsetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 13:17:22 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x0, 0x0) 13:17:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, 0x0) [ 163.455114][ T46] audit: type=1800 audit(1605014242.647:33): pid=9372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file1" dev="sda1" ino=16568 res=0 errno=0 13:17:22 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\xc9\xc7\xd1\x919\xa6\xef\xee\xd4\x81mH\x89\x029\xb5\r\x1aQ\xf0)\v\x13\xdbt\v@l;\xac~\xec\x04\x93MDX\xe3\\\b7e\x10\x13\x8a)\xa3\"2(8\xea*\xfe\xeeF\xe9\v\xdb\xc3\x03A6\xb5\xcc\xf4\xbe\x80\xb3\xfccdK\x8f\xc5\x18\xdd\xce\xfdq\xde\xf6\x87TS\x00\x00\x00', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) sendfile(r0, r2, 0x0, 0x0) 13:17:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, 0x0) [ 163.494019][ T3078] Bluetooth: hci1: command 0x0419 tx timeout [ 163.502300][ T46] audit: type=1800 audit(1605014242.647:34): pid=9372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file1" dev="sda1" ino=16568 res=0 errno=0 13:17:22 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x208240, 0x1) 13:17:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') recvmsg(r0, 0x0, 0x0) 13:17:22 executing program 2: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self\x00', 0x0, 0x0) fstatfs(r0, &(0x7f0000000240)=""/247) 13:17:22 executing program 1: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000300)=@random={'user.', '/proc/self\x00'}) 13:17:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(r0, 0x0, 0x0, 0x0) 13:17:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getpeername$netlink(r0, 0x0, &(0x7f0000000080)) 13:17:22 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff}) renameat(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') [ 163.649748][ T3078] Bluetooth: hci2: command 0x0419 tx timeout 13:17:22 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000040)={{0x0, 0x0, 0xee01}}) 13:17:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) 13:17:22 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) fstatfs(r0, &(0x7f0000000100)=""/148) 13:17:22 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendto$unix(r0, &(0x7f0000000000), 0x0, 0x40000, 0x0, 0x0) 13:17:22 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0xb8c00, 0x0) 13:17:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0x8000) 13:17:22 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net\x00') read$eventfd(r0, 0x0, 0x0) 13:17:22 executing program 1: open$dir(&(0x7f0000003dc0)='./file0\x00', 0xc0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', r0, 0x0) 13:17:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) ioctl$TUNSETGROUP(r0, 0x400454ce, 0xee01) 13:17:22 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2012c3, 0x4e) 13:17:22 executing program 3: shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ff9000/0x4000)=nil) 13:17:23 executing program 1: open$dir(&(0x7f0000003dc0)='./file0\x00', 0xc0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', r0, 0x0) 13:17:23 executing program 0: r0 = eventfd(0xfffffff9) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) read$eventfd(r0, &(0x7f0000000000), 0x8) [ 163.809832][ T23] Bluetooth: hci3: command 0x0419 tx timeout 13:17:23 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) lstat(&(0x7f0000000100)='./file0/../file0\x00', 0x0) 13:17:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, 0x0, &(0x7f0000000180)) 13:17:23 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) 13:17:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) 13:17:23 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 13:17:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockname(r0, 0x0, 0x0) 13:17:23 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x280640, 0x40) 13:17:23 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 13:17:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 13:17:23 executing program 2: semget$private(0x0, 0x4, 0x540) 13:17:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 13:17:23 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80140, 0x20) 13:17:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, 0x0, 0x0) 13:17:23 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000400)='/proc/thread-self\x00', 0x10400, 0x0) 13:17:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') getsockname$netlink(r0, 0x0, 0x0) 13:17:23 executing program 0: semget$private(0x0, 0x2, 0x653) 13:17:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, 0x0, &(0x7f0000000080)) 13:17:23 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x200240, 0x8d) 13:17:23 executing program 1: getrusage(0x1, &(0x7f00000001c0)) 13:17:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x24b743, 0x0) write$cgroup_devices(r0, 0x0, 0xfffffffffffffd1c) 13:17:23 executing program 2: shmget(0x3, 0x4000, 0x200, &(0x7f0000ffb000/0x4000)=nil) 13:17:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(r0, &(0x7f0000000000)=""/106) 13:17:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x2101) 13:17:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, 0x0, 0x0) 13:17:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000c40), 0x4) 13:17:23 executing program 0: ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 13:17:23 executing program 3: semget$private(0x0, 0x4, 0x3a9) 13:17:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) 13:17:23 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x404102, 0x0) write$cgroup_pid(r0, 0x0, 0x0) 13:17:23 executing program 1: fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xee01, 0x0, 0x0) 13:17:23 executing program 2: shmget(0x3, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) 13:17:23 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40c6c3, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x20) 13:17:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) preadv2(r0, &(0x7f0000000540)=[{0x0}], 0x1, 0x0, 0x0, 0x1) 13:17:23 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 13:17:23 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x70b940, 0x100) 13:17:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') write$P9_RLERROR(r0, 0x0, 0x0) 13:17:23 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x8, 0x1) 13:17:23 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) 13:17:23 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0x0, 0x0) 13:17:23 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 13:17:23 executing program 1: faccessat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 13:17:23 executing program 2: r0 = eventfd(0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) 13:17:23 executing program 1: semget$private(0x0, 0x2, 0x2cdeae7412aaede7) 13:17:23 executing program 0: semget(0x1, 0x0, 0x25a) 13:17:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 13:17:23 executing program 1: semget$private(0x0, 0x2, 0x2cdeae7412aaede7) 13:17:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@dev, @multicast2, @private}, 0xc) 13:17:23 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0x0) 13:17:23 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200142, 0xc2) 13:17:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000200), 0x4) 13:17:23 executing program 3: open$dir(&(0x7f0000000080)='./file0\x00', 0x34f940, 0x1e1) 13:17:23 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2804c0, 0x4a) 13:17:23 executing program 1: semget(0x3, 0x3, 0x2e2) 13:17:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') getsockopt$netlink(r0, 0x10e, 0x0, 0x0, 0x0) 13:17:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, 0x0, 0x0) 13:17:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 13:17:23 executing program 1: open$dir(&(0x7f0000000180)='./file0\x00', 0x140, 0x6a) 13:17:23 executing program 0: open$dir(&(0x7f0000000040)='./file1\x00', 0x17c0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x80) 13:17:23 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x440, 0x30) 13:17:23 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) 13:17:23 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x3a3e43, 0x160) 13:17:23 executing program 2: r0 = socket(0x2, 0x2, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x0) 13:17:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f00000000c0)={@empty, @broadcast, @broadcast}, 0xc) 13:17:24 executing program 3: semget$private(0x0, 0x3, 0x4) 13:17:24 executing program 1: sync() syz_open_procfs(0x0, &(0x7f0000000000)='net/dev\x00') 13:17:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, 0x0, 0x0) 13:17:24 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, 0x0, 0x0) 13:17:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, 0x0, 0x20004000) 13:17:24 executing program 1: sync() syz_open_procfs(0x0, &(0x7f0000000000)='net/dev\x00') 13:17:24 executing program 2: open$dir(&(0x7f0000003dc0)='./file0\x00', 0xc0, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0xc000, 0x80) 13:17:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getpeername$inet(r0, 0x0, 0x0) 13:17:24 executing program 3: r0 = memfd_create(&(0x7f0000000480)='\xc9\xc7\xd1\x919\xa6\xef\xee\xd4\x81mH\x89\x029\xb5\r\x1aQ\xf0)\v\x13\xdbt\v@l;\xac~\xec\x04\x93MDX\xe3\\\b7e\x10\x13\x8a)\xa3\"2(8\xea*\x01\x00\x00\x00\v\xdb\xc3\x03A6\xb5\xcc\xf4\xbe\x80\xb3\xfccdK\x8f\xc5\x18\xdd\xce\xfdq\xde\xf6\x87T\x01\x00\x00\x00\x00\x00\x00\x00\xe3\xf3\xc4\xe7Py\xb5\xea\xa6\xcct7F\xf3\xaaZ.\x16f\"\x80\x94\xd2\bNV\xfd\xec\x15\xdf;t^\x156\xefdg\x83\r\xd9\x18\x1ch!7T0\t\x95:5\x7f{\x00s\xfc\xbf\f\xc8\xbb\x15\x86\xc6\xc4\x91\xdc\xf2\x13\x02`\x99!\xc2\xf0\xa5\x97RU\x14sk\x8c \xdeP}\xc4 \x06\xc4\xc0\x1a\'\x9a\xdf\xe9>\x98GXU\x0eC\xfc\xc5eo\xab\x85/\xfd\x9dY\xcbY\x89\xd8\x0f\x04:m\x8b\xd7\x81\xba\x9d\t\xb9\x89p\xe0\x94o\xebf\xfb\x8f\\\xce\xd1\x8dsv7\xce\x80&\x90Kg\x00\x13!\xee\xe2^\x05\f\xba\xcf\x04\xa6\x10\xa9\x11\xd3\xc6q/\xbec\xe7\xac8\xa8\xcd\xcb\xe8\xa2h\xe0z\xf9\xa55\xe2_a\xcdy\xcde\xabLQ\x93\x931\xc1\x85\xc4\x99\xabf\xafV\x8eV\xf2\xa5\xb3\x9b\xbe; \xb8\xe9\x99\x9a\x1fHl\xe8\xd9\x1f\x10\xd3\x15\xd2\x86\xb9q\xd8\x84/s9\\\x95\xd2`$/\xc4?.\x86r\xad\xd6\x95,)\x86J\xbe7\xa0&\x1a\\\xe1\xbe\xfd:C\xc3s\xb2\x88/\x13\n\x0f\'i\xee\x8d-\xe3,\xd7(\x80\xf9\x93/A:\x7f\xedg\x99\xd6\x93X\xfa\xb1\xc1_G\ay\xd8\xe40\x9bgr\x1bR\x18.LD\x01\x14\x01\xf4O\xc9\x8dG\xc5\x8f\x86\xa8\xfa\xbd\xfb\xfa\xd1#G\xbe\xd1\xc0\xd8\r\x1bn\x86Tb\\4\xf2Dub\xc7\xdd\x94\xd3\xeb-s\xef`\xc9\xee\xbfP\x04h\xe9_\xef\\K\x98\x80`J4\xe7\xecbU\xb8W0\x94\x1d\x91\x03\xbe\xb1\xb8\xdc\xb5\xc9\xebw\"\x8eLo\xb2\xbb\x9b\xa9#\xb9\'\xc4\xae\xc6{\x1b\xb2\xad\xbcM9\x16LS\xb3\x1dK\xe6\xa3\xea$\x0e2\x96\xd1WS\x8d$\xe76\x8dnu\xca\xe8\xf6\xef]\x89iGJ\xef\xe79\xfc\xed\xd9=\xdd\xae\xd8\xa5\xc18U\x12\x05S%\x0f1\xe3\x92\x02\x98Jh\xacN\x1e', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) fallocate(r2, 0x0, 0x0, 0xffff) 13:17:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, 0x0, 0x2a) 13:17:24 executing program 2: syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='fdinfo/3\x00') getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 13:17:24 executing program 3: shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffd000/0x2000)=nil) 13:17:24 executing program 0: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000000)) 13:17:24 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\xc9\xc7\xd1\x919\xa6\xef\xee\xd4\x81mH\x89\x029\xb5\r\x1aQ\xf0)\v\x13\xdbt\v@l;\xac~\xec\x04\x93MDX\xe3\\\b7e\x10\x13\x8a)\xa3\"2(8\xea*\xfe\xeeF\xe9\v\xdb\xc3\x03A6\xb5\xcc\xf4\xbe\x80\xb3\xfccdK\x8f\xc5\x18\xdd\xce\xfdq\xde\xf6\x87TS\x00\x00\x00', 0x0) ftruncate(r0, 0x0) 13:17:24 executing program 3: open$dir(&(0x7f0000003dc0)='./file0\x00', 0x12040, 0x13) 13:17:24 executing program 1: open$dir(&(0x7f0000003dc0)='./file0\x00', 0xc0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 13:17:24 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 13:17:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x1, 0x0, &(0x7f0000000040)) 13:17:24 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROSET(r0, 0x125d, 0x0) 13:17:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') connect$netlink(r0, 0x0, 0x0) 13:17:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') sendmmsg$sock(r0, 0x0, 0x0, 0x0) 13:17:24 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x111800, 0x2) 13:17:24 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_mreq(r0, 0x0, 0x0, 0x0, 0x0) 13:17:24 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x41, 0x10) 13:17:24 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x400140, 0x127) 13:17:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000000)=""/169, &(0x7f00000000c0)=0xa9) 13:17:24 executing program 1: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETATTR(r0, 0x0, 0x0) 13:17:24 executing program 0: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 13:17:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000000100)) 13:17:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, 0x0, 0x0) 13:17:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) getpeername(r0, 0x0, &(0x7f0000000140)) 13:17:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) 13:17:24 executing program 0: io_setup(0x0, &(0x7f0000000140)=0x0) io_getevents(r0, 0x0, 0x0, &(0x7f0000000340), 0x0) 13:17:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='environ\x00') write$cgroup_freezer_state(r0, 0x0, 0x0) 13:17:24 executing program 3: semget$private(0x0, 0x2, 0x8) 13:17:24 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x3a3e43, 0x0) preadv2(r0, 0x0, 0x0, 0x0, 0x0, 0x4) 13:17:24 executing program 2: utime(&(0x7f0000000000)='./file0\x00', 0x0) 13:17:24 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, 0x0, 0x0) 13:17:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040), &(0x7f0000000080)=0x4) 13:17:24 executing program 2: socket$inet6(0xa, 0x1, 0x7) 13:17:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') accept4(r0, 0x0, 0x0, 0x0) 13:17:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x20008800) 13:17:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 13:17:24 executing program 3: semget$private(0x0, 0x4, 0x100) 13:17:24 executing program 1: r0 = eventfd(0xfffffff9) write(r0, &(0x7f0000000100)="00aa9c55d804ff25", 0x8) 13:17:24 executing program 0: semget$private(0x0, 0x1, 0x32) 13:17:24 executing program 1: clock_gettime(0x2, &(0x7f00000001c0)) 13:17:24 executing program 2: open$dir(&(0x7f0000000040)='./file1\x00', 0x17c0, 0xa0) 13:17:24 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) 13:17:24 executing program 0: add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 13:17:24 executing program 1: r0 = eventfd(0xfffffff9) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 13:17:24 executing program 3: r0 = getegid() setresgid(0xee00, 0xee00, r0) 13:17:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) read$eventfd(r2, 0x0, 0x0) 13:17:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x4000) 13:17:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000040), 0x4) 13:17:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='gid_map\x00') inotify_rm_watch(r0, 0x0) 13:17:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect(r0, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80) 13:17:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='status\x00') sendmmsg$unix(r0, 0x0, 0x0, 0x0) 13:17:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x895, 0x0, 0x0) 13:17:24 executing program 3: clone(0x22050080, 0x0, 0x0, 0x0, 0x0) 13:17:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f00000000c0), 0xc) 13:17:25 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 13:17:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000000180)=""/249, 0xf9, 0x0, 0x0, 0x0) 13:17:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000140)) 13:17:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getpeername(r0, 0x0, 0x0) 13:17:25 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x7011c1, 0x1) 13:17:25 executing program 0: open$dir(&(0x7f0000000040)='./file1\x00', 0x16c0, 0xb1) 13:17:25 executing program 2: shmget$private(0x0, 0x2000, 0x200, &(0x7f0000ffe000/0x2000)=nil) 13:17:25 executing program 3: open$dir(&(0x7f0000003dc0)='./file0\x00', 0xc0, 0x0) 13:17:25 executing program 2: semget(0x0, 0x4, 0x200) 13:17:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/netlink\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) 13:17:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x24b743, 0x0) write$cgroup_devices(r0, 0x0, 0x21) 13:17:25 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) 