[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.48' (ECDSA) to the list of known hosts. 2020/05/17 02:20:58 fuzzer started 2020/05/17 02:20:58 dialing manager at 10.128.0.26:40215 2020/05/17 02:20:58 syscalls: 3005 2020/05/17 02:20:58 code coverage: enabled 2020/05/17 02:20:58 comparison tracing: enabled 2020/05/17 02:20:58 extra coverage: enabled 2020/05/17 02:20:58 setuid sandbox: enabled 2020/05/17 02:20:58 namespace sandbox: enabled 2020/05/17 02:20:58 Android sandbox: /sys/fs/selinux/policy does not exist 2020/05/17 02:20:58 fault injection: enabled 2020/05/17 02:20:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/17 02:20:58 net packet injection: enabled 2020/05/17 02:20:58 net device setup: enabled 2020/05/17 02:20:58 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/05/17 02:20:58 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/17 02:20:58 USB emulation: /dev/raw-gadget does not exist 02:23:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) syzkaller login: [ 224.154812][ T7161] IPVS: ftp: loaded support on port[0] = 21 02:23:39 executing program 1: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x40c, 0x0, 0x0, 0x1, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, 0x0, 0x0, 0x0) sched_getparam(0xffffffffffffffff, 0x0) llistxattr(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8080}, 0xc800) openat$rtc(0xffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x4000, 0x0) sendmsg$IPCTNL_MSG_CT_GET_DYING(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x2004c804}, 0x0) syz_open_procfs(0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000300)={0x0, 0x5, 0xca}) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet(0x2, 0x3, 0x4) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f00000001c0)=0xc) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x2, 0x3, 0x220, 0x0, 0x0, 0xb4, 0x90, 0xb4, 0x18c, 0x18c, 0x18c, 0x18c, 0x18c, 0x3, 0x0, {[{{@ip={@rand_addr, @remote, 0x0, 0x0, 'syzkaller0\x00', 'netpci0\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ip={@multicast1, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x94, 0xfc, 0x0, {}, [@common=@icmp={{0x24, 'icmp\x00'}, {0x0, "df66", 0x1}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x94, 0x1d3}, {0x24}}}}, 0x27c) [ 224.302199][ T7161] chnl_net:caif_netlink_parms(): no params data found [ 224.407990][ T7161] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.417120][ T7161] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.426666][ T7161] device bridge_slave_0 entered promiscuous mode [ 224.438356][ T7161] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.446092][ T7161] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.456039][ T7161] device bridge_slave_1 entered promiscuous mode [ 224.488429][ T7161] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 224.502320][ T7161] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 224.534096][ T7161] team0: Port device team_slave_0 added [ 224.544828][ T7161] team0: Port device team_slave_1 added [ 224.597840][ T7307] IPVS: ftp: loaded support on port[0] = 21 [ 224.605448][ T7161] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 224.612583][ T7161] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 224.641390][ T7161] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 224.655440][ T7161] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 224.664238][ T7161] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 02:23:39 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x40c, 0x0, 0x0, 0x1, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) keyctl$revoke(0x3, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) openat$rtc(0xffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x2, 0x3, 0x220, 0x0, 0x0, 0xb4, 0x90, 0xb4, 0x18c, 0x18c, 0x18c, 0x18c, 0x18c, 0x3, 0x0, {[{{@ip={@rand_addr, @remote, 0xb8000000, 0x0, 'syzkaller0\x00', 'netpci0\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ip={@multicast1, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x94, 0xfc, 0x0, {}, [@common=@icmp={{0x24, 'icmp\x00'}, {0xe, "df66", 0x1}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0xf6020000, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x94, 0x1d3}, {0x24}}}}, 0x27c) [ 224.692290][ T7161] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 224.815056][ T7161] device hsr_slave_0 entered promiscuous mode [ 224.882675][ T7161] device hsr_slave_1 entered promiscuous mode 02:23:39 executing program 3: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet6(0xa, 0x803, 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x1bdd307, 0x0) openat$rtc(0xffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000040)) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000003c0), 0xc, &(0x7f00000005c0)={&(0x7f0000000680)=ANY=[@ANYBLOB, @ANYBLOB], 0x144}, 0x1, 0x0, 0x0, 0x8010}, 0x4) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) [ 224.965433][ T7337] IPVS: ftp: loaded support on port[0] = 21 [ 225.310689][ T7406] IPVS: ftp: loaded support on port[0] = 21 [ 225.362143][ T7307] chnl_net:caif_netlink_parms(): no params data found 02:23:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_OPEN(r0, &(0x7f0000000000)={0x20, 0x0, 0x2}, 0x20) syz_open_procfs(0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x3ff) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) [ 225.415769][ T7161] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 225.509443][ T7161] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 225.634704][ T7161] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 225.709403][ T7161] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 225.763834][ T7337] chnl_net:caif_netlink_parms(): no params data found 02:23:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) [ 225.816996][ T7604] IPVS: ftp: loaded support on port[0] = 21 [ 225.821174][ T7307] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.830108][ T7307] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.851168][ T7307] device bridge_slave_0 entered promiscuous mode [ 225.889273][ T7307] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.900862][ T7307] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.908586][ T7307] device bridge_slave_1 entered promiscuous mode [ 225.944999][ T7307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 225.959383][ T7307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 226.058691][ T7307] team0: Port device team_slave_0 added [ 226.118956][ T7307] team0: Port device team_slave_1 added [ 226.177843][ T7337] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.186679][ T7337] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.195843][ T7337] device bridge_slave_0 entered promiscuous mode [ 226.205420][ T7337] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.212975][ T7337] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.222919][ T7337] device bridge_slave_1 entered promiscuous mode [ 226.234904][ T7406] chnl_net:caif_netlink_parms(): no params data found [ 226.275694][ T7671] IPVS: ftp: loaded support on port[0] = 21 [ 226.288867][ T7307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 226.296074][ T7307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.326435][ T7307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 226.339799][ T7307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 226.347523][ T7307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.374363][ T7307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 226.404266][ T7337] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 226.427447][ T7337] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 226.492862][ T7337] team0: Port device team_slave_0 added [ 226.536986][ T7337] team0: Port device team_slave_1 added [ 226.575754][ T7307] device hsr_slave_0 entered promiscuous mode [ 226.620922][ T7307] device hsr_slave_1 entered promiscuous mode [ 226.660637][ T7307] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 226.668586][ T7307] Cannot create hsr debugfs directory [ 226.718146][ T7406] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.726184][ T7406] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.735361][ T7406] device bridge_slave_0 entered promiscuous mode [ 226.744754][ T7406] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.753056][ T7406] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.761490][ T7406] device bridge_slave_1 entered promiscuous mode [ 226.773283][ T7337] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 226.780232][ T7337] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.806386][ T7337] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 226.824111][ T7337] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 226.831212][ T7337] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.857216][ T7337] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 226.997846][ T7406] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 227.074357][ T7337] device hsr_slave_0 entered promiscuous mode [ 227.151232][ T7337] device hsr_slave_1 entered promiscuous mode [ 227.200409][ T7337] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 227.207992][ T7337] Cannot create hsr debugfs directory [ 227.219916][ T7406] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 227.236559][ T7604] chnl_net:caif_netlink_parms(): no params data found [ 227.287879][ T7406] team0: Port device team_slave_0 added [ 227.306026][ T7671] chnl_net:caif_netlink_parms(): no params data found [ 227.334585][ T7406] team0: Port device team_slave_1 added [ 227.424900][ T7406] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 227.432933][ T7406] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.461774][ T7406] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 227.478699][ T7406] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 227.486940][ T7406] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.513426][ T7406] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 227.557659][ T7161] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.734405][ T7406] device hsr_slave_0 entered promiscuous mode [ 227.800858][ T7406] device hsr_slave_1 entered promiscuous mode [ 227.870361][ T7406] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 227.877969][ T7406] Cannot create hsr debugfs directory [ 227.884494][ T7604] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.891950][ T7604] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.899760][ T7604] device bridge_slave_0 entered promiscuous mode [ 227.912469][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.925085][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.934787][ T7671] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.942312][ T7671] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.952118][ T7671] device bridge_slave_0 entered promiscuous mode [ 227.963609][ T7671] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.971174][ T7671] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.979116][ T7671] device bridge_slave_1 entered promiscuous mode [ 227.996576][ T7604] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.005600][ T7604] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.016018][ T7604] device bridge_slave_1 entered promiscuous mode [ 228.083226][ T7161] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.095927][ T7307] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 228.126074][ T7307] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 228.184809][ T7671] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 228.196752][ T7604] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 228.208095][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.219663][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.228451][ T2831] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.235792][ T2831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.260247][ T7307] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 228.293285][ T7671] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 228.305238][ T7604] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 228.326242][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.335904][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.348887][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.357790][ T2842] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.364955][ T2842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.403353][ T7307] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 228.464414][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.503886][ T7671] team0: Port device team_slave_0 added [ 228.526581][ T7604] team0: Port device team_slave_0 added [ 228.537562][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.562676][ T7337] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 228.606245][ T7671] team0: Port device team_slave_1 added [ 228.613586][ T7604] team0: Port device team_slave_1 added [ 228.652876][ T7337] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 228.721249][ T7337] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 228.763143][ T7671] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 228.770570][ T7671] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 228.798203][ T7671] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 228.846562][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.857089][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.867627][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.881373][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.896332][ T7337] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 228.942693][ T7671] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 228.949661][ T7671] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 228.976343][ T7671] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 229.004851][ T7406] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 229.044384][ T7604] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 229.052007][ T7604] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 229.079506][ T7604] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 229.093726][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 229.106235][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.115261][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.128642][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.138034][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.214426][ T7671] device hsr_slave_0 entered promiscuous mode [ 229.270256][ T7671] device hsr_slave_1 entered promiscuous mode [ 229.319905][ T7671] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 229.328937][ T7671] Cannot create hsr debugfs directory [ 229.340867][ T7406] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 229.405133][ T7406] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 229.461798][ T7604] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 229.468858][ T7604] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 229.497309][ T7604] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 229.525988][ T7161] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.546814][ T7406] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 229.675377][ T7604] device hsr_slave_0 entered promiscuous mode [ 229.730285][ T7604] device hsr_slave_1 entered promiscuous mode [ 229.769701][ T7604] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 229.777371][ T7604] Cannot create hsr debugfs directory [ 229.878597][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.886641][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.939371][ T7161] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.979190][ T7307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.004451][ T7307] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.036802][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.052771][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.127180][ T7671] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 230.174822][ T7671] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 230.251852][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.273695][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.283104][ T2842] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.290378][ T2842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.298708][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.310035][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 230.318636][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.328466][ T7671] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 230.391862][ T7671] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 230.474653][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.483799][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.492371][ T3133] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.500287][ T3133] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.507928][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.528665][ T7337] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.572544][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.585272][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.595090][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.616109][ T7406] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.670081][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 230.678043][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.687873][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.697122][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.706252][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.715130][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.724058][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.733093][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.741765][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.750299][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.757985][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.766009][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.775561][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.792192][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.803303][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.818304][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 230.830876][ T7161] device veth0_vlan entered promiscuous mode [ 230.843820][ T7406] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.854799][ T7337] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.863669][ T7604] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 230.954752][ T7604] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 231.036822][ T7161] device veth1_vlan entered promiscuous mode [ 231.044392][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 231.054059][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.064000][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.073459][ T3132] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.080590][ T3132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.088216][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.097672][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.106258][ T3132] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.113405][ T3132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.121510][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.130692][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.139253][ T3132] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.146312][ T3132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.154436][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.164219][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.173553][ T3132] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.180776][ T3132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.214537][ T7604] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 231.270773][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 231.279025][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.287769][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.296419][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 231.305031][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 231.313991][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.324117][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.333239][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.351031][ T7307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.370331][ T7604] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 231.448174][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.460692][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.470045][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.478439][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.487928][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.497203][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.506305][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.515503][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 231.524255][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.535309][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.543687][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.565479][ T7671] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.581821][ T7161] device veth0_macvtap entered promiscuous mode [ 231.597252][ T7161] device veth1_macvtap entered promiscuous mode [ 231.613769][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 231.624483][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 231.633354][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.643070][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.652768][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.662502][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.699196][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.707120][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.725287][ T7337] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 231.737047][ T7337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.755078][ T7671] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.771515][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.780586][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.789747][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.798192][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.814296][ T7406] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 231.830013][ T7406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.842593][ T7161] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 231.861121][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.874500][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.884167][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.894010][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.903562][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 231.913308][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 231.922437][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.931881][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.941019][ T3130] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.948050][ T3130] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.961022][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.003486][ T7161] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 232.016005][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.025374][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.035792][ T2824] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.042984][ T2824] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.050654][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.059619][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 232.067135][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 232.074957][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.083834][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 232.125353][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 232.133042][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 232.141954][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.156660][ T7406] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 232.198293][ T7337] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 232.215880][ T7307] device veth0_vlan entered promiscuous mode [ 232.223898][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.234243][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.243256][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 232.252424][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.360041][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 232.372740][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.382129][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.393768][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 232.404092][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 232.416344][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.426573][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.440227][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.448540][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.503957][ T7307] device veth1_vlan entered promiscuous mode [ 232.519038][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 232.527217][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.537673][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.628848][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.660560][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 232.682632][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 232.695126][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 232.714712][ T7406] device veth0_vlan entered promiscuous mode [ 232.766327][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 232.779850][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.789103][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 232.798281][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 02:23:47 executing program 0: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_tcp_buf(r1, 0x6, 0x1d, 0x0, &(0x7f0000000000)) [ 232.830677][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.838627][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.853133][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.862178][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.890722][ T7337] device veth0_vlan entered promiscuous mode [ 232.928281][ T7406] device veth1_vlan entered promiscuous mode [ 232.957193][ T7604] 8021q: adding VLAN 0 to HW filter on device bond0 02:23:47 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000040)="45e9aed12f060000000000000025d86800273a89d6f46904debc", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 233.007839][ T7337] device veth1_vlan entered promiscuous mode [ 233.031004][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 233.040430][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 02:23:47 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/13) [ 233.056148][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 233.065159][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 233.073504][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.082711][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.089599][ T8428] ptrace attach of "/root/syz-executor.0"[8426] was attempted by "/root/syz-executor.0"[8428] [ 233.139758][ T7307] device veth0_macvtap entered promiscuous mode [ 233.151521][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 233.179691][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 233.187892][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 233.220627][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.241620][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.264001][ T7671] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 233.287970][ T7604] 8021q: adding VLAN 0 to HW filter on device team0 02:23:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd65660f382201c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d6830f01caed", 0x14}], 0x1, 0x0, 0x0, 0x25a) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_procfs(0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xec100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x80000000000000}, 0xb20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xd8d0668c81aa2fa3) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000140)) [ 233.324390][ T7307] device veth1_macvtap entered promiscuous mode [ 233.408849][ T7337] device veth0_macvtap entered promiscuous mode [ 233.411503][ T8436] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 233.430689][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 233.441219][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.451163][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.472006][ T2842] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.479163][ T2842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.509215][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.517976][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.547430][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.585503][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 233.639941][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.651500][ C0] hrtimer: interrupt took 48500 ns [ 233.657739][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.684006][ T3132] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.691167][ T3132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.729541][ T7337] device veth1_macvtap entered promiscuous mode [ 233.759543][ T7406] device veth0_macvtap entered promiscuous mode [ 233.789560][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 233.799018][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.816516][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.825638][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.841670][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.856719][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.867074][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 02:23:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)={0x54, 0x2, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x54}}, 0x0) [ 233.911644][ T7307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 233.940255][ T7307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 02:23:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r2, &(0x7f0000000240)={@void, @val={0x3}, @mpls={[], @ipv4=@icmp={{0x8, 0x4, 0x0, 0x0, 0x224, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote={0xac, 0x14, 0x8}}, @timestamp}}}, 0x100c) [ 233.971051][ T7307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 234.003384][ T7406] device veth1_macvtap entered promiscuous mode [ 234.031982][ T7337] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.074007][ T7337] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.091681][ T7337] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.109420][ T7337] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.123976][ T7337] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 234.137351][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 234.148124][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 