13:17:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xffffffffffffffd2) 13:17:25 executing program 2: getgroups(0x0, &(0x7f0000000100)) 13:17:25 executing program 3: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 13:17:25 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, 0x0, 0x0) 13:17:25 executing program 3: open$dir(&(0x7f0000003dc0)='./file0\x00', 0x40c940, 0x198) 13:17:25 executing program 1: r0 = eventfd2(0x0, 0x0) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000100)=""/255, 0xff}], 0x1) 13:17:25 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x19a242, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x8c) 13:17:25 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8440, 0xc) 13:17:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0xffffffffffffffee) 13:17:26 executing program 3: open$dir(&(0x7f0000003dc0)='./file0\x00', 0xc0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 13:17:26 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) fstat(r0, &(0x7f0000000040)) 13:17:26 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ipv6_route\x00') setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0xd6baf95148f286e3) 13:17:26 executing program 3: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x7ae) 13:17:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x208001, 0x0) write$cgroup_int(r0, 0x0, 0x0) 13:17:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0x0, 0x0) 13:17:26 executing program 3: shmget(0x3, 0x4000, 0x80, &(0x7f0000ffc000/0x4000)=nil) 13:17:26 executing program 0: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='system.posix_acl_default\x00') 13:17:26 executing program 2: open$dir(&(0x7f0000000040)='./file1\x00', 0x120740, 0x64) 13:17:26 executing program 0: r0 = memfd_create(&(0x7f0000000140)='\xc9\xc7\xd1\x919\xa6\xef\xee\xd4\x81mH\x89\x029\xb5\r\x1aQ\xf0)\v\x13\xdbt\v@l;\xac~\xec\x04\x93MDX\xe3\\\b7e\x10\x13\x8a)\xa3\"2(8\xea*\xfe\xeeF\xe9\v\xdb\xc3\x03A6\xb5\xcc\xf4\xbe\x80\xb3\xfccdK\x8f\xc5\x18\xdd\xce\xfdq\xde\xf6\x87TS\x00\x00\x00', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) pwrite64(r2, 0x0, 0x0, 0x0) 13:17:26 executing program 3: open$dir(&(0x7f0000000040)='./file0\x00', 0xc30840, 0x123) 13:17:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='statm\x00') write$nbd(r0, 0x0, 0x2a) 13:17:26 executing program 2: semget$private(0x0, 0x4, 0x108) 13:17:26 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001480)='/proc/thread-self\x00', 0x113d40, 0x0) 13:17:26 executing program 0: open$dir(&(0x7f0000000180)='./file0\x00', 0x140, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x41000422) 13:17:26 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x280440, 0x0) fstatfs(r0, &(0x7f0000000040)=""/91) 13:17:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, 0x0, &(0x7f0000000080)) 13:17:26 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, 0x0) 13:17:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 13:17:26 executing program 1: r0 = epoll_create(0x384) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) 13:17:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 13:17:27 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, 0x0) 13:17:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, 0x0, 0xffffffffffffff84) 13:17:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000040)={@empty, @remote}, &(0x7f00000000c0)=0xc) 13:17:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') write$9p(r0, 0x0, 0x49) 13:17:27 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) getsockname$unix(r0, 0x0, &(0x7f00000000c0)) 13:17:27 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\xc9\xc7\xd1\x919\xa6\xef\xee\xd4\x81mH\x89\x029\xb5\r\x1aQ\xf0)\v\x13\xdbt\v@l;\xac~\xec\x04\x93MDX\xe3\\\b7e\x10\x13\x8a)\xa3\"2(8\xea*\xfe\xeeF\xe9\v\xdb\xc3\x03A6\xb5\xcc\xf4\xbe\x80\xb3\xfccdK\x8f\xc5\x18\xdd\xce\xfdq\xde\xf6\x87TS\x00\x00\x00', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) read$char_usb(r2, 0x0, 0x0) 13:17:27 executing program 0: io_setup(0x0, &(0x7f0000000140)=0x0) io_getevents(r0, 0x1, 0x1, &(0x7f0000000340)=[{}], 0x0) 13:17:27 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x2800, 0x0) 13:17:27 executing program 2: open$dir(&(0x7f0000000040)='./file1\x00', 0x17c0, 0x0) lsetxattr(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)=@known='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:17:27 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 13:17:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') getpeername$netlink(r0, 0x0, 0x0) 13:17:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffdc2) 13:17:27 executing program 2: open$dir(&(0x7f0000003dc0)='./file0\x00', 0xc0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 13:17:27 executing program 3: open$dir(&(0x7f0000000180)='./file0\x00', 0x70bd42, 0x20) 13:17:27 executing program 1: clock_getres(0x4, &(0x7f00000000c0)) 13:17:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) 13:17:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, 0x0, 0x0) 13:17:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/udp6\x00') read$eventfd(r0, 0x0, 0x0) 13:17:27 executing program 3: r0 = memfd_create(&(0x7f0000000140)='\xc9\xc7\xd1\x919\xa6\xef\xee\xd4\x81mH\x89\x029\xb5\r\x1aQ\xf0)\v\x13\xdbt\v@l;\xac~\xec\x04\x93MDX\xe3\\\b7e\x10\x13\x8a)\xa3\"2(8\xea*\xfe\xeeF\xe9\v\xdb\xc3\x03A6\xb5\xcc\xf4\xbe\x80\xb3\xfccdK\x8f\xc5\x18\xdd\xce\xfdq\xde\xf6\x87TS\x00\x00\x00', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendfile(r1, r0, 0x0, 0x0) 13:17:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/dev\x00') setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 13:17:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000300)=@file={0x1, './file1\x00'}, 0x6e) 13:17:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x40) 13:17:27 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) 13:17:27 executing program 2: open$dir(&(0x7f0000000180)='./file0\x00', 0x140, 0x122) 13:17:27 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000b00)=ANY=[], 0x218}, 0x0) 13:17:27 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x0, 0x5, 0x0, "78b8f4ce4594f943166074acee3cea3d584cecf7638b0cc2f6b5213fdc22b2b2"}) 13:17:27 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000013ec0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000013d40)=""/116, 0x74}], 0x1}, 0x0) close(r1) 13:17:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe4f7, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) 13:17:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x24}}, 0x0) 13:17:27 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0xf800, 0x0, 0x14, "c6aaf8203a9a0afb"}) 13:17:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x24}}, 0x0) 13:17:27 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe4f7, 0x0) 13:17:27 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000013ec0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000013d40)=""/116, 0x74}], 0x1}, 0x0) close(r1) [ 168.302601][T10027] usb usb5: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #0 13:17:27 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:27 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe4f7, 0x0) 13:17:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe4f7, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) [ 168.391041][T10044] ptrace attach of "/syz-executor.3"[9127] was attempted by "/syz-executor.3"[10044] 13:17:27 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe4f7, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) 13:17:27 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:27 executing program 0: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) [ 168.435940][T10055] usb usb5: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #0 [ 168.442462][T10058] ptrace attach of "/syz-executor.3"[9127] was attempted by "/syz-executor.3"[10058] [ 168.457329][T10057] usb usb5: usbfs: interface 0 claimed by hub while 'syz-executor.1' sets config #0 13:17:27 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:27 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 168.459996][T10061] ptrace attach of "/syz-executor.0"[9121] was attempted by "/syz-executor.0"[10061] 13:17:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe4f7, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) [ 168.517435][T10068] ptrace attach of "/syz-executor.3"[9127] was attempted by "/syz-executor.3"[10068] 13:17:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)={[{@fat=@umask={'umask', 0x3d, 0xffffffff}}]}) 13:17:27 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) [ 168.548769][T10073] usb usb5: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #0 [ 168.597498][T10081] ptrace attach of "/syz-executor.3"[9127] was attempted by "/syz-executor.3"[10081] 13:17:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe4f7, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) 13:17:27 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:27 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x8936, 0x400000) [ 168.681451][T10090] usb usb5: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #0 [ 168.684493][T10093] ptrace attach of "/syz-executor.3"[9127] was attempted by "/syz-executor.3"[10093] 13:17:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 13:17:27 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:17:27 executing program 2: ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) 13:17:27 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) [ 168.747545][T10102] ptrace attach of "/syz-executor.3"[9127] was attempted by "/syz-executor.3"[10102] 13:17:27 executing program 1: syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1023, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x2e6}], 0x0, &(0x7f0000010300)) rmdir(&(0x7f0000000180)='./file0/file1\x00') 13:17:27 executing program 2: ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) 13:17:27 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) [ 168.826422][T10114] ptrace attach of "/syz-executor.3"[9127] was attempted by "/syz-executor.3"[10114] 13:17:28 executing program 2: ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) 13:17:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 13:17:28 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000002440)={'veth0_macvtap\x00'}) 13:17:28 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0xe4f7, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) 13:17:28 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:28 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) [ 168.939859][T10123] veth0_macvtap: mtu less than device minimum 13:17:28 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0xe4f7, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) 13:17:28 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x0, 0xf02}) 13:17:28 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:28 executing program 0: syz_usb_connect(0x0, 0x53, &(0x7f0000000700)={{0x12, 0x1, 0x0, 0x31, 0xf3, 0x5b, 0x40, 0xe8d, 0x4, 0x54fe, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x41, 0x2, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xe, 0x1, 0x0, 0x0, [@uac_control={{}, [@feature_unit={0x9, 0x24, 0x6, 0x0, 0x0, 0x1, [0x0]}, @feature_unit={0xb, 0x24, 0x6, 0x0, 0x0, 0x2, [0x0, 0x0]}]}], [{}]}}, {{0x9, 0x4, 0x0, 0x0, 0x0, 0xe2, 0x9d, 0x4c}}]}}]}}, 0x0) 13:17:28 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0xe4f7, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) 13:17:28 executing program 1: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) 13:17:28 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:28 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:28 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) 13:17:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:28 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) [ 169.369765][ T36] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 169.760606][ T36] usb 5-1: config 0 descriptor has 1 excess byte, ignoring [ 169.772107][ T36] usb 5-1: config 0 has 1 interface, different from the descriptor's value: 2 [ 169.786719][ T36] usb 5-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 169.999891][ T36] usb 5-1: New USB device found, idVendor=0e8d, idProduct=0004, bcdDevice=54.fe [ 170.013021][ T36] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 170.025640][ T36] usb 5-1: Product: syz [ 170.032873][ T36] usb 5-1: Manufacturer: syz [ 170.041654][ T36] usb 5-1: SerialNumber: syz [ 170.052297][ T36] usb 5-1: config 0 descriptor?? [ 170.124386][ T36] uvcvideo: Found UVC 0.00 device syz (0e8d:0004) [ 170.134434][ T36] uvcvideo: No valid video chain found. [ 170.324435][ T36] usb 5-1: USB disconnect, device number 2 [ 171.099643][ T9180] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 171.460072][ T9180] usb 5-1: config 0 descriptor has 1 excess byte, ignoring [ 171.469207][ T9180] usb 5-1: config 0 has 1 interface, different from the descriptor's value: 2 [ 171.480286][ T9180] usb 5-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 171.650719][ T9180] usb 5-1: New USB device found, idVendor=0e8d, idProduct=0004, bcdDevice=54.fe [ 171.662063][ T9180] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 171.673206][ T9180] usb 5-1: Product: syz [ 171.678603][ T9180] usb 5-1: Manufacturer: syz [ 171.685656][ T9180] usb 5-1: SerialNumber: syz [ 171.706109][ T9180] usb 5-1: config 0 descriptor?? [ 171.752953][ T9180] uvcvideo: Found UVC 0.00 device syz (0e8d:0004) [ 171.762071][ T9180] uvcvideo: No valid video chain found. [ 171.960130][ T9180] usb 5-1: USB disconnect, device number 3 13:17:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) 13:17:31 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:31 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:31 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) 13:17:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:31 executing program 0: 13:17:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe4f7, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) 13:17:31 executing program 0: 13:17:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:31 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:31 executing program 0: 13:17:31 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe4f7, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) [ 172.191856][T10214] ptrace attach of "/syz-executor.3"[9127] was attempted by "/syz-executor.3"[10214] 13:17:31 executing program 0: 13:17:31 executing program 0: 13:17:31 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe4f7, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) 13:17:31 executing program 0: 13:17:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:31 executing program 2: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe4f7, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) 13:17:31 executing program 0: [ 172.361283][T10231] ptrace attach of "/syz-executor.3"[9127] was attempted by "/syz-executor.3"[10231] 13:17:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:31 executing program 0: 13:17:31 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:31 executing program 2: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe4f7, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) 13:17:31 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:31 executing program 0: 13:17:31 executing program 2: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe4f7, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) 13:17:31 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00'}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:31 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:31 executing program 0: 13:17:31 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00'}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe4f7, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, 0x0) 13:17:31 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:31 executing program 0: 13:17:31 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00'}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe4f7, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, 0x0) 13:17:31 executing program 0: 13:17:31 executing program 0: 13:17:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:31 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xe4f7, 0x401) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, 0x0) 13:17:31 executing program 0: 13:17:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:31 executing program 0: 13:17:31 executing program 2: syz_mount_image$msdos(&(0x7f0000000a00)='msdos\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x2, &(0x7f0000001e40)=[{0x0, 0x0, 0x80000000}, {&(0x7f0000001b00)="a9a19d858c255433a890", 0xa, 0x7}], 0x0, &(0x7f0000001ec0)) 13:17:31 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 0: [ 172.815583][T10309] FAT-fs (loop2): invalid media value (0x00) [ 172.828440][T10309] FAT-fs (loop2): Can't find a valid FAT filesystem 13:17:32 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:32 executing program 2: 13:17:32 executing program 0: 13:17:32 executing program 2: 13:17:32 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:32 executing program 0: 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:32 executing program 2: 13:17:32 executing program 0: 13:17:32 executing program 2: 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 2: 13:17:32 executing program 0: 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:32 executing program 2: 13:17:32 executing program 0: 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 2: 13:17:32 executing program 0: 13:17:32 executing program 2: 13:17:32 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 0: 13:17:32 executing program 2: 13:17:32 executing program 0: 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 2: 13:17:32 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 0: 13:17:32 executing program 2: 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 2: 13:17:32 executing program 0: 13:17:32 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 0: 13:17:32 executing program 2: 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:32 executing program 0: 13:17:32 executing program 2: 13:17:32 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 13:17:32 executing program 0: 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 2: 13:17:32 executing program 0: 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 2: 13:17:32 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 13:17:32 executing program 0: 13:17:32 executing program 2: 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 0: 13:17:32 executing program 2: 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 13:17:32 executing program 2: 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 0: 13:17:32 executing program 0: 13:17:32 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 13:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000010"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:32 executing program 2: 13:17:33 executing program 0: 13:17:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000010"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:33 executing program 0: 13:17:33 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380), 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 13:17:33 executing program 2: 13:17:33 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380), 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 13:17:33 executing program 0: 13:17:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000010"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:33 executing program 2: 13:17:33 executing program 0: 13:17:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000100000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:33 executing program 2: 13:17:33 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380), 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 13:17:33 executing program 0: 13:17:33 executing program 2: 13:17:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000100000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:33 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 13:17:33 executing program 2: 13:17:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000100000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:33 executing program 0: 13:17:33 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 13:17:33 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) 13:17:33 executing program 2: 13:17:33 executing program 0: 13:17:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000010000013"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:33 executing program 2: 13:17:33 executing program 2: 13:17:33 executing program 0: 13:17:33 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, 0x0, 0x0, 0x0) 13:17:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000010000013"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:33 executing program 0: 13:17:33 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, 0x0, 0x0, 0x0) 13:17:33 executing program 2: 13:17:33 executing program 0: 13:17:33 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, 0x0, 0x0, 0x0) 13:17:33 executing program 2: 13:17:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000010000013"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:33 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540), 0x0, 0x0) 13:17:33 executing program 0: 13:17:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:33 executing program 2: 13:17:33 executing program 0: 13:17:33 executing program 2: 13:17:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:33 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540), 0x0, 0x0) 13:17:33 executing program 0: 13:17:33 executing program 2: 13:17:33 executing program 0: 13:17:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:33 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540), 0x0, 0x0) 13:17:33 executing program 2: 13:17:33 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{0x0}], 0x1, 0x0) 13:17:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:33 executing program 0: 13:17:33 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{0x0}], 0x1, 0x0) 13:17:33 executing program 2: 13:17:33 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{0x0}], 0x1, 0x0) 13:17:33 executing program 0: 13:17:33 executing program 2: 13:17:33 executing program 2: 13:17:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:34 executing program 3: 13:17:34 executing program 2: 13:17:34 executing program 0: 13:17:34 executing program 2: 13:17:34 executing program 0: 13:17:34 executing program 3: 13:17:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:34 executing program 2: 13:17:34 executing program 0: 13:17:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0, r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:34 executing program 2: 13:17:34 executing program 3: 13:17:34 executing program 0: 13:17:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0, r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:34 executing program 2: 13:17:34 executing program 0: 13:17:34 executing program 3: 13:17:34 executing program 0: 13:17:34 executing program 2: 13:17:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0, r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:34 executing program 2: 13:17:34 executing program 0: 13:17:34 executing program 3: 13:17:34 executing program 2: 13:17:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00'}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:34 executing program 0: 13:17:34 executing program 2: 13:17:34 executing program 3: 13:17:34 executing program 2: 13:17:34 executing program 0: 13:17:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00'}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:34 executing program 2: 13:17:34 executing program 3: 13:17:34 executing program 2: 13:17:34 executing program 0: 13:17:34 executing program 3: 13:17:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000001395"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00'}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:17:34 executing program 0: 13:17:34 executing program 2: 13:17:34 executing program 0: 13:17:34 executing program 3: 13:17:34 executing program 2: 13:17:34 executing program 1: 13:17:34 executing program 0: 13:17:34 executing program 3: 13:17:34 executing program 2: 13:17:34 executing program 1: 13:17:34 executing program 0: 13:17:34 executing program 1: 13:17:34 executing program 2: 13:17:34 executing program 3: 13:17:34 executing program 0: 13:17:34 executing program 2: 13:17:34 executing program 1: 13:17:35 executing program 2: 13:17:35 executing program 0: 13:17:35 executing program 1: 13:17:35 executing program 3: 13:17:35 executing program 2: 13:17:35 executing program 1: 13:17:35 executing program 0: 13:17:35 executing program 2: 13:17:35 executing program 3: 13:17:35 executing program 1: 13:17:35 executing program 2: 13:17:35 executing program 0: 13:17:35 executing program 3: 13:17:35 executing program 1: 13:17:35 executing program 1: 13:17:35 executing program 3: 13:17:35 executing program 0: 13:17:35 executing program 2: 13:17:35 executing program 0: 13:17:35 executing program 1: 13:17:35 executing program 3: 13:17:35 executing program 2: 13:17:35 executing program 0: 13:17:35 executing program 1: 13:17:35 executing program 2: 13:17:35 executing program 3: 13:17:35 executing program 0: 13:17:35 executing program 1: 13:17:35 executing program 0: 13:17:35 executing program 1: 13:17:35 executing program 2: 13:17:35 executing program 3: 13:17:35 executing program 2: 13:17:35 executing program 1: 13:17:35 executing program 0: 13:17:35 executing program 2: 13:17:35 executing program 3: 13:17:35 executing program 1: 13:17:35 executing program 0: 13:17:35 executing program 0: 13:17:35 executing program 2: 13:17:35 executing program 3: 13:17:35 executing program 1: 13:17:35 executing program 0: 13:17:35 executing program 2: 13:17:35 executing program 1: 13:17:35 executing program 3: 13:17:35 executing program 2: 13:17:35 executing program 0: 13:17:35 executing program 2: 13:17:35 executing program 3: 13:17:35 executing program 1: 13:17:35 executing program 0: 13:17:35 executing program 2: 13:17:35 executing program 1: 13:17:35 executing program 0: 13:17:35 executing program 2: 13:17:35 executing program 3: 13:17:35 executing program 2: 13:17:35 executing program 0: 13:17:35 executing program 1: 13:17:35 executing program 0: 13:17:35 executing program 2: 13:17:35 executing program 3: 13:17:35 executing program 0: 13:17:35 executing program 1: 13:17:35 executing program 2: 13:17:36 executing program 3: 13:17:36 executing program 0: 13:17:36 executing program 1: 13:17:36 executing program 2: 13:17:36 executing program 3: 13:17:36 executing program 0: 13:17:36 executing program 1: 13:17:36 executing program 3: 13:17:36 executing program 2: 13:17:36 executing program 0: 13:17:36 executing program 0: 13:17:36 executing program 2: 13:17:36 executing program 1: 13:17:36 executing program 2: 13:17:36 executing program 1: 13:17:36 executing program 3: 13:17:36 executing program 0: 13:17:36 executing program 2: 13:17:36 executing program 0: 13:17:36 executing program 1: 13:17:36 executing program 3: 13:17:36 executing program 2: 13:17:36 executing program 2: 13:17:36 executing program 0: 13:17:36 executing program 1: 13:17:36 executing program 3: 13:17:36 executing program 0: 13:17:36 executing program 2: 13:17:36 executing program 1: 13:17:36 executing program 2: 13:17:36 executing program 0: 13:17:36 executing program 3: 13:17:36 executing program 1: 13:17:36 executing program 2: 13:17:36 executing program 0: 13:17:36 executing program 1: 13:17:36 executing program 3: 13:17:36 executing program 1: 13:17:36 executing program 2: 13:17:36 executing program 0: 13:17:36 executing program 1: 13:17:36 executing program 0: 13:17:36 executing program 2: 13:17:36 executing program 3: 13:17:36 executing program 0: 13:17:36 executing program 2: 13:17:36 executing program 1: 13:17:36 executing program 0: 13:17:36 executing program 2: 13:17:36 executing program 3: 13:17:36 executing program 1: 13:17:36 executing program 0: 13:17:36 executing program 2: 13:17:36 executing program 0: 13:17:36 executing program 1: 13:17:36 executing program 3: 13:17:36 executing program 2: 13:17:36 executing program 1: 13:17:36 executing program 0: 13:17:36 executing program 3: 13:17:36 executing program 0: 13:17:36 executing program 2: 13:17:36 executing program 1: 13:17:36 executing program 3: 13:17:36 executing program 2: 13:17:36 executing program 0: 13:17:36 executing program 1: 13:17:36 executing program 2: 13:17:36 executing program 1: 13:17:36 executing program 0: 13:17:36 executing program 3: 13:17:36 executing program 0: 13:17:37 executing program 2: 13:17:37 executing program 1: 13:17:37 executing program 0: 13:17:37 executing program 3: 13:17:37 executing program 1: 13:17:37 executing program 0: 13:17:37 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000040)=0x2da, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) r1 = socket(0x40000000002, 0x3, 0x80000000002) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) setsockopt$inet_int(r1, 0x0, 0x4, &(0x7f0000000080), 0x4) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) 13:17:37 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x10}, 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000140, 0x0) 13:17:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004f40)={0xffffffffffffffff}) connect$unix(r0, 0x0, 0x41) 13:17:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x28, 0x3, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_MARK={0x8}, @NFQA_VERDICT_HDR={0xc}]}, 0x28}}, 0x0) 13:17:37 executing program 1: r0 = socket(0x2, 0x3, 0x3) clock_gettime(0x0, &(0x7f0000002b00)) recvmmsg(r0, &(0x7f0000002a80)=[{{&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000000140)=""/141, 0x8d}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x22, 0x0) sendmmsg$sock(r0, &(0x7f0000000080)=[{{&(0x7f00000000c0)=@l2tp={0x2, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x0) 13:17:37 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000002c0)='./file0\x00') 13:17:37 executing program 0: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000080)='net_prio.ifpriomap\x00', 0x2, 0x0) set_mempolicy(0x0, &(0x7f0000000080), 0x80) [ 177.966672][T11019] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it! 13:17:37 executing program 3: sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000240)) 13:17:37 executing program 2: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) 13:17:37 executing program 0: r0 = socket(0xa, 0x3, 0x3) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) 13:17:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x1c, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:17:37 executing program 0: r0 = socket(0xa, 0x3, 0x3) bind$packet(r0, 0x0, 0x0) 13:17:37 executing program 1: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='trusted.overlay.redirect\x00', &(0x7f0000000480)='./file0\x00', 0x8, 0x0) 13:17:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:17:37 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000800)='pagemap\x00') 13:17:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)={0x18, 0x0, 0x1, 0x3, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}}, 0x0) 13:17:37 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') 13:17:37 executing program 0: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) 13:17:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000280)=0x3, 0x4) 13:17:37 executing program 1: timer_create(0x3, &(0x7f0000000180)={0x0, 0x5, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) 13:17:37 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) 13:17:37 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000000)="69040cf7cc50bc69a09907c6963ac3bc", 0x10) 13:17:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001ac0)=ANY=[@ANYBLOB="64000000000101"], 0x64}}, 0x0) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000300)=@rc={0x1f, @none}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000380)=""/201, 0xc9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x2, &(0x7f00000019c0)={0x77359400}) 13:17:37 executing program 2: socket$inet(0x2, 0x80a, 0x2) 13:17:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004f40)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x1800029, 0x0) 13:17:37 executing program 3: r0 = socket(0xa, 0x3, 0x3) getsockname(r0, 0x0, &(0x7f0000000080)) [ 178.302304][T11084] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) [ 178.311205][T11080] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.1'. [ 178.329733][T11080] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.1'. 13:17:37 executing program 0: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:17:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x20, 0x0, 0x1, 0x301, 0x0, 0x0, {}, [@CTA_SYNPROXY={0x4}, @CTA_ZONE={0x6}]}, 0x20}}, 0x0) 13:17:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000000b06010100000000000010000000000005000100060000000900020073797a30000000002000078006000440000000000c0001"], 0x48}}, 0x0) 13:17:37 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/bnep\x00') 13:17:37 executing program 1: r0 = socket(0xa, 0x3, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 13:17:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006840)={0x0, 0x0, &(0x7f0000008fc0)=[{&(0x7f0000006900)=ANY=[@ANYBLOB="1c00000000000000000000000000000000ac14140004000080"], 0x1c}], 0x1}, 0x0) sendmmsg$sock(r0, &(0x7f0000006880)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)}}], 0x24, 0x0) 13:17:37 executing program 2: socket$packet(0x11, 0x2, 0x300) select(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x8}, &(0x7f00000001c0)={0x0, 0xea60}) 13:17:37 executing program 3: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:17:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, @generic={0x2, "3e633cbb610bbb4328130326336c"}, @ipx={0x4, 0x0, 0x0, "8a7ec4a455d5"}, @sco, 0x1ff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)='veth1_to_bond\x00'}) 13:17:37 executing program 2: 13:17:37 executing program 0: r0 = socket(0xa, 0x3, 0x3) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)) 13:17:37 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 13:17:37 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x7, 0x80) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000180)) 13:17:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup2(r0, r0) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x4000001) 13:17:37 executing program 0: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x58, 0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x1}, 0x8, 0x0) 13:17:37 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/mcfilter6\x00') 13:17:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFBR(r0, 0x8940, 0x0) 13:17:37 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0xa0600, 0x0) 13:17:37 executing program 2: r0 = socket(0x2, 0x3, 0x3) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, @l2tp={0x2, 0x0, @loopback}, @in={0x2, 0x0, @multicast2}, @tipc=@id, 0x455}) 13:17:37 executing program 0: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0xa, r0, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, r1) 13:17:37 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = dup2(r0, r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2, 0x6, 0x201}, 0x14}}, 0x0) 13:17:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004f40)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 13:17:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)=@req={0x28, &(0x7f0000000000)={'sit0\x00', @ifru_addrs=@hci}}) 13:17:37 executing program 0: r0 = socket(0x2, 0x3, 0x3) socket$packet(0x11, 0x2, 0x300) sendmmsg$sock(r0, &(0x7f0000003300)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x0) 13:17:37 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) 13:17:37 executing program 2: request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0) 13:17:37 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xad}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:17:37 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x200, 0x0) 13:17:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 13:17:38 executing program 0: r0 = socket(0x2, 0x3, 0x3) socket$packet(0x11, 0x2, 0x300) sendmmsg$sock(r0, &(0x7f0000003300)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x0) 13:17:38 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/user\x00') 13:17:38 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 13:17:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x58}}, 0x0) 13:17:38 executing program 2: timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f00000001c0)) 13:17:38 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000ec0)) 13:17:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004f40)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 13:17:38 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000180)="da77ff8100339d0ddcf817a9d8eb333125645c6609876b5426a685cf4494c0554119f4d93658d503a6c3c630d6e11d2ed78d762c3ad9f28d2539a862a9de804d9fa62a648dfc848ec20452bf9324c8d6b8d509c1f7d956d82f5b6065ed581ad32cc7d6f591a5d723cc9b34d89bd2a574874af4a7b7538560c8f56ce10f608e3652d6896e5189c8ef16451f812bb1c327", 0x90}], 0x1}}], 0x1, 0x0) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x10}, 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000006080)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000200), 0x9}}], 0x2, 0x0, 0x0) 13:17:38 executing program 2: select(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x5}, 0x0, 0x0) 13:17:38 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x901, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 13:17:38 executing program 0: add_key(&(0x7f0000000540)='asymmetric\x00', &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0)='W', 0x1, 0xfffffffffffffff8) 13:17:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)={0x14, 0x6, 0x1, 0x201}, 0x14}}, 0x0) 13:17:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) 13:17:38 executing program 2: mq_notify(0xffffffffffffffff, &(0x7f0000001840)={0x7fffffffefff, 0x0, 0x2, @thr={0x0, 0x0}}) 13:17:38 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x1}, 0x8, 0x0) msgrcv(r0, 0x0, 0x0, 0x3, 0x1800) 13:17:38 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) 13:17:38 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x6, 0x4) sendmsg$AUDIT_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x38}, 0x38}}, 0x0) 13:17:38 executing program 2: r0 = socket(0x2, 0x3, 0x3) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r0, &(0x7f0000003300)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001e80)=[{{&(0x7f0000000180)=@alg, 0x80, &(0x7f00000015c0)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 13:17:38 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x1000, 0x0) 13:17:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004f40)={0xffffffffffffffff}) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) 13:17:38 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240)='/dev/bsg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004f40)={0xffffffffffffffff}) dup2(r1, r0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000002400)={0x0, 0x0, &(0x7f00000023c0)={&(0x7f0000002300)={0x4c}, 0x4c}}, 0x0) 13:17:38 executing program 2: r0 = request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r1) 13:17:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf) 13:17:38 executing program 3: socket(0xa, 0x0, 0x8000) 13:17:38 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x10002, 0x0) 13:17:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) select(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, &(0x7f0000000240)={0x9}, &(0x7f0000000280)={0x0, 0xea60}) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x3}, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r1) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, @generic={0x2, "3e633cbb610bbb4328130326336c"}, @vsock={0x28, 0x0, 0x0, @hyper}, @sco, 0xfff7, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000180)='veth1_to_bond\x00', 0x2, 0xf7, 0xed8}) keyctl$search(0xa, r2, &(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x3}, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, r2) r3 = getpgid(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000200)='ns/time\x00') 13:17:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x14}, 0x3c}}, 0x0) 13:17:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f0000000780)={&(0x7f00000006c0), 0xc, &(0x7f0000000740)={0x0}}, 0x0) 13:17:38 executing program 0: r0 = socket(0x2, 0x3, 0x3) sendmmsg$sock(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20040841) 13:17:38 executing program 3: r0 = socket(0x2, 0x3, 0x3) sendmmsg$sock(r0, &(0x7f0000003300)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @remote}, 0x80, 0x0}}, {{&(0x7f0000000080)=@ethernet, 0x58, 0x0, 0x0, &(0x7f0000000100)=[@timestamping={{0x14}}, @txtime={{0x1d}}, @txtime={{0x18}}, @timestamping={{0x14}}], 0x60}}], 0x2, 0x0) 13:17:38 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/sockstat6\x00') 13:17:38 executing program 1: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x58, 0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2, "b2b0fb2c799c7aa1372ae3db9b06389dcad4a68078f8db818c8589db2291eac0976c4b0aaa25308b42fbaddedd34b28bef7271c8b65ad459bf588dbc387e4ab7e8c720293d5466f28e3cd176b6ae1c5f90"}, 0x59, 0x0) 13:17:38 executing program 2: setresgid(0xee00, 0xffffffffffffffff, 0xee01) 13:17:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004f40)={0xffffffffffffffff}) getsockname$packet(r0, 0x0, &(0x7f0000006640)) 13:17:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000140)={'veth0_to_batadv\x00', @ifru_addrs=@ethernet={0x0, @multicast}}) 13:17:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) setxattr(&(0x7f0000000440)='./file0\x00', &(0x7f00000000c0)=@known='system.sockprotoname\x00', 0x0, 0x0, 0x0) 13:17:38 executing program 1: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x58, 0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2, "b2b0fb2c799c7aa1372ae3db9b06389dcad4a68078f8db818c8589db2291eac0976c4b0aaa25308b42fbaddedd34b28bef7271c8b65ad459bf588dbc387e4ab7e8c720293d5466f28e3cd176b6ae1c5f90"}, 0x59, 0x0) 13:17:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f0000000780)={&(0x7f00000006c0), 0xc, &(0x7f0000000740)={0x0}}, 0x1) 13:17:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000008880)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1, 0x0) 13:17:38 executing program 3: r0 = socket(0x2, 0x3, 0x3) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000140)) 13:17:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004f40)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) unlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200) 13:17:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000140)={'veth0_to_batadv\x00', @ifru_addrs=@ethernet={0x0, @multicast}}) 13:17:38 executing program 1: fanotify_mark(0xffffffffffffffff, 0x0, 0x57b3dc3b4d8021d9, 0xffffffffffffffff, 0x0) 13:17:38 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1084000, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id'}}) 13:17:38 executing program 0: request_key(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) 13:17:38 executing program 2: r0 = socket(0xa, 0x3, 0x3) getpeername(r0, 0x0, 0x0) 13:17:38 executing program 3: sendmsg$NL80211_CMD_SET_WOWLAN(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004f40)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) dup2(r0, r1) 13:17:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, 0x0) keyctl$search(0xa, r0, &(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0) 13:17:38 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x6, 0x70, 0x0, 0x0, 0x0, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:17:38 executing program 2: r0 = socket(0x10, 0x3, 0x0) bind$packet(r0, 0x0, 0x0) 13:17:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x48, 0x0, 0x1, 0x201, 0x0, 0x0, {0x2}, [@CTA_LABELS={0x4}, @CTA_TUPLE_ORIG={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @ipv4={[], [], @dev}}}}]}]}, 0x48}}, 0x0) 13:17:38 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 13:17:38 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) select(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x9}, &(0x7f0000000280)={0x0, 0xea60}) 13:17:38 executing program 1: getitimer(0xe888836121516a51, &(0x7f0000000000)) 13:17:38 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/autofs\x00', 0x1, 0x0) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000001500)={'veth1_virt_wifi'}, 0x12) 13:17:38 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x40800, 0x0) read$FUSE(r0, 0x0, 0x0) 13:17:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r0) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000080)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) 13:17:38 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001340)) select(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x9}, &(0x7f0000000280)={0x0, 0xea60}) 13:17:39 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/key-users\x00', 0x0, 0x0) 13:17:39 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') 13:17:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@bridge_newneigh={0x30, 0x1c, 0x1, 0x0, 0x0, {0x1c}, [@NDA_DST_MAC={0xa, 0x1, @link_local}, @NDA_SRC_VNI={0x8}]}, 0x30}}, 0x0) 13:17:39 executing program 0: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x58, 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 13:17:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) select(0x40, &(0x7f00000001c0)={0x3, 0x0, 0x9, 0x0, 0x8000000000003ff, 0x2, 0xfffffffffffffff8, 0xfffffffffffffffd}, 0x0, &(0x7f0000000240)={0x6, 0x3ff, 0x0, 0x7, 0x3, 0xeb5, 0xf8}, &(0x7f0000000280)={0x0, 0xea60}) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x3}, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r1) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, @generic={0x2, "3e633cbb610bbb4328130326336c"}, @vsock={0x28, 0x0, 0x0, @hyper}, @sco, 0x4, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000180)='veth1_to_bond\x00', 0x2, 0x7fff, 0xed8}) keyctl$search(0xa, r2, &(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x3}, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, r2) r3 = getpgid(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000200)='ns/time\x00') 13:17:39 executing program 1: r0 = socket(0x2, 0x3, 0x3) recvmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000001, 0x0) 13:17:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 13:17:39 executing program 1: request_key(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0xffffffffffffffff) 13:17:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 13:17:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@raw={'raw\x00', 0x9, 0x3, 0x240, 0x0, 0x0, 0xb0, 0x0, 0xb0, 0x1a8, 0x1a8, 0x1a8, 0x1a8, 0x1a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0xa0, 0x110, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "83d3c6270bdf26ca2f96536bc2e40697482f29dd6fa05cd0bdcfdde72a55c3c8bca70dae763e01370171a0fd5ff281216297c717f200"}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="500000000104010300000002430000000000000008000340000000000600064062ffffff0500010001"], 0x50}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 13:17:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004f40)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) getsockname$packet(r0, 0x0, &(0x7f0000006640)) [ 179.984590][T11401] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:17:39 executing program 1: timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/179) 13:17:39 executing program 0: timer_create(0x0, 0x0, &(0x7f00000001c0)) [ 180.042293][T11408] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:17:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004f40)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) getsockname$packet(r0, 0x0, &(0x7f0000006640)) 13:17:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@raw={'raw\x00', 0x9, 0x3, 0x240, 0x0, 0x0, 0xb0, 0x0, 0xb0, 0x1a8, 0x1a8, 0x1a8, 0x1a8, 0x1a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0xa0, 0x110, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "83d3c6270bdf26ca2f96536bc2e40697482f29dd6fa05cd0bdcfdde72a55c3c8bca70dae763e01370171a0fd5ff281216297c717f200"}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="500000000104010300000002430000000000000008000340000000000600064062ffffff0500010001"], 0x50}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 13:17:39 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8993, &(0x7f00000000c0)={'vlan1\x00', @ifru_names}) 13:17:39 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000180)={&(0x7f0000000280), 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0xfffffffd, 0x464, 0x0, 0x0, 0x0, "e92aa9158f5d0e94c1cdc5ad95332770f51f21c073b0d54c09c29c50631124a7e1ec9fc15620e0ea8a819b89fe2572e63be7f395413b0aee8d17d384e4212c3c0a7e574c0b7ffee685a552e37d535bde88a81bd3960181299006a2bfd1300a4560b7317a8186ec46dc938335e1ddab15e85b1e7604563bd485cc0d0ab70ca0b5b6603ac4a8e5ecccdabc090a175b3e6b553d3018998c31427b786a1d3ef772aec5f9a64ab43dd86c944a98743589ca32034553f6e8c2d15e711603c3c414654b186e7c33dd6a6e6424d79c992e3c3856b2523298fcfbb1198c63c55fad55b3203773", ["", "", "", "", "", "", "", "", "", ""]}, 0xf4}}, 0x0) 13:17:39 executing program 3: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101000, 