234.157310][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 234.167753][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.177715][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 234.189739][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.202365][ T7307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.225722][ T7307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.241572][ T7307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 234.279534][ T7337] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.291284][ T7337] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.303476][ T7337] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.316116][ T7337] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.327737][ T7337] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 234.340423][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 234.351475][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 234.361178][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.370607][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.379842][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 234.389304][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 234.407579][ T7406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.423235][ T7406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.434968][ T7406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.445482][ T7406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.455426][ T7406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.465992][ T7406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.477428][ T7406] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 234.635348][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 234.644070][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.653099][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.661735][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.696399][ T7406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.707528][ T7406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.717495][ T7406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.728050][ T7406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.737976][ T7406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.749686][ T7406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.761468][ T7406] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 234.816417][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.825188][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.835113][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 234.844145][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 234.855536][ T7604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.026805][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 235.036620][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 02:23:50 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0xffff, 0x0) [ 235.337164][ T7671] device veth0_vlan entered promiscuous mode [ 235.461217][ T2818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 235.479949][ T2818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.500595][ T2818] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 02:23:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, 0x0) syz_open_procfs(0x0, 0x0) clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x16, 0x0, 0x0) socket(0x10, 0x0, 0x0) [ 235.512530][ T2818] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 235.532267][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.543722][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.585816][ T7671] device veth1_vlan entered promiscuous mode 02:23:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1f) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xd, 0x4, 0x4, 0x123, 0x0, r2, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8]}, 0x40) socket(0x10, 0x803, 0x0) [ 235.626439][ T7604] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.786570][ T2818] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 235.811929][ T2818] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 235.840778][ T2818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 235.869749][ T2818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 235.910959][ T7671] device veth0_macvtap entered promiscuous mode [ 235.933561][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 235.974352][ T7671] device veth1_macvtap entered promiscuous mode [ 236.124166][ T7671] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 236.155518][ T7671] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.170436][ T7671] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 236.182854][ T7671] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.194936][ T7671] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 236.216998][ T7671] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.228370][ T7671] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 236.248454][ T7671] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.282384][ T7671] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 236.330312][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 236.345465][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 236.382255][ T7671] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.417802][ T7671] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.453113][ T7671] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.464480][ T7671] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.474896][ T7671] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.486343][ T7671] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 02:23:51 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f0000001700)) [ 236.496786][ T7671] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.509302][ T7671] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.531691][ T7671] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 236.618375][ T2818] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 236.627228][ T2818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 236.640083][ T2818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 236.650110][ T2818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 236.686820][ T7604] device veth0_vlan entered promiscuous mode [ 236.708317][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 236.721788][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 236.746681][ T7604] device veth1_vlan entered promiscuous mode [ 236.805105][ T2818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 236.819176][ T2818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 236.838311][ T2818] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 236.964267][ T2824] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 237.026507][ T7604] device veth0_macvtap entered promiscuous mode [ 237.074062][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 237.093588][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 237.119645][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 237.142685][ T7604] device veth1_macvtap entered promiscuous mode [ 237.205311][ T7604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 237.215868][ T7604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.239664][ T7604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 237.257654][ T7604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.274588][ T7604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 237.285528][ T7604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.302293][ T7604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 237.316632][ T7604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.331943][ T7604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 237.342628][ T7604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.360823][ T7604] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 237.368891][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 237.376947][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 237.386796][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 237.430347][ T7604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 237.442235][ T7604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.452487][ T7604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 237.463128][ T7604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.474183][ T7604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 237.484929][ T7604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.494837][ T7604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 237.505313][ T7604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.515206][ T7604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 237.525928][ T7604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 237.537247][ T7604] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 237.547068][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 237.556983][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 02:23:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_OPEN(r0, &(0x7f0000000000)={0x20, 0x0, 0x2}, 0x20) syz_open_procfs(0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x3ff) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) 02:23:53 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) 02:23:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1f) syz_open_procfs(0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000380)={&(0x7f0000000180)="5a1999f6833c6a88a4d902d5d516d81520c6dc1d46d6f5c0d0", &(0x7f0000000200)=""/139, &(0x7f00000002c0)="ea4730bdec2bfa9f61e7a26d69ae04bfcb06f0bd8f786e193d661ee8a9b9c063ce04ad1c6bfbd39454f0c7f7f4a3fffe41db02d5069d3f555b", &(0x7f0000000340)="67f58aed6d0ac3a98f3a", 0x2, r1}, 0x38) clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xd, 0x4, 0x4, 0x123, 0x0, r2, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8]}, 0x40) 02:23:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000080)={@fixed, 0x2, 0x20, 0x0, 0x0, 0x0, "986c9269af6605150bf42cb6bffc6b7ceaa462fe3121383cdd7827d085b266f64be86451ee18fb465c391a3e413ab9d71a47d10a69829f9200bf7ca2b1b96ff2f8a94ea9caa5fb535662cecac417182876758c22ec65766a5e248a28fb94f8196df0d90e061df9f035b60b86ef7fb1002086496c46d60dc06943e4fb80854527"}) syz_open_procfs(0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000380)={&(0x7f0000000180)="5a1999f6833c6a88a4d902d5d516d81520c6dc1d46d6f5c0d0", &(0x7f0000000200)=""/139, &(0x7f00000002c0)="ea4730bdec2bfa9f61e7a26d69ae04bfcb06f0bd8f786e193d661ee8a9b9c063ce04ad1c6bfbd39454f0c7f7f4a3fffe41db02d5069d3f555bedc2fa24c75825fa636571a1364a6a3d92ba2bf548b8b26c2609bd79db1728dc38b4668be027a2324f4bfc4ba52f3dc9f19e9211b1adce05de", &(0x7f0000000340)="67f58aed6d0ac3a98f", 0x2, r1}, 0x38) clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xd, 0x4, 0x4, 0x123, 0x0, r2, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8]}, 0x40) 02:23:53 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f0000001700)) 02:23:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x488100, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$packet(0x11, 0x3, 0x300) ptrace$getenv(0x4201, r0, 0x34aa54ad, &(0x7f0000000340)) 02:23:53 executing program 0: r0 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0xff5f) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x104, 0x3a}, 0x80, &(0x7f0000000140)=[{&(0x7f00000027c0)="02840209900d08233e496d5671dc71ff04291b2c1501772502bb867063f70647862a15257781bcf1d1e498104d082833914ee68afc14ac7cb85975751b8c31271948ee303aa2a34be964b8c1b95638607b2e7ec7fda28fea4caada028a39bf259538214e80b9b5c9b58b1cb36a933d64a25324566f7733ea93fc91c98fec268cb1e2148198e2ccf2463d2ae56c61ac436c336b2d421c6b512a600955c6ede3e5820165eabf2dda9e2294300485327a6d28f7913f19d79e5f478626bb6a607c2f5085c68749edc417da6cc4db8c605215575067836f62b0b3e0b49e8c321240c1b1b54babad07a7000c4eb99200b9d016f1554683b7b3323ab37f066b973d584345792feba5b719ec0413d1c37689ce927de538b4ac16687f6595120220e5205f79227e43a8eaa610c8c232bcb811b4a63eab1b87da214700408e830774dcd6318bec9ef28b9171b0492bddb09009a8d26f797713d81548e0c547b8aa7bcd844c2cfa69560deaa6188b576792cccdc09a1f94da4e4c4f05e4d053d6a2fcdb253dce696d6cd85a1aee740c2a84e3d63aa558d3db42531e2303c6e8cfc0b6e31950fcbf3021f708d47c05edcf3fcdd66226d99f1f132d73f698e0820c395f343e0d69042b6b06bf40b45ea6a8f52a32255f3c40d4e9fb93084421a6235116be29125e5afe2d8c418cedb2548db2fcade80c118af8a6be1e650517519721a5920f842662aad37473f2ba60f7ee8466f8dba829c3e17d3e618ef5768b1b0a8991c64f2e592e726bb4636d13fbd04ed71b031e1c1a27fe30325e521a9845ef1abae620cefb216c47a1e3b4db8cb1287006b9fed827fa5a944b8045a3397ba4208c5cb67117393b2f836e4e79196e05ebd7488fa76619ea0521982b9cb76a63bed4f0ffe48ceb4b2bbe4e590dec80eca4740027f855dad06313a2a0188932a2069fc70b8af0e4294a7b51b552ad72ccd5625fd2a971354bad2930eec5f41e0ae271224b8a9160d96965d372c65e4a0adcee1e8bb84406b6a5c5e4d6ed7ff529afdffcdbea58f43e7c39f8aa9845fc92c84aa8bc0eef238d19b2cd3dd0c6d52694c99f2f493b7064076b62d139837eda3d11e43ae52fb771c1585974bcc6e2adb24096fd3d5ac867afb9cfb6ed07cb34e227f00ed5541499d2e7e3b4f3da831a3b9c32de8be0f5b45e8248b5a2811bb452ca6dc7d56d87531347ad316e6e8c6bf887f70f455cdeae8dcfff004b0ed1b8fd63d1d5e55cbdf1541b87821f3c90f7d47e542ec75b132f5285862d3e9fd84f841e4d137e2735d5f23c87108bcaa591a14ab2ab43802ffb176453312420fe0e79af7236850104bc3e925b16fd0a57ee9959ae8ccc13c843365442bb462d86ead8a20c41e064e0ad286f4aa4c69d0046e5012cecf425b0df11c0b458e31804d8ffe98554afc69b475ca03cbe926806b276e19aa47b3e101b95ee2fd32b9f06a3fcf6f078ce694f9ed8fe03425446bcdd0e7c1f4d3e109bbe30020cb81b64bb0cdfd8a0d33e1143c4fbb7fef15d1059e1f20b394f69d482a1da5fd49508808c80c824a843698386b4d3c3885f063aa3c047624f93298040fbc706020d295cf3f363d42f21d327d91d101cc4758c67195a49c3b3002e14cf28a5b8899b7ef08b6713d89c7049ef594361b1d8a0c5838ff30a6a3f1b0f9f947c76d5f1629d3df215975b498bd33ddbc44798a9f76ba0c41e9ad565e44ebf3c333fade1d4306b1042c5e2e855f3e5fdcd64ce7fdf73b09044bec8a2f0cecbb00c6c76c85891478aa4bae6282541cff613f2b461cce115ba0b78c6f50f4593efe5c2ae558f6c0534db14d5b44416b08abe45c6ddf5c749aae8141e427a0a2f42b903ac71caa09e5098cc2c07d79145c7408415d8f937108d6becdbb38a2b3250c0fdf36297375aa3212c9bc8483e8d629c54a79ca55cdda720496753f27fd9e88e203594c1e28514e0d22b9c34c3e1f10253217abed40b09a533fad16c7b9b8e89d7dfd3b27d579bfc813ad2895543ada10f886c7c75010bc70345b727513fa3b7c6aa677a22e037e2bd7731148996f3a8c424075fd12aa8eb9d8f6a8fe7b2eb68934799f5063c58c1816caa4b400bb0914fc7300111c063e5c01910b0b01803a1a348f387542236d82bef6d926ba571ca0e7745e586eddf2334baeafd7b1149502e781ec45299c3f3cd34c3628057def3c012878123224e33828b216022dfebdc6a284e503868a1e4369af819fcfd4124d801386dbb123ce88d54712f6351c77aad6039b2f5ff3d0d1903c74043864fa9f801847ac8446280a31739e0215bce77c08c2477e9079f62225cf179da445e9f220560d995238f17e87dd4ce0f7ebe5f8941d5d130c2d6398e08bb893b5dd8e58701e41e75fd0182d3ebac8920aad7f4777b4e096eb5c5a17e440c0a5b95ca92bbaec63130bbc41d0cbfccb03eb6c1cffc8558bd255c2096a285346dd9600f33554acf62aef19d2776bd5d8a5a9f0a4976022b8ac1400e3f0a7fa227ebc0ad80187939562492154c708739f865a9803512a6213d5026b1febd0a20ce4b3a4d7d90dc5af3f5beaa06b8af1d19556655ac578f9266f5d3b393f24a2d112eee90f749e1f0a6e27ff2469f1cc21d5bcbf355168c62044fd1cc4861544a8175f640ad3c5bb6c81efa331822efb70b57f4110deebe68794211ee4a95c259b4eb519d887b6cfdee178758382f4f63c80b1f0b9f2337dd5a11a5b1fb04c3315ff942cf7f5d7da36c088a65f86529d003c8c9bf74392f9d897b53a422cb3b3f9e09f9936514ac100fecf3c9a573aae041ce3c86cce6dc2884053bc56a510791392bda454aa7dc580a3a7cf71c18dd57bec21c0eb143deb654d8b0fc642bbc7484dc9943c2102169a6aca278f0fd81b1b6b082b355443c8198284e3b01e9fff1c8df1895e9c9593f16438c7f737f2ab56c0f57eadfcd570c5b04b5218fc7d2c0cdca5c7ba5ff428b4fe541d4c8f6fe274d2a3290343f3d6944c918571e350caf2ec3cc9601cd5b71e8f22ff401