0x0) r0 = request_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='*}[\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='\x00', r0) [ 180.646575][T11419] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:17:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000700)) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)=0x6) 13:17:39 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/fib_trie\x00') preadv(r2, &(0x7f0000001180)=[{&(0x7f0000000000)=""/235, 0xeb}], 0x1, 0x0, 0x0) 13:17:39 executing program 2: set_mempolicy(0x1, 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x9, 0x2) 13:17:39 executing program 3: timer_create(0x2, 0x0, &(0x7f0000000600)) timer_settime(0x0, 0x0, &(0x7f0000000640)={{0x77359400}}, 0x0) 13:17:39 executing program 0: 13:17:39 executing program 2: 13:17:39 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000700)) 13:17:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000003fc0)={0x0, 0x0, &(0x7f0000003f80)={&(0x7f0000003f40)={0x14, 0x7, 0xa, 0x201}, 0x14}}, 0x0) 13:17:40 executing program 1: 13:17:40 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x1810c0, 0x0) 13:17:40 executing program 0: 13:17:40 executing program 0: 13:17:40 executing program 2: 13:17:40 executing program 1: 13:17:40 executing program 3: 13:17:40 executing program 2: 13:17:40 executing program 1: 13:17:40 executing program 0: 13:17:40 executing program 3: 13:17:40 executing program 2: 13:17:40 executing program 3: 13:17:40 executing program 2: 13:17:40 executing program 0: 13:17:40 executing program 1: 13:17:40 executing program 2: 13:17:40 executing program 0: 13:17:40 executing program 3: 13:17:40 executing program 1: 13:17:40 executing program 2: 13:17:40 executing program 1: 13:17:40 executing program 2: 13:17:40 executing program 0: 13:17:40 executing program 3: 13:17:40 executing program 0: 13:17:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='environ\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 13:17:40 executing program 1: 13:17:40 executing program 1: 13:17:40 executing program 3: 13:17:40 executing program 0: 13:17:40 executing program 2: 13:17:40 executing program 1: 13:17:40 executing program 1: 13:17:40 executing program 0: 13:17:40 executing program 3: 13:17:40 executing program 2: 13:17:40 executing program 1: 13:17:40 executing program 3: 13:17:40 executing program 0: 13:17:40 executing program 2: 13:17:40 executing program 1: 13:17:40 executing program 0: 13:17:40 executing program 2: 13:17:40 executing program 1: 13:17:40 executing program 3: 13:17:40 executing program 0: 13:17:40 executing program 1: 13:17:40 executing program 2: 13:17:40 executing program 3: 13:17:40 executing program 1: 13:17:40 executing program 0: 13:17:40 executing program 1: 13:17:40 executing program 2: 13:17:40 executing program 3: 13:17:40 executing program 0: 13:17:40 executing program 1: 13:17:40 executing program 3: 13:17:40 executing program 2: 13:17:40 executing program 0: 13:17:40 executing program 0: 13:17:40 executing program 2: 13:17:40 executing program 1: 13:17:40 executing program 1: 13:17:40 executing program 3: 13:17:41 executing program 2: 13:17:41 executing program 0: 13:17:41 executing program 1: 13:17:41 executing program 1: 13:17:41 executing program 2: 13:17:41 executing program 0: 13:17:41 executing program 3: 13:17:41 executing program 1: 13:17:41 executing program 2: 13:17:41 executing program 3: 13:17:41 executing program 0: 13:17:41 executing program 3: 13:17:41 executing program 1: 13:17:41 executing program 2: 13:17:41 executing program 0: 13:17:41 executing program 1: 13:17:41 executing program 3: 13:17:41 executing program 2: 13:17:41 executing program 2: 13:17:41 executing program 0: 13:17:41 executing program 3: 13:17:41 executing program 1: 13:17:41 executing program 0: 13:17:41 executing program 2: 13:17:41 executing program 2: 13:17:41 executing program 3: 13:17:41 executing program 1: 13:17:41 executing program 0: 13:17:41 executing program 2: 13:17:41 executing program 1: 13:17:41 executing program 0: 13:17:41 executing program 1: 13:17:41 executing program 2: 13:17:41 executing program 3: 13:17:41 executing program 2: 13:17:41 executing program 0: 13:17:41 executing program 1: 13:17:41 executing program 2: 13:17:41 executing program 3: 13:17:41 executing program 1: 13:17:41 executing program 0: 13:17:41 executing program 2: 13:17:41 executing program 1: 13:17:41 executing program 3: 13:17:41 executing program 0: 13:17:41 executing program 2: 13:17:41 executing program 0: 13:17:41 executing program 1: 13:17:41 executing program 0: 13:17:41 executing program 2: 13:17:41 executing program 3: 13:17:41 executing program 2: 13:17:41 executing program 0: 13:17:41 executing program 1: 13:17:41 executing program 2: 13:17:41 executing program 3: 13:17:41 executing program 0: 13:17:41 executing program 1: 13:17:41 executing program 3: 13:17:41 executing program 2: 13:17:41 executing program 0: 13:17:41 executing program 3: 13:17:41 executing program 1: 13:17:41 executing program 2: 13:17:41 executing program 0: 13:17:41 executing program 1: 13:17:41 executing program 2: 13:17:41 executing program 3: 13:17:41 executing program 1: 13:17:41 executing program 0: 13:17:41 executing program 2: 13:17:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000000}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x10, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 2: set_mempolicy(0x4, 0x0, 0x0) getitimer(0x0, &(0x7f0000000000)) 13:17:42 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x89a1, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc}) 13:17:42 executing program 1: 13:17:42 executing program 0: 13:17:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x3}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xf4240, &(0x7f0000000080)=@framed={{}, [@btf_id]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xd2, &(0x7f0000000140)=""/210, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x1) write$evdev(r0, &(0x7f0000000040)=[{}], 0x18) 13:17:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x6}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x14, r1, 0xc19}, 0x14}}, 0x0) 13:17:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x27}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x14, r1, 0xc19}, 0x14}}, 0x0) 13:17:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x8981, 0x0) 13:17:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x54}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x541b, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc}) 13:17:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x18}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000ffffffff7d12080000000000c3"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xae, &(0x7f0000000100)=""/174, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 13:17:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x1) write$evdev(r0, &(0x7f0000000040)=[{{}, 0x0, 0x7ff}], 0x18) 13:17:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x4}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000600000000000000060000008500000025000000850000006700000095"], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x8f, &(0x7f0000000300)=""/143, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x8983, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc}) 13:17:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x7}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x8953, 0x0) 13:17:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x4, 0x0, 0x3, 0xa}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x6, 0xa}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x7}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 1: mount$9p_fd(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0) 13:17:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x4, 0x0, 0x4, 0x0, 0x2}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x2, [@typedef, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {0x1}, {0x10000}, {}]}, @func, @fwd, @array]}}, 0x0, 0xaa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 13:17:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 183.608582][T11807] __report_access: 3 callbacks suppressed 13:17:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x1, &(0x7f0000000000)=@raw=[@exit={0x95, 0x2}], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x22) [ 183.608658][T11807] ptrace attach of "/syz-executor.2"[11804] was attempted by "/syz-executor.2"[11807] 13:17:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="873d50b4dce5288f95"], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x2, [@typedef, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {0x1}, {0x10000}, {}]}, @func, @fwd, @array]}}, 0x0, 0xaa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 13:17:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x6, &(0x7f0000000000)=@framed={{}, [@exit, @jmp, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 183.692811][T11817] ptrace attach of "/syz-executor.2"[11815] was attempted by "/syz-executor.2"[11817] 13:17:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x24}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, &(0x7f0000000140)=@framed={{}, [@func]}, &(0x7f0000000040)='GPL\x00', 0x4, 0xad, &(0x7f00000001c0)=""/173, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x118}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x6, 0xa}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x4, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 183.741019][T11824] syz-executor.0[11824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 13:17:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000000040)=@framed={{}, [@call]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x89a0, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc}) 13:17:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001e80)={0xd}, 0x40) 13:17:43 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x2c00) 13:17:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x9, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x4, 0x3, 0x0, 0x0, 0x0, 0x2}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x8953, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc}) 13:17:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0xc, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xa0001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:17:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x12}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x5, &(0x7f0000000080)=@framed={{}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x2) write$FUSE_STATFS(r0, &(0x7f0000000300)={0x60}, 0x60) write$FUSE_LSEEK(r0, &(0x7f0000000080)={0x18}, 0x18) 13:17:43 executing program 3: mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0xb63a15ae38f765fd, 0xffffffffffffffff, 0x10000000) 13:17:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x6, 0x3}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x12, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000003840)={'ip6tnl0\x00', &(0x7f00000037c0)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @empty}}) 13:17:43 executing program 3: pipe2(&(0x7f0000001400)={0xffffffffffffffff}, 0x84800) read$FUSE(r0, &(0x7f0000001500)={0x2020}, 0x2020) 13:17:43 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f0000006180)='/dev/cuse\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x9}, 0x0, 0x0, 0x0, 0x0) 13:17:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000300)=@framed={{}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f0000006180)='/dev/cuse\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x9}, 0x0, 0x0, 0x0, 0x0) 13:17:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00000011000f02000000000000400002"], 0x1c}}, 0x0) 13:17:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:17:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x60}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x19}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x0, 0xa}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, &(0x7f00000041c0)={0x20, 0x0, r1}, 0x20) 13:17:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="a8000000", @ANYRES16=r1, @ANYBLOB="01002abd7000ffdbdf251b0000000800010070636902"], 0xa8}}, 0x0) 13:17:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x2}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 0: openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) 13:17:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x89a1, 0x0) 13:17:43 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x1) write$evdev(r0, &(0x7f0000000040)=[{{}, 0x11}], 0x18) 13:17:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f000000000000040008", 0x1d, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 13:17:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x2}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x1, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 183.742028][T11824] syz-executor.0[11824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 13:17:43 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x1a}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 184.448052][T11941] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 13:17:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x6, 0xa}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x3f000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x4, 0x0, 0x6, 0xa, 0x0, 0x0, 0x500}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 184.533396][T11941] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 13:17:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x83}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f000000000000040008", 0x1d, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 13:17:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000001ae50f"], 0x1c}}, 0x0) 13:17:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_getroute={0x1c, 0x1a, 0x20f, 0x0, 0x0, {0x3}}, 0x1c}}, 0x0) 13:17:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x61}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002000, 0x0) 13:17:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_getroute={0x1c, 0x1a, 0x20f, 0x0, 0x0, {0x3}}, 0x1c}}, 0x0) [ 184.787602][T11976] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 13:17:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x2}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x15}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 184.825827][T11976] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 13:17:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f000000000000040008", 0x1d, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 13:17:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@call]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f0000000000)=@raw=[@ldst={0x5}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbd, 0xbd, 0x2, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x1, 0x0, 0xf, 0x3, [{}], "d8db9d"}, @datasec={0x0, 0x6, 0x0, 0xf, 0x2, [{}, {}, {}, {}, {}, {}], "38c5"}, @func, @fwd]}}, 0x0, 0xda}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 13:17:44 executing program 2: mount$9p_fd(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000080)='9p\x00', 0x0, 0x0) 13:17:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x4, 0x2, 0x4, 0xa}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 185.001466][T12010] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 13:17:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000000)={'bridge_slave_1\x00', @ifru_flags}) [ 185.019838][T12010] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 13:17:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="cb"], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f000000000000040008", 0x1d, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 13:17:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000000)={'bridge_slave_1\x00', @ifru_flags}) 13:17:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @exit], &(0x7f0000000100)='GPL\x00', 0x2, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 185.189226][T12032] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 185.213666][T12032] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 13:17:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="a8000000", @ANYRES16=r1, @ANYBLOB="01002abd7000ffdbdf251b000000080001007063690011000200303030303a30303a010000800000000008000b00080000000e0001006e657464657673696d0000000f0002006e657464657673696d30"], 0xa8}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={0x0}}, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 13:17:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f000000000000040008", 0x1d, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:47 executing program 1: r0 = fsopen(&(0x7f0000000140)='autofs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) [ 188.015269][T12043] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.3'. 