024c51c592bf476f255b200962e2ed014ce551376235e8d220763f8c9c904570d6b6227c94d62e08b0c9bd3557b96c8ed227685fc54d43e4a05ca5996c4d8e3e5076f394b0c0bc7cdf972f996c45987ffb2d6a138a1772b7ffbeaa66ceddd34839051c61f9d87153f23823f9178b56eb016524ba862cdca9d147b5bda79553ade825d5a1b8ea3acf8c7cad88cd11b68625d367931b9a0296b228fd2c52da32d050d746942fb38dbb3d5e2ad75b7243f7340a8c0d4c7b156e030b6eb154ec6c47c1b6af307ea0e8916e21166572632321f8b4978ecd1f8b4029a6baba4da2dd984d245d1b6dd4a6f2a72acc4d90f480de489826130dd7b2a9ad79938ed6de65c7a56e0515d84302a8a8ee98c20ea32db20b231b9d00e03dd74b804e15c70ce8a6b169ffa79db7e24062b2dd3560502337bb03c8506a25ce77eaa06f9fb54aff0bab9545c32bb9a35a700361f46a3995ef929af7698bf16df9d8965f4d939f5dba6eb238c1089c25617568b29760ecbfef273b8070c3853a652d30da91cb00e0afa1c663589158711984cfe38869974c30e9b51333091cb0f5d72f5ddb0f3bc550b2787ff6fdfe0b90764f8ec319a2674d6e16ca2417b7a2144b5a4ad248fc4b2b8f74ed1957bd4f52f0db0ac4eb8f6dc62c51e16a803bff507359abdbd0ce1ee0fb936a4a060954c1a939b4b197b61311d079ef09e57e60f94fd796c12cf7e62e11bbdc11e04fc79736e42d6d2dcb02e705dc4e8e17addcc0902af4ebbf0a2f57db53cbe99bb0797137c903195de282ed02c37634181936e351f383fb590eb453e539b80c6935185ac40890c1ba70b5e2eb53235f3a983ce4608929d2609354f89fc22f80a0aa9fc0ea9af7f06e46d8b5f5d47dbd2efe1f2d0f4edee09f11b57c257ff5ecfe96ada3c5f37e1d766c5c85490d14f297e1ce65ae34909f04492e7cc955faabb205491a096147d0930ffa70b68055523e360328f26f28ff160cdb8b4785a22110191c9ecfd187267c1a4300e9370a41c73fe224f3a9c54493780b1a4ff96398f0a60f66e48ef4ad7183f71c0c4d6d9d1a57e19a56d9ed426cd4143de82ceb33011988ed079b52ab30300255e066a84959a10676c7b58515ff9bed194c784072af1062734f5d497f2be9b0ea1228f5a981e8d5d78da49da90b040d4e3a93b7f71360b25cf75fca36a4068748e1bc171dd40fa31d6f9c4c926a635f4ea4faf7511146bc5782606966aaab13a30d67cf182751149f678852da30d0f9b6ea5524a1f5ea01e77d7a74ac588ab2251cdbc9f4f8aa2cf367f0ad2178e66fbd7ab447aae12a7bc6cf3925fe99dcdf8ec95cf4576520b781dc12fe6d310978315d2e3d7dbc49c9be2fa40788ebd5fc02c6c7f566a64b7f4af7a96353265dc9e4c74c909b9a385966f4d7312fdcdfa8f5d0632c6db4a19ce696416a04e937d4a994e757eae59c07e5d3228254b35003eba32ed448516e9aa77b5b92c9ce7fff06a8f4f652d27971a46c621a6b2ee3c1adaf60d5cdfb381a4e4ac9ab7d7d72fcb2d6aa7e104255345f1e15dec8299c9c75735a01338d20f72d8b359803becef76d9ca6da029d0a795e6d4a652bf3880efeee074c81774b2971da03eff6d9516ac8a0c34b686aa1afbcb2befc79618a3dbb2bcd53da0075cdba0ddd975fd4e833291005f0fbf7b167922dc85b109e1381431e0fdc50f80b8592edd57f50f9dd950205e1a21cd3026cb30abe6d06dbec6c7cdb76d90c0e85a69aa1522281bcb3f4fc54ee443e76c7d9bf82e313f2dc3e277c699e079a847635780a5b724aca0ede72febba648de12fd14e3a78b29e9df82a19f4ed9c712e5b313c05e6908f6d4601d076afda5cf77eab4ea7c44c9d40f463fe8cde79f18170de9b087b113cfc7d467bd164564c2a8a99e4566d6f9eb1a8d5393700158fe84c109735cfe0ab45d9eb6fe61619d8538512730e015ffac07279973126e9087b209144c8797dd6b65381e616256a9cbf7771222c41618eb82d3539e7750ef0614acb4c901f88f31589d9d6d", 0xdfd}], 0x1, 0x0, 0x0, 0x1a0}, 0x0) 02:23:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1f) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000080)={@fixed, 0x2, 0x20, 0x0, 0x0, 0x0, "986c9269af6605150bf42cb6bffc6b7ceaa462fe3121383cdd7827d085b266f64be86451ee18fb465c391a3e413ab9d71a47d10a69829f9200bf7ca2b1b96ff2f8a94ea9caa5fb535662cecac417182876758c22ec65766a5e248a28fb94f8196df0d90e061df9f035b60b86ef7fb1002086496c46d60dc06943e4fb80854527"}) syz_open_procfs(0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000380)={&(0x7f0000000180)="5a1999f6833c6a88a4d902d5d516d81520c6dc1d46d6f5c0d0", &(0x7f0000000200)=""/139, &(0x7f00000002c0)="ea4730bdec2bfa9f61e7a26d69ae04bfcb06f0bd8f786e193d661ee8a9b9c063ce04ad1c6bfbd39454f0c7f7f4a3fffe41db02d5069d3f555bedc2fa24c75825fa636571a1364a6a3d92ba2bf548b8b26c2609bd79db1728dc38b4668be027a2324f4bfc4ba52f3dc9f19e9211b1adce05de", &(0x7f0000000340)="67f58aed6d0ac3a98f3a", 0x2, r2}, 0x38) clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xd, 0x4, 0x4, 0x123, 0x0, r3, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8]}, 0x40) 02:23:53 executing program 1: setpriority(0x4, 0x0, 0x0) 02:23:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r4, @ANYBLOB="00000400f1ffffff"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=@delchain={0x24, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) syz_genetlink_get_family_id$l2tp(0x0) 02:23:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xffdbc494) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file1/file0\x00') clone(0x8000000002380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rename(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1/file0\x00') r3 = gettid() tkill(r3, 0x7) 02:23:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="004e7c7c5b8a00001c0012000c000100626f6e64000000060c000200080006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x397, &(0x7f0000000180)={0x0, 0xff90}}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r7}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x40}}, 0x0) socket$inet(0x10, 0x0, 0x0) [ 239.065500][ T8579] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 239.076633][ T8579] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 239.106178][ T8584] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 239.116664][ T8583] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 239.170174][ T8583] team0: Device gre1 is of different type [ 239.446163][ T8597] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 02:23:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xff8c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c0000001000850d00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012000b0001006d616373656300000400020008000500", @ANYRES32=r4, @ANYBLOB="3ba2237bdcf870b34022e80510e6ef79163909dd883dda4962fb16ff070000e445d329445f8411a70b04482c8ee025c31aba174b81f51b896c9470a92dc5499c021c437b579aea3fc75ec5c5c960f6"], 0x3c}}, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000011000d04000000000000000000000600", @ANYRES32=r6], 0x20}}, 0x0) 02:23:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="004e7c7c5b8a00001c0012000c000100626f6e64000000060c000200080006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x397, &(0x7f0000000180)={0x0, 0xff90}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r7}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x40}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) 02:23:54 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) 02:23:54 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) [ 239.669180][ T8607] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 239.755288][ T8616] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 02:23:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xffdbc494) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file1/file0\x00') clone(0x8000000002380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rename(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1/file0\x00') r3 = gettid() tkill(r3, 0x7) 02:23:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x488100, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$packet(0x11, 0x3, 0x300) ptrace$getenv(0x4201, r0, 0x34aa54ad, &(0x7f0000000340)) [ 239.968872][ T8621] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 239.993736][ T8618] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 02:23:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xff8c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c0000001000850d00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012000b0001006d616373656300000400020008000500", @ANYRES32=r4, @ANYBLOB="3ba2237bdcf870b34022e80510e6ef79163909dd883dda4962fb16ff070000e445d329445f8411a70b04482c8ee025c31aba174b81f51b896c9470a92dc5499c021c437b579aea3fc75ec5c5c960f6"], 0x3c}}, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000011000d04000000000000000000000600", @ANYRES32=r6], 0x20}}, 0x0) 02:23:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"/1060], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff00004000633377fb08000000e000000062079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 240.316282][ T8631] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 02:23:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x5, 0x0, &(0x7f0000000140)) [ 240.393056][ T8631] device bridge_slave_1 left promiscuous mode [ 240.410548][ T8631] bridge0: port 2(bridge_slave_1) entered disabled state 02:23:55 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) [ 240.475568][ T8631] device bridge_slave_0 left promiscuous mode [ 240.493481][ T8631] bridge0: port 1(bridge_slave_0) entered disabled state 02:23:55 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) 02:23:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="004e7c7c5b8a00001c0012000c000100626f6e64000000060c000200080006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x397, &(0x7f0000000180)={0x0, 0xff90}}, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r7}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x40}}, 0x0) socket$inet(0x10, 0x0, 0x0) 02:23:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xffdbc494) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file1/file0\x00') clone(0x8000000002380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rename(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1/file0\x00') r3 = gettid() tkill(r3, 0x7) 02:23:56 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) 02:23:56 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) [ 241.516843][ T8659] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 02:23:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x2}, @mpls={[], @ipv4=@gre={{0x5, 0x4, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x8864, 0x5, 0x0, [], "67cb0021e5"}}}}}, 0x67) [ 242.041292][ T8659] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 02:23:57 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"/1060], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff00004000633277fb08000000e000000062079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 02:23:57 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:23:57 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:23:57 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet6(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="5500000018007f5f00fe01b2a4a290930206040208000001028140003900090035", 0x21}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xffb8) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 02:23:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xffdbc494) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file1/file0\x00') clone(0x8000000002380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rename(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1/file0\x00') r3 = gettid() tkill(r3, 0x7) 02:23:57 executing program 5: syz_emit_ethernet(0x7e, &(0x7f0000001340)={@local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr=0xfffffffd, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x300, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89, 0x0, @remote, @multicast1, {[@timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}, @timestamp_addr={0x44, 0x24, 0x0, 0x1, 0x0, [{@broadcast}, {@remote}, {@local}, {@multicast1}]}, @ssrr={0x89, 0x3}, @rr={0x7, 0xb, 0x0, [@broadcast, @broadcast]}]}}}}}}}, 0x0) 02:23:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff38, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="4800000010000507000000090000009f00000000", @ANYRES32=r3, @ANYBLOB="0100000000000000280012000c00010076657468"], 0x48}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@loopback, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, r3}) 02:23:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="18020000f5fefedf00000000000009008500000041000000950000000000000067e8a2f14c96a47f0918283ac84da42af1d0880268ff3b5387ec35b5086d515847ab1246cb0310ffa805bcab7f7348cfd65a286f5f5d08dcdfcc0a61e9abb825276d851e903c9c336e7dd405009442de25a9abde0b9c118e8fba52892e8ad2618c5b38e34fdba3fd0ee92faa304587d7"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x1a0, 0xf00, 0x0, &(0x7f0000000280)="20cf4d411d520bdfae1c3821271c", 0x0, 0x34f}, 0x28) 02:23:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3e) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) recvmmsg(r1, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xfffffffffffffff8) dup2(r1, r2) setsockopt$sock_int(r2, 0x1, 0x2e, &(0x7f0000000000)=0x101, 0x4) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x14) [ 243.053486][ T8727] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 243.085669][ T8727] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 02:23:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x13e, &(0x7f0000000540)="f71559c89acbd61caef13ff7703cc78eab95f7374f1f3be594abe41d4dd62efc6d308bb84e211e48073e62cb06babfabd090607d9ea81b316aecf1aca14973384156de6c22c407829537d08802eec6e7f5a915d1f575f1bbc644d6d5f9ec0407a33d000000000000000000007a9f295c0a7abd39afede3cc2ee6d49ca4db8b3e94456b1944ce67da070ed92c1431dbdbee73b3a1490201eb8f65e1287e2c9c41fb67abf7f96c5c2fa06d548d9edf26ae354c4b11731cf137440bc0671fa022713cb741281035a47b219074a142a039ffe7e063ab840469d5017d2a9df02a272a052f441ab8a8e8b68849daa1d719f7f44c9d3743d840ba36a1cef7aee036c7a0fa13342ebdf2abeb0c9bc7dcff91bf8002a1e5ec6d94f78255fe600869c22e4d6dd8bb69290e232807e399dddb95be581a7bc389491be33227667e511348"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:23:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x145) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r4, 0xc058534f, &(0x7f0000000300)={{0xff}, 0x1, 0x3, 0x10001, {0x7, 0x3}, 0xc1, 0xffff}) ftruncate(r3, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) sendfile(r0, r3, 0x0, 0x80001d00c0d0) socket$unix(0x1, 0x2, 0x0) 02:23:58 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) 02:23:58 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:23:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x8000000002380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000900)=@mangle={'mangle\x00', 0x44, 0x6, 0x3d0, 0x0, 0x98, 0x0, 0x278, 0x98, 0x338, 0x338, 0x338, 0x338, 0x338, 0x6, 0x0, {[{{@ip={@broadcast, @multicast2, 0x0, 0x0, 'geneve1\x00', 'ip6gre0\x00', {}, {}, 0x11}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth1_macvtap\x00', 'veth0_to_bond\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}, {{@uncond, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@ipv4={[], [], @remote}}}}, {{@ip={@rand_addr, @multicast2, 0x0, 0x0, 'syzkaller0\x00', 'bond0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth1_virt_wifi\x00', 'batadv_slave_1\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "120a"}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x430) [ 243.580217][ T26] audit: type=1800 audit(1589682238.461:2): pid=8746 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=15754 res=0 02:23:58 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:23:58 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, 0x0, 0x0) [ 243.624412][ T8753] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING 02:23:58 executing program 3: syz_emit_ethernet(0x44a, &(0x7f0000000480)={@broadcast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a47000", 0x3f8, 0x3a, 0xff, @remote={0xfe, 0x80, [0x0, 0x60]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, [{0x0, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}, {0x0, 0x16, "84f0da52ef24571313968050378ee824f4dffba7feed320557f7671975afc9c545c5ea6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0fb1a5a643b4099519e31f3fd4457f0e6d586ad05e1"}, {0x0, 