13:17:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 188.030160][T12047] autofs4:pid:12047:autofs_fill_super: called with bogus options [ 188.033224][T12040] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 188.061536][T12051] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.3'. [ 188.069192][T12040] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 13:17:47 executing program 1: mount$9p_fd(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) [ 188.104888][T12055] 9pnet: Insufficient options for proto=fd 13:17:47 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x6, 0x0, 0x6, 0xa}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 188.113792][T12055] 9pnet: Insufficient options for proto=fd 13:17:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x9, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0xa, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0xa1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:17:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x57}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f000000000000040008", 0x1d, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x9, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:47 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x3}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x8915, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc}) 13:17:47 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x7, 0x0, 0x4}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$sock(r0, &(0x7f00000000c0)={&(0x7f0000000180)=@phonet={0x23, 0x0, 0x0, 0x8}, 0x80, 0x0}, 0x0) 13:17:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x8915, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc}) 13:17:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f000000000000040008", 0x1d, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:47 executing program 3: r0 = epoll_create(0x401) fgetxattr(r0, &(0x7f0000002300)=@known='security.apparmor\x00', 0x0, 0x0) 13:17:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="a8000000", @ANYRES16=r1, @ANYBLOB="01002abd7000ffdbdf251b000000080007"], 0xa8}}, 0x0) 13:17:47 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x6, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 188.613384][T12102] netlink: 140 bytes leftover after parsing attributes in process `syz-executor.1'. 13:17:47 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 188.641957][T12109] netlink: 140 bytes leftover after parsing attributes in process `syz-executor.1'. 13:17:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_getroute={0x10, 0x1a, 0x20f}, 0x1c}}, 0x0) 13:17:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x3, 0x3, 0x6}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f000000000000040008", 0x1d, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000000040)=@framed={{}, [@call]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:47 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 13:17:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}}, &(0x7f0000000100)='syzkaller\x00', 0x7, 0xd2, &(0x7f0000000140)=""/210, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000300)=@framed={{}, [@alu={0x7}]}, &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000006180)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000004140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0x0, r2}, 0x18) 13:17:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f000000000000040008", 0x1d, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x8903, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc}) 13:17:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x56}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x4, 0x3}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') socket$nl_generic(0x10, 0x3, 0x10) 13:17:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000001a000f0200000000000000fcff"], 0x1c}}, 0x0) 13:17:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6d}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f000000000000040008", 0x1d, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="0f0000ca8a00000095"], &(0x7f0000000100)='syzkaller\x00', 0x1, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:17:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4f}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f000000000000040008", 0x1d, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0xc}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp, @can, @nfc={0x27, 0x3}}) 13:17:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x59}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x32}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x1c}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:17:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x5}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[]) 13:17:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="6100000000000000070000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x6, 0xa, 0x0, 0x0, 0x4800}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[]) 13:17:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x3}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0x46, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4ea9, 0x0, @local}, 0x1c) 13:17:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[]) 13:17:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x14}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x4, &(0x7f0000000040)=@framed={{}, [@call]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0x46, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4ea9, 0x0, @local}, 0x1c) [ 189.635504][T12228] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 13:17:48 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x1) write$evdev(r0, 0x0, 0x0) [ 189.665947][T12228] EXT4-fs (loop0): bad geometry: block count 64 exceeds size of device (36 blocks) 13:17:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc={0x2}}) 13:17:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x7}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:48 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f63838bf9664c3fdc8ee5d605ff01000066085e4f26016c34b5d4216f8fbdbc8e753912845b4eab4b0700000000000000bd0979809702beb62641eb024b49d9dbfbff010000a8da91", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 13:17:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x6, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1a}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 189.831800][T12255] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 13:17:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x4, 0x3, 0x5}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 189.849925][T12255] EXT4-fs (loop0): bad geometry: block count 64 exceeds size of device (36 blocks) 13:17:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xd}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:49 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000006180)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0xf}, 0x18) 13:17:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x0, 0x2}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:49 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f63838bf9664c3fdc8ee5d605ff01000066085e4f26016c34b5d4216f8fbdbc8e753912845b4eab4b0700000000000000bd0979809702", 0x37}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 190.008675][T12277] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 13:17:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x8904, 0x0) [ 190.047236][T12277] EXT4-fs (loop0): bad geometry: block count 64 exceeds size of device (36 blocks) [ 190.059792][T12286] ptrace attach of "/syz-executor.3"[12285] was attempted by "/syz-executor.3"[12286] 13:17:49 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000140)=@framed={{}, [@exit]}, &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000040)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0xc0189436, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc}) 13:17:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {0x0, 0x0, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x4, 0x0, 0x0, 0xb}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_getroute={0x1c, 0x6b, 0x20f}, 0x1c}}, 0x0) 13:17:49 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000300)=@framed={{}, [@alu={0x7, 0x0, 0xb, 0x0, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 190.210119][T12303] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 13:17:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x8901, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc}) 13:17:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x4, &(0x7f0000000080)=@framed={{}, [@func]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 190.234227][T12303] EXT4-fs error (device loop0): ext4_fill_super:4969: inode #2: comm syz-executor.0: iget: root inode unallocated [ 190.259924][T12303] EXT4-fs (loop0): get root inode failed [ 190.268497][T12303] EXT4-fs (loop0): mount failed 13:17:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x4, 0x0, 0x6, 0xa}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {0x0, 0x0, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:49 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x2, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc}) 13:17:49 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000006180)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) pselect6(0x40, &(0x7f0000000040)={0x9}, 0x0, 0x0, 0x0, 0x0) 13:17:49 executing program 2: epoll_create1(0x1dc187d558a3eb5e) 13:17:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x4, &(0x7f0000000080)=@framed={{}, [@func]}, &(0x7f0000000100)='syzkaller\x00', 0x7, 0xd2, &(0x7f0000000140)=""/210, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 190.399679][T12331] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 13:17:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x7, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:49 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 190.434200][T12331] EXT4-fs error (device loop0): ext4_fill_super:4969: inode #2: comm syz-executor.0: iget: root inode unallocated 13:17:49 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r0, &(0x7f00000041c0)={0x20, 0x0, r1}, 0x20) [ 190.485519][T12331] EXT4-fs (loop0): get root inode failed [ 190.498501][T12331] EXT4-fs (loop0): mount failed 13:17:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {0x0, 0x0, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:49 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x10, 0x0) 13:17:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000300)=@framed={{}, [@alu={0x7, 0x0, 0xb}]}, &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@call]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername$netlink(r0, 0x0, &(0x7f0000000580)) 13:17:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x3, 0x0, 0x6}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 190.664353][T12361] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 13:17:49 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x19, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 190.729325][T12361] EXT4-fs error (device loop0): ext4_fill_super:4969: inode #2: comm syz-executor.0: iget: root inode unallocated [ 190.758643][T12361] EXT4-fs (loop0): get root inode failed [ 190.778974][T12361] EXT4-fs (loop0): mount failed 13:17:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00), 0x0, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:50 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') 13:17:50 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000038c0)={@private0, @ipv4={[], [], @dev}, @local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45000000}) 13:17:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x1, &(0x7f0000000000)=@raw=[@ldst], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000080)=@framed={{0x9}}, &(0x7f0000000100)='syzkaller\x00', 0x7, 0xd2, &(0x7f0000000140)=""/210, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x8}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:50 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000000)='\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c) 13:17:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x7, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 190.940458][T12392] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 190.986791][T12392] EXT4-fs error (device loop0): ext4_fill_super:4969: inode #2: comm syz-executor.0: iget: root inode unallocated [ 191.013299][T12392] EXT4-fs (loop0): get root inode failed [ 191.032985][T12392] EXT4-fs (loop0): mount failed 13:17:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x26}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00), 0x0, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x8}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x4020940d, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc}) 13:17:50 executing program 1: r0 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) 13:17:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000140)='\x01^\x94t\xff\xba\xce\xd7\xd0B\x18G[\xd6\xc5', 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) [ 191.186652][T12415] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 191.212676][T12415] EXT4-fs error (device loop0): ext4_fill_super:4969: inode #2: comm syz-executor.0: iget: root inode unallocated 13:17:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 191.230506][T12415] EXT4-fs (loop0): get root inode failed [ 191.238429][T12415] EXT4-fs (loop0): mount failed 13:17:50 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x5421, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc}) 13:17:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x5}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00), 0x0, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x80108906, 0x0) 13:17:50 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0, 0xfffffeef}, {&(0x7f0000000100)="1f63838bf9664c3fdc8ee5d605ff01000066085e4f26016c34b5d4216f8fbdbc8e753912845b4eab4b0700000000000000bd0979809702beb62641eb024b49d9dbfbff010000a8da91220f71066c2ec4dfed01f2e6a325b8b4a3c39c90e7fe129a342351c98f00007540bf070da4b073201d2c015a9a0fe9fe0c231ebfbe0c041173fab667ec6c9027fe3e4e66cc7f7ae712d8d1bc57251e06e13e695df540eaf454ae242f034c6b7768", 0xaa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 13:17:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd100}}, &(0x7f0000000100)='syzkaller\x00', 0x7, 0xd2, &(0x7f0000000140)=""/210, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) [ 191.411647][T12444] ptrace attach of "/syz-executor.3"[12443] was attempted by "/syz-executor.3"[12444] 13:17:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x7}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 191.415785][T12447] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 13:17:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) 13:17:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4a}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 191.476187][T12447] EXT4-fs error (device loop0): ext4_fill_super:4969: inode #2: comm syz-executor.0: iget: root inode unallocated [ 191.510132][T12447] EXT4-fs (loop0): get root inode failed [ 191.516498][T12447] EXT4-fs (loop0): mount failed 13:17:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc464", 0xf, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x4, 0x3, 0x0, 0x0, 0xa}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) 13:17:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000080)=@framed={{}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x700}]}, &(0x7f0000000100)='syzkaller\x00', 0x7, 0xd2, &(0x7f0000000140)=""/210, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x8906, 0x0) [ 191.631586][T12474] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 13:17:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x4, 0x3, 0x6}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) 13:17:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x1b}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 191.688715][T12474] EXT4-fs