0x5a, "062bf7b5e0f2dbbdc849b90d4e80a0e3f7af088060d01a1cfcfad88ef4512c6ef5c0ead4b9cc87484b106a060a9899d50f595204418f51e914c88c29078a5457de6a262cadf02b071d88e61703f037caded0b315701274012fa532ddd69499074e1a2df196e0afcffda08fb3d82ab8160253a47d3efc3d7cead55c28610ae20f69aaced0a1a6ce815344cf8d0bc8a0dfcdd1e8cd7242601777ec653c2d4b704397dcb1350982afd017eaa630c840d71589499fd68239ae0c0aa2fc9b949d1a716d40a24f078e92e8c268ff726290944b5f3a3bea9559f2d2a51405fba224411ecc49544dea47917a98bf79c3bfeed70429abf70a52ecbda21c9bf0f6a70cd2c2c887391e4095ad22b437c60abf829447b47bd231ca2a98d9da7519a4bd28e803fa000fafc0dc453ed56cdf4356d7abcfec4eed0b94a4f78ce44a7177c6684026ba4f26a17e52e326c8bb7be5e2ea5780d7169d8f4ff62cb2b223f1d6221f62e0ee0244d86042560edd36853c464b23be536c65b87cd5ea60932ed90607b369ed2017f645afcb5cd07f6896a08473bd5dea2bfb52ac501a39c338ede985aa4a7755db876cbe4d944f3cce0079d2ad9ba8d17f01a614052aadbd4af0fd282f594dc4530ee49b6c9ae6d5d80a073e678594be2e2f0869baa2a58dd2d0f6a995fb706c4d1b618d57da1c2d8f55611f746105a947b4f6bb74dbdbffb1b3c1f2316f6a28a07f0145b1bf8345b6aa4e9d5a819497856792121219ea151c1f8e2f86356439bc5b87fe4cad68b6afa08687e6e751803865165eac0c34bdddae1bbe52f55d08cc4a0865f8df372635e8a26ac4ac9716a124ac4e83349f17b612e2b1893b5eaccecc7d812bb4f4fc6b313f57c2035a90f782a4a97b5f5309b6c5798d72b9187f3d411e84041e3671fe35e39fa1887846721c38d501b471990b919d2ad9ca9bc71157a843d75838c1aa4ff0dabd74284709f1f87f324ec4f56eacd70e6bb5e9c3ff719786c4d4284e4cfdc828e0465ca168d04de1"}]}}}}}}, 0x0) 02:23:58 executing program 5: syz_emit_ethernet(0x42e, &(0x7f0000000480)={@broadcast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a47000", 0x3f8, 0x3a, 0xff, @remote={0xfe, 0x80, [0x4]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, [{0x0, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}, {0x0, 0x16, "84f0da52ef24571313968050378ee824f4dffba7feed320557f7671975afc9c545c5ea6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0fb1a5a643b4099519e31f3fd4457f0e6d586ad05e1"}, {0x0, 0x5a, "062bf7b5e0f2dbbdc849b90d4e80a0e3f7af088060d01a1cfcfad88ef4512c6ef5c0ead4b9cc87484b106a060a9899d50f595204418f51e914c88c29078a5457de6a262cadf02b071d88e61703f037caded0b315701274012fa532ddd69499074e1a2df196e0afcffda08fb3d82ab8160253a47d3efc3d7cead55c28610ae20f69aaced0a1a6ce815344cf8d0bc8a0dfcdd1e8cd7242601777ec653c2d4b704397dcb1350982afd017eaa630c840d71589499fd68239ae0c0aa2fc9b949d1a716d40a24f078e92e8c268ff726290944b5f3a3bea9559f2d2a51405fba224411ecc49544dea47917a98bf79c3bfeed70429abf70a52ecbda21c9bf0f6a70cd2c2c887391e4095ad22b437c60abf829447b47bd231ca2a98d9da7519a4bd28e803fa000fafc0dc453ed56cdf4356d7abcfec4eed0b94a4f78ce44a7177c6684026ba4f26a17e52e326c8bb7be5e2ea5780d7169d8f4ff62cb2b223f1d6221f62e0ee0244d86042560edd36853c464b23be536c65b87cd5ea60932ed90607b369ed2017f645afcb5cd07f6896a08473bd5dea2bfb52ac501a39c338ede985aa4a7755db876cbe4d944f3cce0079d2ad9ba8d17f01a614052aadbd4af0fd282f594dc4530ee49b6c9ae6d5d80a073e678594be2e2f0869baa2a58dd2d0f6a995fb706c4d1b618d57da1c2d8f55611f746105a947b4f6bb74dbdbffb1b3c1f2316f6a28a07f0145b1bf8345b6aa4e9d5a819497856792121219ea151c1f8e2f86356439bc5b87fe4cad68b6afa08687e6e751803865165eac0c34bdddae1bbe52f55d08cc4a0865f8df372635e8a26ac4ac9716a124ac4e83349f17b612e2b1893b5eaccecc7d812bb4f4fc6b313f57c2035a90f782a4a97b5f5309b6c5798d72b9187f3d411e84041e3671fe35e39fa1887846721c38d501b471990b919d2ad9ca9bc71157a843d75838c1aa4ff0dabd74284709f1f87f324ec4f56eacd70e6bb5e9c3ff719786c4d4284e4cfdc828e0465ca168d04de1"}]}}}}}}, 0x0) 02:23:58 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:23:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x148, &(0x7f0000000540)="f71559c89acbd61caef13ff7703cc78eab95f7374f1f3be594abe41d4dd62efc6d308bb84e211e48073e62cb06babfabd090607d9ea81b316aecf1aca14973384156de6c22c407829537d08802eec6e7f5a915d1f575f1bbc644d6d5f9ec0407a33d000000000000000000007a9f295c0a7abd39afede3cc2ee6d49ca4db8b3e94456b1944ce67da070ed92c1431dbdbee73b3a1490201eb8f65e1287e2c9c41fb67abf7f96c5c2fa06d548d9edf26ae354c4b11731cf137440bc0671fa022713cb741281035a47b219074a142a039ffe7e063ab840469d5017d2a9df02a272a052f441ab8a8e8b68849daa1d719f7f44c9d3743d840ba36a1cef7aee036c7a0fa13342ebdf2abeb0c9bc7dcff91bf8002a1e5ec6d94f78255fe600869c22e4d6dd8bb69290e232807e399dddb95be581a7bc389491be33227667e51134883937c2d0d003f29d59b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 243.779385][ T8762] IPv6: addrconf: prefix option has invalid lifetime [ 243.794587][ T8762] IPv6: addrconf: prefix option has invalid lifetime 02:23:58 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) [ 243.955345][ T8774] IPv6: addrconf: prefix option has invalid lifetime [ 243.965064][ T8774] IPv6: addrconf: prefix option has invalid lifetime 02:24:01 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x145) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r4, 0xc058534f, &(0x7f0000000300)={{0xff}, 0x1, 0x3, 0x10001, {0x7, 0x3}, 0xc1, 0xffff}) ftruncate(r3, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) sendfile(r0, r3, 0x0, 0x80001d00c0d0) socket$unix(0x1, 0x2, 0x0) 02:24:01 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3e) recvmmsg(r1, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xfffffffffffffff8) dup2(r1, r2) setsockopt$sock_int(r2, 0x1, 0x2e, &(0x7f0000000000)=0x101, 0x4) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x14) 02:24:01 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x3800) open(0x0, 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x6609, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41fd", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:24:01 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:01 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:01 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:01 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:01 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) [ 246.758970][ T26] audit: type=1800 audit(1589682241.641:3): pid=8809 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=15789 res=0 02:24:01 executing program 5: 02:24:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x142, &(0x7f0000000540)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:24:01 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:01 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:01 executing program 3: 02:24:01 executing program 3: 02:24:04 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:04 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 02:24:04 executing program 5: 02:24:04 executing program 3: 02:24:04 executing program 5: 02:24:04 executing program 3: 02:24:04 executing program 4: 02:24:04 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:04 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:04 executing program 3: 02:24:04 executing program 5: 02:24:04 executing program 0: 02:24:04 executing program 5: 02:24:04 executing program 3: 02:24:04 executing program 0: 02:24:04 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:04 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:05 executing program 4: 02:24:05 executing program 3: 02:24:05 executing program 5: 02:24:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd65660f382201c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d6830f01caed", 0x14}], 0x1, 0x0, 0x0, 0x25a) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xec100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x80000000000000}, 0xb20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xd8d0668c81aa2fa3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:24:05 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:05 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:05 executing program 4: 02:24:05 executing program 3: 02:24:05 executing program 5: 02:24:05 executing program 4: 02:24:05 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:05 executing program 5: 02:24:05 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:05 executing program 3: 02:24:05 executing program 5: 02:24:05 executing program 0: 02:24:05 executing program 4: 02:24:05 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:05 executing program 3: 02:24:05 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)='Z', 0x1) 02:24:05 executing program 5: 02:24:06 executing program 5: 02:24:06 executing program 3: 02:24:06 executing program 4: 02:24:06 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:06 executing program 0: 02:24:06 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)='Z', 0x1) 02:24:06 executing program 5: 02:24:06 executing program 3: 02:24:06 executing program 4: 02:24:06 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:06 executing program 0: 02:24:06 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)='Z', 0x1) 02:24:06 executing program 5: 02:24:06 executing program 4: 02:24:06 executing program 3: 02:24:06 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:06 executing program 5: 02:24:06 executing program 0: 02:24:06 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:06 executing program 4: 02:24:06 executing program 3: 02:24:06 executing program 5: 02:24:06 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:06 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:06 executing program 0: 02:24:06 executing program 3: 02:24:06 executing program 4: 02:24:06 executing program 5: 02:24:06 executing program 0: 02:24:06 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:06 executing program 4: 02:24:06 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:06 executing program 3: 02:24:06 executing program 5: 02:24:07 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:07 executing program 0: 02:24:07 executing program 3: 02:24:07 executing program 4: 02:24:07 executing program 5: 02:24:07 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:07 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:07 executing program 0: 02:24:07 executing program 3: 02:24:07 executing program 5: 02:24:07 executing program 4: 02:24:07 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:07 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:07 executing program 0: 02:24:07 executing program 5: 02:24:07 executing program 3: 02:24:07 executing program 4: 02:24:07 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:07 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:07 executing program 0: 02:24:07 executing program 5: 02:24:07 executing program 4: 02:24:07 executing program 3: 02:24:07 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:07 executing program 0: 02:24:07 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:07 executing program 3: 02:24:07 executing program 5: 02:24:07 executing program 4: 02:24:07 executing program 0: 02:24:07 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:07 executing program 5: 02:24:07 executing program 3: 02:24:07 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:07 executing program 4: 02:24:08 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:08 executing program 5: 02:24:08 executing program 0: 02:24:08 executing program 4: 02:24:08 executing program 3: 02:24:08 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:08 executing program 4: 02:24:08 executing program 5: 02:24:08 executing program 0: 02:24:08 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:08 executing program 3: 02:24:08 executing program 4: 02:24:08 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:08 executing program 5: 02:24:08 executing program 0: 02:24:08 executing program 3: 02:24:08 executing program 5: 02:24:08 executing program 4: 02:24:08 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:08 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:08 executing program 0: 02:24:08 executing program 5: 02:24:08 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:08 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:08 executing program 4: 02:24:08 executing program 3: 02:24:08 executing program 0: 02:24:08 executing program 5: 02:24:08 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:08 executing program 3: 02:24:08 executing program 4: 02:24:08 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:08 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:08 executing program 0: 02:24:08 executing program 5: 02:24:08 executing program 3: 02:24:09 executing program 4: 02:24:09 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:09 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) 02:24:09 executing program 0: 02:24:09 executing program 5: 02:24:09 executing program 3: 02:24:09 executing program 4: 02:24:09 executing program 5: 02:24:09 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:09 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xc000, 0x0, 0x0) 02:24:09 executing program 0: 02:24:09 executing program 3: 02:24:09 executing program 4: 02:24:09 executing program 5: 02:24:09 executing program 0: 02:24:09 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xc000, 0x0, 0x0) 02:24:09 executing program 3: 02:24:09 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:09 executing program 4: 02:24:09 executing program 0: 02:24:09 executing program 5: 02:24:09 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xc000, 0x0, 0x0) 02:24:09 executing program 4: 02:24:09 executing program 3: 02:24:09 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:09 executing program 0: syz_emit_ethernet(0x42e, &(0x7f0000000480)={@broadcast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a47000", 0x3f8, 0x3a, 0xff, @remote={0xfe, 0x80, [0x4]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x1, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}, {0x0, 0x16, "84f0da52ef24571313968050378ee824f4dffba7feed320557f7671975afc9c545c5ea6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0fb1a5a643b4099519e31f3fd4457f0e6d586ad05e1"}, {0x0, 0x5a, "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"}]}}}}}}, 0x0) 02:24:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @remote}}, 0x1c) 02:24:09 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000180)=0xbd0, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 02:24:09 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0xc000, 0x0, 0x0) 02:24:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) ioctl$SIOCSIFHWADDR(r1, 0x8937, &(0x7f0000000000)={'veth0_vlan\x00', @random="01003a1e2410"}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)) 02:24:09 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:10 executing program 0: [ 255.141312][ T9115] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:24:10 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0xc000, 0x0, 0x0) 02:24:10 executing program 4: 02:24:10 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:10 executing program 5: io_setup(0x8001, &(0x7f0000000080)=0x0) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) io_submit(r0, 0x43, &(0x7f0000000540)) 02:24:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) ioctl$SIOCSIFHWADDR(r1, 0x8937, &(0x7f0000000000)={'veth0_vlan\x00', @random="01003a1e2410"}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)) 02:24:10 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0xc000, 0x0, 0x0) 02:24:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x10000015, 0x5, 0x0, 0x0, {0x1}, [@typed={0x14, 0x2, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, 0x28}}, 0x0) 02:24:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) ioctl$SIOCSIFHWADDR(r1, 0x8937, &(0x7f0000000000)={'veth0_vlan\x00', @random="01003a1e2410"}) 02:24:10 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) eventfd2(0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 02:24:10 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0x1, 0x0, 0x0, 0x0) 02:24:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1f) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) 02:24:10 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 