error (device loop0): ext4_fill_super:4969: inode #2: comm syz-executor.0: iget: root inode unallocated [ 191.726148][T12474] EXT4-fs (loop0): get root inode failed [ 191.738371][T12474] EXT4-fs (loop0): mount failed 13:17:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc464", 0xf, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) 13:17:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x4, 0x0, 0x4}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:51 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f00000040c0)={0x2020}, 0x2020) [ 191.904100][T12502] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 13:17:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x8916, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc}) 13:17:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2e}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 191.945049][T12502] EXT4-fs error (device loop0): ext4_fill_super:4969: inode #2: comm syz-executor.0: iget: root inode unallocated [ 191.982091][T12502] EXT4-fs (loop0): get root inode failed [ 191.993259][T12502] EXT4-fs (loop0): mount failed 13:17:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc464", 0xf, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:51 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f00000040c0)={0x2020}, 0x2020) 13:17:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x3, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x1, &(0x7f0000000080)=@raw=[@ldst={0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:51 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f00000040c0)={0x2020}, 0x2020) [ 192.113679][T12530] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 192.140201][T12530] EXT4-fs error (device loop0): ext4_fill_super:4969: inode #2: comm syz-executor.0: iget: root inode unallocated 13:17:51 executing program 2: r0 = syz_open_procfs(0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) [ 192.170220][T12530] EXT4-fs (loop0): get root inode failed [ 192.187953][T12530] EXT4-fs (loop0): mount failed 13:17:51 executing program 2: r0 = syz_open_procfs(0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) 13:17:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f0000", 0x16, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x1, &(0x7f0000000080)=@raw=[@ldst={0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:51 executing program 2: r0 = syz_open_procfs(0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) 13:17:51 executing program 2: syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') read$FUSE(0xffffffffffffffff, &(0x7f00000040c0)={0x2020}, 0x2020) 13:17:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x0, 0x6, 0x0, 0xa}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x48], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 192.370280][T12555] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 13:17:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x8980, 0x0) [ 192.424447][T12555] EXT4-fs error (device loop0): ext4_fill_super:4969: inode #2: comm syz-executor.0: iget: root inode unallocated [ 192.452478][T12555] EXT4-fs (loop0): get root inode failed [ 192.466469][T12555] EXT4-fs (loop0): mount failed 13:17:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f0000", 0x16, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:51 executing program 2: syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') read$FUSE(0xffffffffffffffff, &(0x7f00000040c0)={0x2020}, 0x2020) 13:17:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x21}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x1, &(0x7f0000000000)=@raw=[@exit={0x95, 0x0, 0x0, 0xa}], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x8914, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc}) 13:17:51 executing program 2: syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') read$FUSE(0xffffffffffffffff, &(0x7f00000040c0)={0x2020}, 0x2020) 13:17:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0xa}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 192.626924][T12581] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 13:17:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') read$FUSE(r0, 0x0, 0x0) [ 192.647486][T12581] EXT4-fs error (device loop0): ext4_fill_super:4969: inode #2: comm syz-executor.0: iget: root inode unallocated [ 192.700872][T12581] EXT4-fs (loop0): get root inode failed [ 192.727601][T12581] EXT4-fs (loop0): mount failed 13:17:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f0000", 0x16, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:52 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') read$FUSE(r0, 0x0, 0x0) 13:17:52 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x40049409, &(0x7f0000000040)={0x0, @l2tp, @generic={0x0, "6d1cdd528753cb155c9d8d8519a9"}, @nfc}) 13:17:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') read$FUSE(r0, 0x0, 0x0) [ 192.856219][T12609] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 13:17:52 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x5, 0x3}, @exit], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x81, &(0x7f0000000140)=""/129, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:17:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="a8000000", @ANYRES16=r1, @ANYBLOB="01002abd7000ffdbdf251b000000080001007063690011000200303030303a30303a01000080000000002a000b"], 0xa8}}, 0x0) [ 192.918793][T12609] EXT4-fs error (device loop0): ext4_fill_super:4969: inode #2: comm syz-executor.0: iget: root inode unallocated 13:17:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) [ 192.998984][T12609] EXT4-fs (loop0): get root inode failed [ 193.024241][T12619] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 193.025353][T12609] EXT4-fs (loop0): mount failed [ 193.044418][T12619] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.1'. [ 193.080583][T12627] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 193.096891][T12627] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.1'. 13:17:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0200000012000000220000002d000f", 0xf, 0x1000}, {&(0x7f0000011d00)="ffff", 0x2, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f000000000000", 0x1a, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 13:17:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000014c0)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012f00)) 13:17:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) 13:17:52 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) 13:17:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x30, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'veth0_to_bond\x00', 0x0}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0x0, 0x8, 0x3, 0x3, 0x0, 0x4, 0x7, 0x14, 0x2, 0xb, 0x3, 0x14, 0x8]}, 0x0, 0xb, 0x0, 0x0, 0x0, 0x20c200a2, r5}) fstat(r4, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000500)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="c8010000", @ANYRES16=0x0, @ANYBLOB="080228bd7000ffdbdf25010000003800018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="080003000100000008000100", @ANYRES32=r5, @ANYBLOB="1400020073797a5f74756e000000000000feff000c00018008000100", @ANYRES32=0x0, @ANYBLOB="700002802c000180080001000700000008000100020000000800010001000000080001000100000008000100000000002400018008000100010000000800010000000000080001000100000008000100050000001c000180080001000000000008000100080000000800010004000000780002802400018008000100000000000800010007000000080001000500000008000100070000003c000180080001000400000008000100000000000800010004000000080001000700000008000100060000000800010007000000080001000200000014000180080001000000000008000100060000006400028014000180080001000800000008000100040000001c00018008000100010000000800010001000000080001000200000014000180080001000500000008000100010000001c000180080001000400000008000100010000000800010004000000200001801400020073697430000000000000000000000000080003000200000004000300"], 0x1c8}, 0x1, 0x0, 0x0, 0x4000}, 0x4081) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getpeername$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0x0, 0x8, 0x3, 0x3, 0x0, 0x4, 0x7, 0x14, 0x2, 0xb, 0x3, 0x14, 0x8]}, 0x0, 0xb, 0x0, 0x0, 0x0, 0x20c200a2, r9}) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000600)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x68, r10, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x1, 0x101, 0xf0]}, @SEG6_ATTR_DST={0x14, 0x1, @private2={0xfc, 0x2, [], 0x1}}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff800}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x20004010}, 0x48001) [ 193.192898][T12633] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 [ 193.224449][T12639] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 13:17:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x30, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'veth0_to_bond\x00', 0x0}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0x0, 0x8, 0x3, 0x3, 0x0, 0x4, 0x7, 0x14, 0x2, 0xb, 0x3, 0x14, 0x8]}, 0x0, 0xb, 0x0, 0x0, 0x0, 0x20c200a2, r3}) fstat(0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000500)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="c8010000", @ANYRES16=0x0, @ANYBLOB="080228bd7000ffdbdf25010000003800018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="080003000100000008000100", @ANYRES32=r3, @ANYBLOB="1400020073797a5f74756e000000000000feff000c00018008000100", @ANYRES32=0x0, @ANYBLOB="700002802c000180080001000700000008000100020000000800010001000000080001000100000008000100000000002400018008000100010000000800010000000000080001000100000008000100050000001c000180080001000000000008000100080000000800010004000000780002802400018008000100000000000800010007000000080001000500000008000100070000003c000180080001000400000008000100000000000800010004000000080001000700000008000100060000000800010007000000080001000200000014000180080001000000000008000100060000006400028014000180080001000800000008000100040000001c00018008000100010000000800010001000000080001000200000014000180080001000500000008000100010000001c000180080001000400000008000100010000000800010004000000200001801400020073697430000000000000000000000000080003000200000004000300"], 0x1c8}, 0x1, 0x0, 0x0, 0x4000}, 0x4081) r4 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0x0, 0x8, 0x3, 0x3, 0x0, 0x4, 0x7, 0x14, 0x2, 0xb, 0x3, 0x14, 0x8]}, 0x0, 0xb, 0x0, 0x0, 0x0, 0x20c200a2, r7}) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000600)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x68, r8, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x1, 0x101, 0xf0]}, @SEG6_ATTR_DST={0x14, 0x1, @private2={0xfc, 0x2, [], 0x1}}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffff800}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1f}]}, 0x68}, 0x1, 0x0, 0x0, 0x20004010}, 0x48001) [ 193.273131][T12639] EXT4-fs error (device loop0): ext4_fill_super:4969: inode #2: comm syz-executor.0: iget: root inode unallocated [ 193.295673][T12633] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 [ 193.297654][T12639] EXT4-fs (loop0): get root inode failed [ 193.338367][T12639] EXT4-fs (loop0): mount failed 13:17:52 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@ipv4={[], [], @local}, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @dev={0xfe, 0x80, [0x8, 0x2, 0x3, 0x3, 0x0, 0x4, 0x7, 0xc, 0x14, 0xb, 0x3, 0x8, 0x6], 0x1d}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) [ 193.739487][ C2] hrtimer: interrupt took 23884 ns [ 249.668255][ C0] ------------[ cut here ]------------ [ 256.319509][ C0] NETDEV WATCHDOG: eth0 (e1000): transmit queue 0 timed out [ 278.209752][ T18] Bluetooth: hci0: command 0x0406 tx timeout [ 278.217011][ T18] Bluetooth: hci1: command 0x0406 tx timeout [ 278.219642][ T9151] Bluetooth: hci3: command 0x0406 tx timeout [ 290.595848][T10144] syz-executor.3: page allocation failure: order:0, mode:0xa20(GFP_ATOMIC), nodemask=(null),cpuset=syz3,mems_allowed=0-1 [ 290.609979][ T23] SLUB: Unable to allocate memory on node -1, gfp=0xa20(GFP_ATOMIC) [ 290.599717][T10144] CPU: 3 PID: 10144 Comm: syz-executor.3 Not tainted 5.10.0-rc3-syzkaller #0 [ 290.599717][T10144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 290.599717][T10144] Call Trace: [ 290.619477][ T23] cache: skbuff_head_cache, object size: 224, buffer size: 320, default order: 1, min order: 0 [ 290.619477][ T23] node 0: slabs: 81, objs: 2025, free: 0 [ 290.599717][T10144] dump_stack+0x107/0x163 [ 290.619477][ T23] node 1: slabs: 1006, objs: 24344, free: 32 [ 290.599717][T10144] warn_alloc.cold+0x87/0x17a [ 290.689946][ C1] SLUB: Unable to allocate memory on node -1, gfp=0xa20(GFP_ATOMIC) [ 290.690021][ C1] cache: skbuff_head_cache, object size: 224, buffer size: 320, default order: 1, min order: 0 [ 290.690029][ C1] node 0: slabs: 81, objs: 2025, free: 0 [ 290.690035][ C1] node 1: slabs: 1006, objs: 24344, free: 32 [ 290.690078][ C1] SLUB: Unable to allocate memory on node -1, gfp=0xa20(GFP_ATOMIC) [ 290.690096][ C1] cache: skbuff_head_cache, object size: 224, buffer size: 320, default order: 1, min order: 0 [ 290.690102][ C1] node 0: slabs: 81, objs: 2025, free: 0 [ 290.690107][ C1] node 1: slabs: 1006, objs: 24344, free: 32 [ 290.690815][ C1] SLUB: Unable to allocate memory on node -1, gfp=0xa20(GFP_ATOMIC) [ 290.690823][ C1] cache: skbuff_head_cache, object size: 224, buffer size: 320, default order: 1, min order: 0 [ 290.690829][ C1] node 0: slabs: 81, objs: 2025, free: 0 [ 290.690834][ C1] node 1: slabs: 1006, objs: 24344, free: 32 [ 290.690877][ C1] SLUB: Unable to allocate memory on node -1, gfp=0xa20(GFP_ATOMIC) [ 290.690884][ C1] cache: skbuff_head_cache, object size: 224, buffer size: 320, default order: 1, min order: 0 [ 290.690890][ C1] node 0: slabs: 81, objs: 2025, free: 0 [ 290.690896][ C1] node 1: slabs: 1006, objs: 24344, free: 32 [ 290.690973][ C1] SLUB: Unable to allocate memory on node -1, gfp=0xa20(GFP_ATOMIC) [ 290.690979][ C1] cache: skbuff_head_cache, object size: 224, buffer size: 320, default order: 1, min order: 0 [ 290.690985][ C1] node 0: slabs: 81, objs: 2025, free: 0 [ 290.690991][ C1] node 1: slabs: 1006, objs: 24344, free: 32 [ 290.693786][ T23] SLUB: Unable to allocate memory on node -1, gfp=0xa20(GFP_ATOMIC) [ 290.599717][T10144] ? zone_watermark_ok_safe+0x2a0/0x2a0 [ 290.703394][ T23] cache: skbuff_head_cache, object size: 224, buffer size: 320, default order: 1, min order: 0 [ 290.703394][ T23] node 0: slabs: 81, objs: 2025, free: 0 [ 290.599717][T10144] ? wakeup_kswapd+0x208/0x640 [ 290.703394][ T23] node 1: slabs: 1006, objs: 24344, free: 32 [ 290.723261][ T23] SLUB: Unable to allocate memory on node -1, gfp=0xa20(GFP_ATOMIC) [ 290.599717][T10144] ? __zone_watermark_ok+0x440/0x440 [ 290.733179][ T23] cache: skbuff_head_cache, object size: 224, buffer size: 320, default order: 1, min order: 0 [ 290.733179][ T23] node 0: slabs: 81, objs: 2025, free: 0 [ 290.599717][T10144] ? wake_all_kswapds+0x143/0x2c0 [ 290.733179][ T23] node 1: slabs: 1006, objs: 24344, free: 32 [ 290.767861][ T23] SLUB: Unable to allocate memory on node -1, gfp=0xa20(GFP_ATOMIC) [ 290.599717][T10144] __alloc_pages_slowpath.constprop.0+0x2026/0x2510 [ 290.791548][ C1] SLUB: Unable to allocate memory on node -1, gfp=0xa20(GFP_ATOMIC) [ 290.791557][ C1] cache: skbuff_head_cache, object size: 224, buffer size: 320, default order: 1, min order: 0 [ 290.791564][ C1] node 0: slabs: 81, objs: 2025, free: 0 [ 290.791570][ C1] node 1: slabs: 1006, objs: 24344, free: 32 [ 290.777757][ T23] cache: skbuff_head_cache, object size: 224, buffer size: 320, default order: 1, min order: 0 [ 290.777757][ T23] node 0: slabs: 81, objs: 2025, free: 0 [ 290.599717][T10144] ? __lock_acquire+0x16a0/0x5590 [ 290.777757][ T23] node 1: slabs: 1006, objs: 24344, free: 32 [ 291.175246][T10144] ? warn_alloc+0x120/0x120 [ 291.182586][T10144] ? __lock_acquire+0x16a0/0x5590 [ 291.185426][T10144] ? __zone_watermark_ok+0x440/0x440 [ 291.195629][T10144] __alloc_pages_nodemask+0x5f0/0x730 [ 291.201960][T10144] ? __alloc_pages_slowpath.constprop.0+0x2510/0x2510 [ 291.209524][T10144] ? __slab_alloc.constprop.0+0x52/0xe0 [ 291.216007][T10144] alloc_pages_current+0x191/0x2a0 [ 291.222568][T10144] allocate_slab+0x2d9/0x4e0 [ 291.229621][T10144] ___slab_alloc+0x476/0x790 [ 291.229621][T10144] ? __sigqueue_alloc+0x236/0x550 [ 291.239576][T10144] ? find_held_lock+0x2d/0x110 [ 291.246670][T10144] ? __sigqueue_alloc+0x236/0x550 [ 291.251028][T10144] ? __slab_alloc.constprop.0+0x52/0xe0 [ 291.259930][T10144] __slab_alloc.constprop.0+0x52/0xe0 [ 291.262714][T10144] ? __sigqueue_alloc+0x236/0x550 [ 291.269619][T10144] kmem_cache_alloc+0x38a/0x460 [ 291.277412][T10144] __sigqueue_alloc+0x236/0x550 [ 291.282596][T10144] __send_signal+0x62d/0xf90 [ 291.287611][T10144] force_sig_info_to_task+0x2a0/0x3a0 [ 291.289647][T10144] force_sig_fault+0xb0/0xf0 [ 291.297788][T10144] ? force_sig_fault_to_task+0xe0/0xe0 [ 291.307962][T10144] ? pgtable_bad+0x90/0x90 [ 291.309612][T10144] ? _down_write_nest_lock+0x150/0x150 [ 291.318158][T10144] __bad_area_nosemaphore+0x2f3/0x400 [ 291.322577][T10144] do_user_addr_fault+0x7d7/0xb40 [ 291.329618][T10144] exc_page_fault+0x9e/0x180 [ 291.329618][T10144] ? asm_exc_page_fault+0x8/0x30 [ 291.339631][T10144] asm_exc_page_fault+0x1e/0x30 [ 291.349527][T10144] RIP: 0023:0x804d63c [ 291.349527][T10144] Code: ff 50 e8 c7 5d 01 00 83 c4 10 85 c0 0f 84 75 01 00 00 8b 5c 24 0c e8 83 03 01 00 65 f0 83 2d e4 ff ff ff 01 8b 54 24 10 8b 00 <83> 7a 50 ff 89 42 54 75 0b 85 c0 75 07 c7 42 54 16 00 00 00 6b 44 [ 291.369912][T10144] RSP: 002b:00000000f55f3100 EFLAGS: 00010282 [ 291.382418][T10144] RAX: 0000000000000003 RBX: 0000000000000000 RCX: 00000000f55f30f0 [ 291.389632][T10144] RDX: 0000000000000000 RSI: 000000000818af60 RDI: 000000000815e000 [ 291.399776][T10144] RBP: 0000000000000006 R08: 0000000000000000 R09: 0000000000000000 [ 291.409660][T10144] R10: 0000000000000000 R11: 0000000000000296 R12: 0000000000000000 [ 291.412418][T10144] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 291.422585][T10144] Mem-Info: [ 291.430323][T10144] active_anon:4722 inactive_anon:98393 isolated_anon:0 [ 291.430323][T10144] active_file:224 inactive_file:40 isolated_file:0 [ 291.430323][T10144] unevictable:0 dirty:41 writeback:2 [ 291.430323][T10144] slab_reclaimable:13007 slab_unreclaimable:149762 [ 291.430323][T10144] mapped:34950 shmem:610 pagetables:1173 bounce:0 [ 291.430323][T10144] free:6816 free_pcp:1741 free_cma:0 [ 291.471050][T10144] Node 0 active_anon:18848kB inactive_anon:213728kB active_file:292kB inactive_file:4kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:644kB dirty:28kB writeback:0kB shmem:1864kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 81920kB writeback_tmp:0kB kernel_stack:8768kB all_unreclaimable? yes [ 291.512498][T10144] Node 1 active_anon:40kB inactive_anon:179844kB active_file:604kB inactive_file:156kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:139156kB dirty:136kB writeback:8kB shmem:576kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 4096kB writeback_tmp:0kB kernel_stack:1600kB all_unreclaimable? yes [ 291.553214][T10144] Node 0 DMA free:2140kB min:732kB low:912kB high:1092kB reserved_highatomic:0KB active_anon:0kB inactive_anon:13052kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 291.589817][T10144] lowmem_reserve[]: 0 468 468 468 468 [ 291.594114][T10144] Node 0 DMA32 free:8180kB min:22196kB low:27744kB high:33292kB reserved_highatomic:2048KB active_anon:18848kB inactive_anon:200676kB active_file:292kB inactive_file:4kB unevictable:0kB writepending:28kB present:1032192kB managed:486284kB mlocked:0kB pagetables:2252kB bounce:0kB free_pcp:1780kB local_pcp:68kB free_cma:0kB [ 291.634968][T10144] lowmem_reserve[]: 0 0 0 0 0 [ 291.642526][T10144] Node 1 DMA32 free:16944kB min:79464kB low:90624kB high:101784kB reserved_highatomic:4096KB active_anon:40kB inactive_anon:179844kB active_file:604kB inactive_file:156kB unevictable:0kB writepending:144kB present:1048436kB managed:965508kB mlocked:0kB pagetables:2440kB bounce:0kB free_pcp:5136kB local_pcp:1424kB free_cma:0kB [ 291.685922][T10144] lowmem_reserve[]: 0 0 0 0 0 [ 291.689553][T10144] Node 0 DMA: 1*4kB (M) 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 2*256kB (UM) 1*512kB (U) 1*1024kB (M) 0*2048kB 0*4096kB = 2140kB [ 291.714247][T10144] Node 0 DMA32: 77*4kB (M) 42*8kB (UME) 31*16kB (MEH) 30*32kB (UME) 13*64kB (UMEH) 21*128kB (UMH) 2*256kB (MH) 2*512kB (M) 1*1024kB (M) 0*2048kB 0*4096kB = 8180kB [ 291.739667][T10144] Node 1 DMA32: 95*4kB (UMH) 82*8kB (MH) 81*16kB (UMEH) 60*32kB (UMEH) 43*64kB (UMH) 24*128kB (M) 11*256kB (UMH) 8*512kB (MH) 0*1024kB 0*2048kB 0*4096kB = 16988kB [ 291.759555][T10144] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 291.769631][T10144] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 291.782540][T10144] 860 total pagecache pages [ 291.789562][T10144] 0 pages in swap cache [ 291.789562][T10144] Swap cache stats: add 0, delete 0, find 0/0 [ 291.802799][T10144] Free swap = 0kB [ 291.809847][T10144] Total swap = 0kB [ 291.809847][T10144] 524155 pages RAM [ 291.819653][T10144] 0 pages HighMem/MovableOnly [ 291.822598][T10144] 157230 pages reserved [ 291.829664][T10144] 0 pages cma reserved [ 293.889893][ C3] ------------[ cut here ]------------ [ 293.898673][ C3] HSR: Could not send supervision frame [ 293.908888][ C3] WARNING: CPU: 3 PID: 0 at net/hsr/hsr_device.c:299 send_hsr_supervision_frame+0x889/0xb40 [ 293.924780][ C3] Modules linked in: [ 293.934084][ C3] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 5.10.0-rc3-syzkaller #0 [ 293.945646][ C3] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 293.965533][ C3] RIP: 0010:send_hsr_supervision_frame+0x889/0xb40 [ 293.976258][ C3] Code: 04 31 ff 89 de e8 97 7c ce f8 84 db 0f 85 8b fd ff ff e8 7a 84 ce f8 48 c7 c7 60 c5 6b 8a c6 05 d6 ee 36 04 01 e8 81 fe 09 00 <0f> 0b e9 6c fd ff ff e8 5b 84 ce f8 41 be 42 00 00 00 ba 01 00 00 [ 294.005982][ C3] RSP: 0000:ffffc90000578c70 EFLAGS: 00010286 [ 294.015795][ C3] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 294.027876][ C3] RDX: ffff888010890000 RSI: ffffffff8158e045 RDI: fffff520000af180 [ 294.039218][ C3] RBP: 00000000000088fb R08: 0000000000000001 R09: ffffffff8ecc0747 [ 294.050059][ C3] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888064a55c00 [ 294.063109][ C3] R13: 0000000000000000 R14: ffff8880660a0ce8 R15: 0000000000000000 [ 294.074962][ C3] FS: 0000000000000000(0000) GS:ffff88802cf00000(0000) knlGS:0000000000000000 [ 294.087330][ C3] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 294.096155][ C3] CR2: 0000000000000050 CR3: 000000006752a000 CR4: 0000000000350ee0 [ 294.106680][ C3] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 294.118023][ C3] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 294.129515][ C3] Call Trace: [ 294.133693][ C3] [ 294.137711][ C3] ? send_hsr_supervision_frame+0xb40/0xb40 [ 294.145885][ C3] hsr_announce+0x122/0x320 [ 294.151993][ C3] ? send_hsr_supervision_frame+0xb40/0xb40 [ 294.159974][ C3] call_timer_fn+0x1a5/0x6b0 [ 294.166329][ C3] ? add_timer_on+0x4a0/0x4a0 [ 294.172904][ C3] ? lock_downgrade+0x6d0/0x6d0 [ 294.183540][ C3] ? _raw_spin_unlock_irq+0x1f/0x40 [ 294.200730][ C3] ? send_hsr_supervision_frame+0xb40/0xb40 [ 294.220397][ C3] __run_timers.part.0+0x67c/0xa50 [ 294.229919][ C3] ? call_timer_fn+0x6b0/0x6b0 [ 294.237983][ C3] ? sched_clock_cpu+0x17b/0x1f0 [ 294.245371][ C3] run_timer_softirq+0xb3/0x1d0 [ 294.252414][ C3] __do_softirq+0x2a0/0x9f6 [ 294.259138][ C3] asm_call_irq_on_stack+0xf/0x20 [ 294.266395][ C3] [ 294.270320][ C3] do_softirq_own_stack+0xaa/0xd0 [ 294.277386][ C3] irq_exit_rcu+0x132/0x200 [ 294.283489][ C3] sysvec_apic_timer_interrupt+0x4d/0x100 [ 294.291670][ C3] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 294.300413][ C3] RIP: 0010:default_idle+0x13/0x20 [ 294.307667][ C3] Code: ca f8 e9 48 ff ff ff e8 4b a9 fd ff cc cc cc cc cc cc cc cc cc cc cc e8 0b df 8e f8 e9 07 00 00 00 0f 00 2d bf ca 5e 00 fb f4 66 90 66 2e 0f 1f 84 00 00 00 00 00 41 54 be 08 00 00 00 53 65 [ 294.338521][ C3] RSP: 0000:ffffc9000041fdf8 EFLAGS: 00000206 [ 294.348739][ C3] RAX: 00000000000f4663 RBX: ffff888010890000 RCX: 1ffffffff19d8a81 [ 294.361549][ C3] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 294.372656][ C3] RBP: ffffed1002112000 R08: 0000000000000001 R09: 0000000000000001 [ 294.384211][ C3] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000003 [ 294.405169][ C3] R13: 0000000000000003 R14: ffffffff8cec8dc8 R15: 0000000000000000 [ 294.425036][ C3] ? default_idle+0x5/0x20 [ 294.437878][ C3] default_idle_call+0x6a/0x90 [ 294.449741][ C3] do_idle+0x3fa/0x590 [ 294.460723][ C3] ? arch_cpu_idle_exit+0x40/0x40 [ 294.470992][ C3] cpu_startup_entry+0x14/0x20 [ 294.481216][ C3] start_secondary+0x266/0x340 [ 294.489669][ C3] ? set_cpu_sibling_map+0x2460/0x2460 [ 294.498733][ C3] secondary_startup_64_no_verify+0xb0/0xbb [ 294.509005][ C3] Kernel panic - not syncing: panic_on_warn set ... [ 294.518934][ C3] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 5.10.0-rc3-syzkaller #0 [ 294.518934][ C3] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 294.518934][ C3] Call Trace: [ 294.518934][ C3] [ 294.518934][ C3] dump_stack+0x107/0x163 [ 294.518934][ C3] panic+0x306/0x73d [ 294.518934][ C3] ? __warn_printk+0xf3/0xf3 [ 294.518934][ C3] ? __warn.cold+0x1d/0xbb [ 294.518934][ C3] ? __warn.cold+0x14/0xbb [ 294.518934][ C3] ? send_hsr_supervision_frame+0x889/0xb40 [ 294.518934][ C3] __warn.cold+0x38/0xbb [ 294.518934][ C3] ? send_hsr_supervision_frame+0x889/0xb40 [ 294.518934][ C3] report_bug+0x1bd/0x210 [ 294.518934][ C3] handle_bug+0x3c/0x60 [ 294.518934][ C3] exc_invalid_op+0x14/0x40 [ 294.518934][ C3] asm_exc_invalid_op+0x12/0x20 [ 294.518934][ C3] RIP: 0010:send_hsr_supervision_frame+0x889/0xb40 [ 294.518934][ C3] Code: 04 31 ff 89 de e8 97 7c ce f8 84 db 0f 85 8b fd ff ff e8 7a 84 ce f8 48 c7 c7 60 c5 6b 8a c6 05 d6 ee 36 04 01 e8 81 fe 09 00 <0f> 0b e9 6c fd ff ff e8 5b 84 ce f8 41 be 42 00 00 00 ba 01 00 00 [ 294.518934][ C3] RSP: 0000:ffffc90000578c70 EFLAGS: 00010286 [ 294.518934][ C3] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 294.518934][ C3] RDX: ffff888010890000 RSI: ffffffff8158e045 RDI: fffff520000af180 [ 294.518934][ C3] RBP: 00000000000088fb R08: 0000000000000001 R09: ffffffff8ecc0747 [ 294.518934][ C3] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888064a55c00 [ 294.518934][ C3] R13: 0000000000000000 R14: ffff8880660a0ce8 R15: 0000000000000000 [ 294.518934][ C3] ? vprintk_func+0x95/0x1e0 [ 294.518934][ C3] ? send_hsr_supervision_frame+0xb40/0xb40 [ 294.518934][ C3] hsr_announce+0x122/0x320 [ 294.518934][ C3] ? send_hsr_supervision_frame+0xb40/0xb40 [ 294.518934][ C3] call_timer_fn+0x1a5/0x6b0 [ 294.518934][ C3] ? add_timer_on+0x4a0/0x4a0 [ 294.518934][ C3] ? lock_downgrade+0x6d0/0x6d0 [ 294.518934][ C3] ? _raw_spin_unlock_irq+0x1f/0x40 [ 294.518934][ C3] ? send_hsr_supervision_frame+0xb40/0xb40 [ 294.518934][ C3] __run_timers.part.0+0x67c/0xa50 [ 294.518934][ C3] ? call_timer_fn+0x6b0/0x6b0 [ 294.518934][ C3] ? sched_clock_cpu+0x17b/0x1f0 [ 294.518934][ C3] run_timer_softirq+0xb3/0x1d0 [ 294.518934][ C3] __do_softirq+0x2a0/0x9f6 [ 294.518934][ C3] asm_call_irq_on_stack+0xf/0x20 [ 294.518934][ C3] [ 294.518934][ C3] do_softirq_own_stack+0xaa/0xd0 [ 294.518934][ C3] irq_exit_rcu+0x132/0x200 [ 294.518934][ C3] sysvec_apic_timer_interrupt+0x4d/0x100 [ 294.518934][ C3] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 294.518934][ C3] RIP: 0010:default_idle+0x13/0x20 [ 294.518934][ C3] Code: ca f8 e9 48 ff ff ff e8 4b a9 fd ff cc cc cc cc cc cc cc cc cc cc cc e8 0b df 8e f8 e9 07 00 00 00 0f 00 2d bf ca 5e 00 fb f4 66 90 66 2e 0f 1f 84 00 00 00 00 00 41 54 be 08 00 00 00 53 65 [ 294.518934][ C3] RSP: 0000:ffffc9000041fdf8 EFLAGS: 00000206 [ 294.518934][ C3] RAX: 00000000000f4663 RBX: ffff888010890000 RCX: 1ffffffff19d8a81 [ 294.518934][ C3] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 294.518934][ C3] RBP: ffffed1002112000 R08: 0000000000000001 R09: 0000000000000001 [ 294.518934][ C3] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000003 [ 294.518934][ C3] R13: 0000000000000003 R14: ffffffff8cec8dc8 R15: 0000000000000000 [ 294.518934][ C3] ? default_idle+0x5/0x20 [ 294.518934][ C3] default_idle_call+0x6a/0x90 [ 294.518934][ C3] do_idle+0x3fa/0x590 [ 294.518934][ C3] ? arch_cpu_idle_exit+0x40/0x40 [ 294.518934][ C3] cpu_startup_entry+0x14/0x20 [ 294.518934][ C3] start_secondary+0x266/0x340 [ 294.518934][ C3] ? set_cpu_sibling_map+0x2460/0x2460 [ 294.518934][ C3] secondary_startup_64_no_verify+0xb0/0xbb [ 294.518934][ C3] Kernel Offset: disabled [ 294.518934][ C3] Rebooting in 86400 seconds.. VM DIAGNOSIS: 13:19:33 Registers: info registers vcpu 0 RAX=0000000000000007 RBX=ffffffff84c685a7 RCX=ffffffff83ce5f22 RDX=0000000000000000 RSI=ffffffff83ce5eef RDI=0000000000000006 RBP=ffffffff870d865b RSP=ffffc90000007b78 R8 =0000000000000000 R9 =0000000000000000 R10=ffffffff870d865b R11=0000000000000000 R12=ffffffff8cf319e4 R13=dffffc0000000000 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff83ce5f10 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] FS =0000 0000000000000000 ffffffff 00c00000 GS =0063 ffff88802cc00000 ffffffff 00d0f300 DPL=3 DS [-WA] LDT=0000 0000000000000000 ffffffff 00c00000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=ffffffffff600400 CR3=00000000670e6000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000c1162e42fefa39ef XMM03=0000000000000000414fffffe0000000 XMM04=61636f6c2f7273752f3a6e6962732f6c XMM05=3a6e6962732f7273752f3a6e69622f6c XMM06=2f3a6e6962732f3a6e69622f7273752f XMM07=3131582f6e69622f7273752f3a6e6962 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=00000000000ee15b RBX=ffff888010862180 RCX=1ffffffff19d8a81 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000000 RBP=ffffed100210c430 RSP=ffffc900003ffdf8 R8 =0000000000000001 R9 =0000000000000001 R10=0000000000000000 R11=0000000000000000 R12=0000000000000001 R13=0000000000000001 R14=ffffffff8cec8dc8 R15=0000000000000000 RIP=ffffffff88e6f903 RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802cd00000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe000003e000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe000003c000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fab39cee943 CR3=0000000017d52000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000c1162e42fefa39ef XMM03=0000000000000000414fffffe0000000 XMM04=61636f6c2f7273752f3a6e6962732f6c XMM05=3a6e6962732f7273752f3a6e69622f6c XMM06=2f3a6e6962732f3a6e69622f7273752f XMM07=3131582f6e69622f7273752f3a6e6962 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 2 RAX=0000000000000002 RBX=0000000000035b00 RCX=ffffffff815631a1 RDX=fffffbfff19d91ba RSI=0000000000000003 RDI=0000000000000000 RBP=1ffff92000cacee4 RSP=ffffc900065676e8 R8 =0000000000000000 R9 =ffffffff8cec8dcf R10=fffffbfff19d91b9 R11=0000000000000000 R12=0000000000000001 R13=ffff888010bd4300 R14=ffff888010bd5448 R15=dffffc0000000000 RIP=ffffffff815ca778 RFL=00000093 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 ffffffff 00c00000 DS =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] FS =0000 0000000000000000 ffffffff 00c00000 GS =0063 ffff88802ce00000 ffffffff 00d0f300 DPL=3 DS [-WA] LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe0000079000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000077000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000000000050 CR3=000000006752a000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00ff0000000000000000000000000000 XMM01=5500656d69746c61636f6c2f6374652f XMM02=00000000000000000000000000000000 XMM03=000000000000ff00000000ff000000ff XMM04=75722f766564752f62696c2f002f2a2f XMM05=5b6d626974627c2a5d392d305b646d7c XMM06=2d305b6d626974627c2a5d392d305b64 XMM07=312d6c65727276623a534f4942616553 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 3 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff840dbc7c RDI=ffffffff8fad6a60 RBP=ffffffff8fad6a20 RSP=ffffc900005785f0 R8 =0000000000000001 R9 =0000000000000003 R10=000000000000000a R11=0000000000000000 R12=0000000000000020 R13=fffffbfff1f5ad97 R14=fffffbfff1f5ad4e R15=dffffc0000000000 RIP=ffffffff840dbcd0 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 ffffffff 00c00000 DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802cf00000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe00000b4000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe00000b2000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000000000050 CR3=000000006752a000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=000000c00010f068000000c00010f058 XMM03=000000c00010f0b0000000c00010f0a0 XMM04=000000c00010f140000000c00010f130 XMM05=000000c00010f160000000c00010f150 XMM06=000000c00010f180000000c00010f170 XMM07=000000c000099b00000000c000099ae0 XMM08=000000c0003cc400000000c0003be800 XMM09=000000c0003e6000000000c0003e7800 XMM10=000000c00015b000000000c000080f80 XMM11=000000c0003c0400000000c000152c00 XMM12=000000c0003ea000000000c0003ce800 XMM13=000000c00ba09ec0000000c00ba09b40 XMM14=000000c00b9f5710000000c00baa62c0 XMM15=000000c00b9f57a0000000c00b9f5770