02:24:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) semctl$GETNCNT(0x0, 0x4, 0xe, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) 02:24:10 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:10 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0x1, 0x0, 0x0, 0x0) 02:24:10 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0xf48, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 02:24:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) semctl$GETNCNT(0x0, 0x4, 0xe, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) 02:24:10 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000200)="4020ed2b259925f8029b533eb3a3a302ff7b", 0x12, 0x198000000}, {0x0, 0x0, 0x6639956a}], 0x0, 0x0) write$P9_RWALK(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="4a0000006f020005000804000000080000000000a8"], 0x4a) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 02:24:10 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:10 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0x1, 0x0, 0x0, 0x0) 02:24:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8001}, 0x24004881) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f00000000c0)={0x3, 0x418, [{0x6d74}, {0x3}, {0xffffffff}]}) 02:24:11 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ifreq(r0, 0x8943, &(0x7f0000000100)={'veth1_to_team\x00', @ifru_mtu}) 02:24:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x10, 0x80002, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 02:24:11 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:11 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0x1, 0x4) sendto$inet6(r0, 0x0, 0xffffffffffffff85, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @remote}, 0x1c) 02:24:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) r2 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$chown(0x4, r2, r1, 0x0) [ 256.799320][ T9196] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:24:11 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000006c0)=""/141, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010046) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) [ 256.918718][ T9207] dns_resolver: Unsupported server list version (0) 02:24:11 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000200)="4020ed2b259925f8029b533eb3a3a302ff7b", 0x12, 0x198000000}, {0x0, 0x0, 0x6639956a}], 0x0, 0x0) write$P9_RWALK(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="4a0000006f020005000804000000080000000000a8"], 0x4a) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 02:24:11 executing program 1: mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 256.973054][ T9210] dns_resolver: Unsupported server list version (0) 02:24:11 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0xc000, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c004c6f", @ANYRES16, @ANYBLOB="01002bbd70250a00000008003900ff00"/32], 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x20044040) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10800080}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x34, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8001}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xff}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) fcntl$setstatus(r0, 0x4, 0x4002) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x4}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1c}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) sendmsg$AUDIT_MAKE_EQUIV(r0, 0x0, 0x0) io_setup(0xb, &(0x7f0000000040)=0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7ffff000) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) open(0x0, 0x2e2480, 0x26) write$nbd(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="674477980100000003000400000000004f12fd4fd02e0bc684d7d11599dbf0763f807ebc8cef"], 0x32) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x81000200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000001) ptrace(0x10, 0x0) 02:24:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 02:24:12 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb) 02:24:12 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0x1, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='mounts\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x400000000000010, 0x802, 0x0) sendfile(r3, r0, 0x0, 0xffffffff) 02:24:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x44004) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000200)="4020ed2b259925f8029b533eb3a3a302ff7b", 0x12, 0x198000000}, {0x0, 0x0, 0x6639956a}], 0x0, 0x0) write$P9_RWALK(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="4a0000006f020005000804000000080000000000a88f493a73c88d740000000000040400001e00000000000000008004fa"], 0x4a) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 02:24:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f00000002c0)="66b9800000c00f320f01cb0f3066b9800000c00f326635000400000f300f06660f230466b8bf00c0fe0f23d80f21f86635400000000f23f80f20e00f22e026f30f6feb66b9a50b000066b8c008132166ba0fe1c8180f30262e0f001bf0ff0d", 0x5f}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffd4) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000)="158da1c938baa864add814fd4aaae75d51523d0dcfa2a0a63df94b1046b420c5fb91e0007dedf16e4586531dee8ec5ee3628fa7284ecdbfdb9b091f44769ba712ceab331eb560fcd79e0", 0x4a) 02:24:12 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0x1, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:12 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000b40)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, 0x1}, 0x90) [ 257.744924][ T9251] kvm: emulating exchange as write 02:24:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r0 = semget$private(0x0, 0x207, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 02:24:12 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x3}], 0x1, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 02:24:12 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0x1, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000000)='Z', 0x1) 02:24:12 executing program 0: r0 = inotify_init() r1 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)) 02:24:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) ioctl$SIOCSIFHWADDR(r1, 0x8937, &(0x7f0000000000)={'veth0_vlan\x00', @random="01003a1e2410"}) socketpair$unix(0x1, 0x0, 0x0, 0x0) 02:24:12 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)='Z', 0x1) 02:24:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$getownex(r3, 0x10, 0x0) sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={0x0, 0x40}, 0x1, 0x0, 0x0, 0x8001}, 0x24004881) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext, 0x218}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:24:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'batadv_slave_0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='\a']}) 02:24:13 executing program 3: msgrcv(0x0, 0x0, 0x0, 0x8000000000000000, 0x0) 02:24:13 executing program 0: syz_emit_ethernet(0x42e, &(0x7f0000000480)={@broadcast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a47000", 0x3f8, 0x3a, 0xff, @remote={0xfe, 0x80, [0x4]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}, {0x0, 0x16, "84f0da52ef24571313968050378ee824f4dffba7feed320557f7671975afc9c545c5ea6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0fb1a5a643b4099519e31f3fd4457f0e6d586ad05e1"}, {0x0, 0x5a, "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"}]}}}}}}, 0x0) 02:24:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f00000013c0)=[{&(0x7f00000000c0)="16c0cb1c6d64b912491d9b55c628fed249f0eee5", 0x14}, {0x0}], 0x2, 0x0, 0x1e8}, 0x10) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, 0x0}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x218}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:24:13 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)='Z', 0x1) [ 258.362724][ T9300] kvm [9299]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000003c data 0x91 [ 258.386375][ T9307] IPv6: addrconf: prefix option has invalid lifetime [ 258.415155][ T9307] IPv6: addrconf: prefix option has invalid lifetime [ 258.428345][ T9300] kvm [9299]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000039 data 0x8a 02:24:13 executing program 0: syz_emit_ethernet(0x76, &(0x7f0000000140)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="8100000067a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x40, 0x3a, 0x0, @initdev={0xfe, 0x88, [0x8, 0x0, 0x0, 0x0, 0xd], 0x0, 0x0}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "7f00e6", 0x0, 0x0, 0x0, @private0, @dev, [@routing={0x3a}], "8005000000000002"}}}}}}}, 0x0) 02:24:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x51}]) 02:24:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000200)="4020ed2b259925f8029b533eb3a3a302ff7b", 0x12, 0x198000000}, {0x0, 0x0, 0x6639956a}], 0x0, 0x0) write$P9_RWALK(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="4a0000006f020005000804000000080000000000a88f493a73c88d7400"], 0x4a) umount2(&(0x7f0000000540)='./file0\x00', 0x0) [ 258.475557][ T9300] kvm [9299]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000056 data 0x7b 02:24:13 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x3}], 0x1, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') preadv(r2, &(0x7f00000017c0), 0x33d, 0x4000) [ 258.544785][ T9300] kvm [9299]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000007f data 0x54 02:24:13 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)='Z', 0x1) [ 258.594606][ T9300] kvm [9299]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000002a data 0x77 02:24:13 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000200)="4020ed2b259925f8029b533eb3a3a302ff7bba1d6d7012bfbb86", 0x1a, 0x198000000}], 0x0, 0x0) write$P9_RWALK(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="4a0000006f020005000804000000080000000000a88f493a73c88d740000000000040400001e00000000000000"], 0x4a) umount2(&(0x7f0000000540)='./file0\x00', 0x0) [ 258.655751][ T9300] kvm [9299]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000037 data 0xc4 [ 258.763924][ T9300] kvm [9299]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000064 data 0x69 [ 258.788722][ T9300] kvm [9299]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000028 data 0x3b [ 258.799053][ T9300] kvm [9299]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000001c data 0xbb [ 258.810563][ T9300] kvm [9299]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000030 data 0xdd 02:24:13 executing program 3: open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x403000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb) 02:24:13 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)='G', 0xffffffffffffff15, 0xc000, 0x0, 0x0) write(r0, 0x0, 0x0) 02:24:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, 0x0}, 0x44004) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000200)="4020ed2b259925f8029b533eb3a3a3", 0xf, 0x198000000}, {0x0, 0x0, 0x6639956a}], 0x0, 0x0) write$P9_RWALK(r1, &(0x7f0000000400)=ANY=[], 0x4a) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 02:24:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) ioctl$SIOCSIFHWADDR(r1, 0x8937, &(0x7f0000000000)={'veth0_vlan\x00', @random="01003a1e2410"}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0) 02:24:14 executing program 3: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0xb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) wait4(0x0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 02:24:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:24:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:24:14 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x0, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/150, 0x96}], 0x1) 02:24:14 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000200)="4020ed2b259925f8029b533eb3a3a302ff7bba1d6d7012bfbb86", 0x1a, 0x198000000}], 0x0, 0x0) write$P9_RWALK(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="4a0000006f020005000804000000080000000000a88f493a73c88d740000000000040400001e00000000000000"], 0x4a) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 02:24:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000340)={0x56, 0x6, 0xfffffff9, "5333378c7cd23944c1dec92764a4b6cc01f33145e079e6398b5db28403b0014951321d6072d80c1770ddc6e808e122ce36da95f2e0d8b778505dec61b2206b55538735baf1f28a4c014462b8cc4baef8ef2923ec17a8"}) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) write$binfmt_aout(r2, &(0x7f0000003680)=ANY=[], 0xe70) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x503, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x20002, 0x0) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f00000002c0)={0x1ff, 0x2, 0x4, 0x80000000, 0x8, {r4, r5/1000+10000}, {0x5, 0x1, 0x4, 0x0, 0x4, 0x5, "13bbd6a5"}, 0x4e, 0x1, @fd=r6, 0x5}) 02:24:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000240)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f00000016c0)=""/4097, 0x1001}, &(0x7f0000001600)=[{&(0x7f00000000c0)=""/71, 0x47}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f0000001300)=""/235, 0xeb}, {&(0x7f0000001400)=""/96, 0x60}, {&(0x7f0000000180)=""/17, 0x11}, {&(0x7f0000001480)=""/111, 0x6f}, {&(0x7f0000001500)=""/68, 0x44}, {&(0x7f0000000200)=""/63, 0x3f}, {&(0x7f0000001580)=""/107, 0x6b}], 0x9}}], 0x48}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) read$dsp(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000006c0)={0xa30000, 0x8, 0x8000, 0xffffffffffffffff, 0x0, &(0x7f0000000680)={0x9909e3, 0x0, [], @ptr}}) 02:24:14 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000340)={0x62, 0x6, 0x0, "5333378c7cd23944c1dec92764a4b6cc01f33145e079e6398b5db28403b0014951321d6072d80c1770ddc6e808e122ce36da95f2e0d8b778505dec61b2206b55538735baf1f28a4c014462b8cc4baef8ef2923ec17a82f66a3c3a74b2404eadac7fc"}) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) write$binfmt_aout(r3, &(0x7f0000003680)=ANY=[], 0xe70) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x20002, 0x0) ioctl$VIDIOC_PREPARE_BUF(r4, 0xc058565d, &(0x7f00000002c0)={0x1ff, 0x2, 0x4, 0x80000000, 0x8, {r5, r6/1000+10000}, {0x5, 0x1, 0x4, 0x0, 0x4, 0x5, "13bbd6a5"}, 0x4e, 0x1, @fd=r7, 0x5}) 02:24:14 executing program 2: perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0xa500, 0x4, 0x1, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x2000007) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2}, 0xd8) recvmsg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) setresgid(0x0, r2, 0x0) r3 = getpid() sched_setattr(r3, 0x0, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001940)=ANY=[@ANYRES64=r1, @ANYRESHEX, @ANYRESDEC, @ANYBLOB], 0x39a03d2e) 02:24:14 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@creator={'creator', 0x3d, "fd004001"}}]}) 02:24:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000340)={0x62, 0x6, 0xfffffff9, "5333378c7cd23944c1dec92764a4b6cc01f33145e079e6398b5db28403b0014951321d6072d80c1770ddc6e808e122ce36da95f2e0d8b778505dec61b2206b55538735baf1f28a4c014462b8cc4baef8ef2923ec17a82f66a3c3a74b2404eadac7fc"}) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) write$binfmt_aout(r3, &(0x7f0000003680)=ANY=[], 0xe70) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x503, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x20002, 0x0) ioctl$VIDIOC_PREPARE_BUF(r4, 0xc058565d, &(0x7f00000002c0)={0x1ff, 0x2, 0x4, 0x80000000, 0x8, {r5, r6/1000+10000}, {0x5, 0x1, 0x4, 0x0, 0x4, 0x5, "13bbd6a5"}, 0x4e, 0x1, @fd=r7, 0x5}) [ 259.997990][ T9414] hfsplus: creator requires a 4 character value [ 260.006748][ T9414] hfsplus: unable to parse mount options [ 260.076578][ T9424] hfsplus: creator requires a 4 character value [ 260.092998][ T9424] hfsplus: unable to parse mount options 02:24:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000140)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x20002, 0x0) 02:24:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x1000000, &(0x7f0000000080)=[{&(0x7f0000000180)="2e0000001d008103e00f80ecdb4cb9d90163190405000f0003017cfb12000100ac14141840d819a9060015000000", 0x2e}], 0x1}, 0x0) 02:24:15 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) 02:24:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000340)={0x4a, 0x6, 0xfffffff9, "5333378c7cd23944c1dec92764a4b6cc01f33145e079e6398b5db28403b0014951321d6072d80c1770ddc6e808e122ce36da95f2e0d8b778505dec61b2206b55538735baf1f28a4c0144"}) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) write$binfmt_aout(r3, &(0x7f0000003680)=ANY=[], 0xe70) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x503, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x20002, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xcb) ioctl$VIDIOC_PREPARE_BUF(r4, 0xc058565d, &(0x7f00000002c0)={0x1ff, 0x2, 0x4, 0x80000000, 0x8, {r5, r6/1000+10000}, {0x5, 0x1, 0x4, 0x0, 0x4, 0x5, "13bbd6a5"}, 0x4e, 0x1, @fd=r7, 0x5}) 02:24:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) open(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000100)=0x5, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 02:24:15 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) read(r0, &(0x7f0000001b80)=""/4096, 0xdc6) read(r0, &(0x7f0000000a80)=""/213, 0xfffffeb0) dup(0xffffffffffffffff) 02:24:15 executing program 1: io_setup(0x3, &(0x7f00000001c0)=0x0) r1 = socket(0x23, 0x805, 0x0) io_submit(r0, 0x2, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0x4}]) 02:24:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}}, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}, 0x1, 0xc00000000000000}, 0x0) 02:24:15 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8924, &(0x7f0000000040)={'nr0\x00', 0x0}) 02:24:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) write$binfmt_aout(r3, &(0x7f0000003680)=ANY=[], 0xe70) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x503, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x20002, 0x0) ioctl$VIDIOC_PREPARE_BUF(r4, 0xc058565d, &(0x7f00000002c0)={0x1ff, 0x2, 0x4, 0x80000000, 0x8, {r5, r6/1000+10000}, {0x5, 0x1, 0x4, 0x0, 0x4, 0x5, "13bbd6a5"}, 0x4e, 0x1, @fd=r7, 0x5}) 02:24:15 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) [ 260.972322][ T9471] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 02:24:15 executing program 1: perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0xa500, 0x4, 0x1, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x2000007) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2}, 0xd8) recvmsg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001940)=ANY=[@ANYRES64, @ANYRESHEX, @ANYRESDEC, @ANYBLOB="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"], 0x39a03d2e) [ 261.081913][ T9476] batman_adv: batadv0: Adding interface: ipvlan2 02:24:16 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) io_setup(0x3, &(0x7f00000001c0)=0x0) r2 = socket(0x23, 0x805, 0x0) io_submit(r1, 0x2, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r2, 0x0, 0x4}]) 02:24:16 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) [ 261.135332][ T9476] batman_adv: batadv0: The MTU of interface ipvlan2 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 02:24:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) recvfrom$inet(r0, &(0x7f00000001c0)=""/142, 0x8e, 0x40010121, &(0x7f0000000280)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) socketpair(0x1f, 0xa, 0xedef, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x0, 0x4000000000000800, 0x1}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000100), &(0x7f0000000040)}, 0x20) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000300)="2ace2d333a0da53ef48e369c97cfc2d96d667f0f8fe60b34bba6ee40ddd827c5440a7785f9ea5abdc75980f8467f42419f1373107c833ebcbdd7f5635c5991f459e2b9e13c0e0b4106155d72e0895d583aa6d9f132c1a1c736a8f089829ebd0acacb7b67e283c0537cf98cbac9bad601bac384cf40dd1ac6c00882c2fcf46c1c2f78dd03294a33ca2b8f150cc748ee69f3b0426eb47204a01b4ea5", 0x9b, 0x0, 0x0, 0x0) rmdir(0x0) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) [ 261.248924][ T9476] batman_adv: batadv0: Not using interface ipvlan2 (retrying later): interface not active 02:24:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a0001007065646974000000240e03"], 0xe50}}, 0x0) [ 261.397469][ T9471] batman_adv: batadv0: Removing interface: ipvlan2 02:24:16 executing program 0: perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0xa500, 0x4, 0x1, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x2000007) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2}, 0xd8) recvmsg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) setresgid(0x0, r1, 0x0) r2 = getpid() sched_setattr(r2, 0x0, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001940)=ANY=[@ANYBLOB], 0x39a03d2e) 02:24:16 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) io_setup(0x3, &(0x7f00000001c0)=0x0) r2 = socket(0x23, 0x805, 0x0) io_submit(r1, 0x2, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r2, 0x0, 0x4}]) [ 261.789301][ T9506] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 261.806268][ T9506] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 261.849724][ T9476] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 02:24:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a0001007065646974000000240e03"], 0xe50}}, 0x0) [ 262.173377][ T9527] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 262.202468][ T9527] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:24:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}}, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}, 0x1, 0xc00000000000000}, 0x0) 02:24:17 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) chdir(&(0x7f0000000440)='./file0\x00') pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x11, 0x0, 0xf643) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x400141442, 0x0) write$P9_RMKNOD(r1, &(0x7f0000000100)={0x14}, 0x14) 02:24:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x34, 0x3e9, 0x0, 0x0, 0x0, {0x26}}, 0x34}}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0xfffffffffffffdbc}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:24:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000040, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x80800) r3 = socket$inet6(0xa, 0x80002, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x11, 0x3, 0x0) bind(r6, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800058110308d9123127ecce6616f3f6db1c00010000000000210049740000000000000006ad8e5ecc326d3a09ffc200000000000000000000e000"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r8 = socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8914, &(0x7f0000000000)={'lo\x00'}) sendmsg$NFT_MSG_GETOBJ_RESET(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x2c}}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000000)={'lo\x00', r7}) sendto$inet6(r2, &(0x7f00000000c0), 0xffffffeb, 0x0, 0x0, 0xfffffffffffffdf0) 02:24:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a0001007065646974000000240e03"], 0xe50}}, 0x0) 02:24:17 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="60000000260007dd"], 0x60}}, 0x0) r0 = socket(0x1000000010, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 262.595005][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 262.608194][ T9542] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 262.631519][ T9542] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:24:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$inet_tcp_int(r5, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r5, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdff, 0x40f087}, 0x14) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x140006, 0x0) 02:24:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a0001007065646974000000240e03"], 0xe50}}, 0x0) [ 262.671476][ T9544] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 262.704995][ T9549] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 262.939459][ T9553] batman_adv: batadv0: Adding interface: ipvlan2 [ 262.963881][ T9553] batman_adv: batadv0: The MTU of interface ipvlan2 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 263.050122][ T9553] batman_adv: batadv0: Not using interface ipvlan2 (retrying later): interface not active [ 263.331427][ T9549] batman_adv: batadv0: Removing interface: ipvlan2 [ 263.482712][ T9562] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 263.502467][ T9562] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 263.542324][ T9569] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 02:24:18 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a0001007065646974000000240e03"], 0xe50}}, 0x0) 02:24:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr\x00') getdents(r2, &(0x7f0000000000)=""/31, 0x1f) getdents64(r2, &(0x7f0000001100)=""/4082, 0xff2) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000140)={0x0, 0x0, [], 0xd}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x200000003, 0x84) bind$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000005c0)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b000000050000001803000000000000a8000000e80100000000000040010000800200008002000080020000800200008002000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f1ffffffffffffff000000000000007000a800000000000000000000000000000000000000000038004e45544d41500000000000000000000000000000000000ab1a00000000000100000011000000ac1414aaffffffff00000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000000000010000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000a800000000000000000000000000000000000000000038004e45544d41500000000000000000000000000000000000000000000000000100000009000000ac1e001fe00000020000000000000000e000000100000000000000000000000069703667726530000000000000000000766574683100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000003f00000028004e46515545554500000000000000000000000000000000000000000000030000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) splice(r3, 0x0, r5, 0x0, 0x19404, 0x0) 02:24:18 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1f) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) 02:24:18 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a0001007065646974000000240e03"], 0xe50}}, 0x0) [ 263.831438][ T9589] x_tables: duplicate underflow at hook 1 02:24:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}}, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}, 0x1, 0xc00000000000000}, 0x0) 02:24:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@uid={'uid'}}]}) [ 264.060017][ T9598] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 264.144437][ T9602] batman_adv: batadv0: Adding interface: ipvlan2 [ 264.158990][ T9602] batman_adv: batadv0: The MTU of interface ipvlan2 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 264.197115][ T9602] batman_adv: batadv0: Not using interface ipvlan2 (retrying later): interface not active [ 264.246946][ T9598] batman_adv: batadv0: Removing interface: ipvlan2 02:24:20 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280), 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x128, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x7, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x12000) socket(0x0, 0x0, 0x0) 02:24:20 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a0001007065646974000000240e03"], 0xe50}}, 0x0) 02:24:20 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r2, 0x0, r5) dup3(r1, r6, 0x0) close(r0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:20 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) getdents64(r0, &(0x7f0000000100)=""/232, 0xe8) 02:24:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004105) 02:24:20 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) 02:24:20 executing program 2: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a0001007065646974000000240e03"], 0xe50}}, 0x0) 02:24:20 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) 02:24:20 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r2, 0x0, r5) dup3(r1, r6, 0x0) close(r0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:20 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) getdents64(r0, &(0x7f0000000100)=""/232, 0xe8) 02:24:20 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r2, 0x0, r5) dup3(r1, r6, 0x0) close(r0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:20 executing program 2: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a0001007065646974000000240e03"], 0xe50}}, 0x0) 02:24:21 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 02:24:21 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r2, 0x0, r5) dup3(r1, r6, 0x0) close(r0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:21 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) getdents64(r0, &(0x7f0000000100)=""/232, 0xe8) 02:24:21 executing program 2: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a0001007065646974000000240e03"], 0xe50}}, 0x0) [ 266.361454][ T9661] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 266.361486][ T9661] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 266.361496][ T9661] EXT4-fs (loop5): group descriptors corrupted! 02:24:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020b000102"], 0x10}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="0212000002"], 0x10}}, 0x0) recvmmsg(r2, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) close(r2) 02:24:21 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 02:24:21 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r1, 0x0, r4) dup3(r0, r5, 0x0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 02:24:21 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) getdents64(r0, &(0x7f0000000100)=""/232, 0xe8) 02:24:21 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) getdents64(r0, &(0x7f0000000100)=""/232, 0xe8) 02:24:21 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 02:24:21 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r1, 0x0, r4) dup3(r0, r5, 0x0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) [ 267.031431][ T9686] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 267.067295][ T9686] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! 02:24:22 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) getdents64(r0, &(0x7f0000000100)=""/232, 0xe8) [ 267.103374][ T9686] EXT4-fs (loop5): group descriptors corrupted! 02:24:22 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r1, 0x0, r4) dup3(r0, r5, 0x0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 02:24:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x1) 02:24:22 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 02:24:22 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:22 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r1, 0x0, r4) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:22 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) getdents64(r0, &(0x7f0000000100)=""/232, 0xe8) 02:24:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 02:24:22 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) [ 267.580125][ T9711] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 02:24:22 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r1, 0x0, r4) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:22 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) [ 267.679018][ T9711] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! 02:24:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 02:24:22 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) getdents64(r0, &(0x7f0000000100)=""/232, 0xe8) [ 267.719280][ T9711] EXT4-fs (loop5): group descriptors corrupted! 02:24:22 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(0xffffffffffffffff, &(0x7f00000003c0)=""/199, 0x114) 02:24:23 executing program 4: 02:24:23 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r1, 0x0, r4) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 02:24:23 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 02:24:23 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:23 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(0xffffffffffffffff, &(0x7f00000003c0)=""/199, 0x114) 02:24:23 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(0xffffffffffffffff, &(0x7f00000003c0)=""/199, 0x114) 02:24:23 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0xe50}}, 0x0) 02:24:23 executing program 4: [ 268.538551][ T9754] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 02:24:23 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) dup3(r1, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) [ 268.614668][ T9754] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! 02:24:23 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) [ 268.664889][ T9754] EXT4-fs (loop5): group descriptors corrupted! 02:24:23 executing program 4: 02:24:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0xe50}}, 0x0) 02:24:23 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 02:24:23 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) dup3(r1, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:23 executing program 4: 02:24:23 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0xe50}}, 0x0) 02:24:23 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:23 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) dup3(r1, 0xffffffffffffffff, 0x0) close(r0) vmsplice(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:23 executing program 4: 02:24:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[], 0xe50}}, 0x0) 02:24:24 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/214, 0xd6) [ 269.155671][ T9784] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks) 02:24:24 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:24 executing program 4: 02:24:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 02:24:24 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) dup3(r1, r5, 0x0) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:24 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/214, 0xd6) 02:24:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[], 0xe50}}, 0x0) 02:24:24 executing program 4: 02:24:24 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) dup3(r1, r5, 0x0) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:24 executing program 0: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[], 0xe50}}, 0x0) 02:24:24 executing program 4: 02:24:24 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/214, 0xd6) 02:24:24 executing program 4: [ 269.597422][ T9808] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks) 02:24:24 executing program 4: 02:24:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 02:24:24 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) dup3(r1, r5, 0x0) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0xe50}}, 0x0) 02:24:24 executing program 0: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:24 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:24 executing program 4: 02:24:24 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r2, 0x0, r4) dup3(r1, r5, 0x0) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0xe50}}, 0x0) 02:24:24 executing program 0: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:24 executing program 4: [ 270.018877][ T9835] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks) 02:24:24 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0xe50}}, 0x0) 02:24:25 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 02:24:25 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r2, 0x0, r4) dup3(r1, r5, 0x0) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:25 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:25 executing program 4: 02:24:25 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:25 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r2, 0x0, r4) dup3(r1, r5, 0x0) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e"], 0xe50}}, 0x0) 02:24:25 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:25 executing program 4: [ 270.415195][ T9861] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks) 02:24:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e"], 0xe50}}, 0x0) 02:24:25 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 02:24:25 executing program 1: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:25 executing program 4: 02:24:25 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:25 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) dup3(r1, r4, 0x0) close(r0) vmsplice(r4, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:25 executing program 4: 02:24:25 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e"], 0xe50}}, 0x0) 02:24:25 executing program 1: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:25 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) dup3(r1, r4, 0x0) close(r0) vmsplice(r4, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) [ 270.780698][ T9884] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks) 02:24:25 executing program 4: 02:24:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a00010070"], 0xe50}}, 0x0) 02:24:25 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 02:24:25 executing program 1: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:25 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:25 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) dup3(r1, r4, 0x0) close(r0) vmsplice(r4, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:26 executing program 4: [ 271.096508][ T9909] netlink: 3624 bytes leftover after parsing attributes in process `syz-executor.2'. 02:24:26 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:26 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a00010070"], 0xe50}}, 0x0) 02:24:26 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r2, 0x0, r4) dup3(r1, r5, 0x0) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:26 executing program 4: [ 271.263003][ T9911] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks) 02:24:26 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) [ 271.329202][ T9921] netlink: 3624 bytes leftover after parsing attributes in process `syz-executor.2'. 02:24:26 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:26 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 02:24:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a00010070"], 0xe50}}, 0x0) 02:24:26 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:26 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r2, 0x0, r4) dup3(r1, r5, 0x0) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:26 executing program 4: [ 271.557634][ T9935] netlink: 3624 bytes leftover after parsing attributes in process `syz-executor.2'. 02:24:26 executing program 4: 02:24:26 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:26 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r2, 0x0, r4) dup3(r1, r5, 0x0) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) [ 271.684550][ T9933] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks) 02:24:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a000100706564697400"], 0xe50}}, 0x0) 02:24:26 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:26 executing program 4: 02:24:26 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 271.854895][ T9954] netlink: 3624 bytes leftover after parsing attributes in process `syz-executor.2'. 02:24:26 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:26 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:26 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) dup3(r1, r5, 0x0) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:26 executing program 4: 02:24:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a000100706564697400"], 0xe50}}, 0x0) 02:24:27 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) [ 272.158064][ T9971] netlink: 3624 bytes leftover after parsing attributes in process `syz-executor.2'. 02:24:27 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:27 executing program 4: [ 272.223459][ T9963] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks) 02:24:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a000100706564697400"], 0xe50}}, 0x0) 02:24:27 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) dup3(r1, r5, 0x0) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:27 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='veth0_to_bond\x00', 0x10) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 02:24:27 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 02:24:27 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) [ 272.421287][ T9983] netlink: 3624 bytes leftover after parsing attributes in process `syz-executor.2'. 02:24:27 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a000100706564697400000024"], 0xe50}}, 0x0) 02:24:27 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) dup3(r1, r5, 0x0) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:27 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) [ 272.674763][T10001] netlink: 3588 bytes leftover after parsing attributes in process `syz-executor.2'. 02:24:27 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) [ 272.719489][ T9993] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks) 02:24:27 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a000100706564697400000024"], 0xe50}}, 0x0) 02:24:27 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r0, 0x0, r3) dup3(0xffffffffffffffff, r4, 0x0) close(0xffffffffffffffff) vmsplice(r4, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:27 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 272.902296][T10015] netlink: 3588 bytes leftover after parsing attributes in process `syz-executor.2'. 02:24:28 executing program 4: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) dup2(r1, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1}}, 0x80) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r0, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) creat(&(0x7f00000000c0)='./file0\x00', 0x1dd) r2 = getpid() rt_tgsigqueueinfo(0x0, r2, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$getregset(0x4205, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1000000}) syz_open_procfs(r2, &(0x7f0000000000)='task\x00') sendmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}}, {{&(0x7f0000000a00)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000001e40)=[{0x0}, {&(0x7f0000000300)="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", 0x52}, {&(0x7f00000003c0)}, {&(0x7f0000000100)="d14b52a28d69bd1b16211bad3e00"/27, 0x8}, {0x0}], 0x5, &(0x7f0000000440)}}, {{&(0x7f0000002000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x8, @private=0xa010102}}, 0x80, 0x0}}], 0x1d, 0x4000001) 02:24:28 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r0, 0x0, r3) dup3(0xffffffffffffffff, r4, 0x0) close(0xffffffffffffffff) vmsplice(r4, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:28 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a000100706564697400000024"], 0xe50}}, 0x0) 02:24:28 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:28 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 02:24:28 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r0, 0x0, r3) dup3(0xffffffffffffffff, r4, 0x0) close(0xffffffffffffffff) vmsplice(r4, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) [ 273.418983][T10038] netlink: 3588 bytes leftover after parsing attributes in process `syz-executor.2'. 02:24:28 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:28 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:28 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r2, 0x0, r5) dup3(r1, r6, 0x0) close(r0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:28 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 02:24:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a0001007065646974000000240e"], 0xe50}}, 0x0) [ 273.707018][ T26] audit: type=1804 audit(1589682268.586:4): pid=10048 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir181945988/syzkaller.XLWhsW/84/file0" dev="sda1" ino=15972 res=1 [ 273.777330][T10060] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:24:28 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) 02:24:28 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r2, 0x0, r5) dup3(r1, r6, 0x0) close(r0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:28 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:28 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a0001007065646974000000240e"], 0xe50}}, 0x0) 02:24:28 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 02:24:28 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:29 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:29 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r2, 0x0, r5) dup3(r1, r6, 0x0) close(r0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500e0000310001000000000000000000000000003c0e0100380e01000a0001007065646974000000240e"], 0xe50}}, 0x0) 02:24:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8d}, 0x0) r0 = getpid() sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000340), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x383) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x5, 0x2) r5 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8400fffffffa) creat(&(0x7f0000000100)='./bus\x00', 0x108) 02:24:29 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 02:24:29 executing program 3: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r2, 0x0, r5) dup3(r1, r6, 0x0) close(r0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:29 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:24:29 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, &(0x7f00000003c0)=""/199, 0x114) 02:24:29 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) [ 274.409811][ T26] audit: type=1804 audit(1589682269.287:5): pid=10106 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir181945988/syzkaller.XLWhsW/86/bus" dev="sda1" ino=15930 res=1 02:24:29 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 02:24:29 executing program 3: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r2, 0x0, r5) dup3(r1, r6, 0x0) close(r0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) [ 274.556770][ T26] audit: type=1804 audit(1589682269.337:6): pid=10108 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir181945988/syzkaller.XLWhsW/86/bus" dev="sda1" ino=15930 res=1 02:24:29 executing program 3: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r2, 0x0, r5) dup3(r1, r6, 0x0) close(r0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:29 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(0xffffffffffffffff, &(0x7f00000003c0)=""/199, 0x114) 02:24:29 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:30 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(0xffffffffffffffff, &(0x7f00000003c0)=""/199, 0x114) 02:24:30 executing program 4: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 02:24:30 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4801, 0x0) 02:24:30 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040), 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r2, 0x0, r5) dup3(r1, r6, 0x0) close(r0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) [ 275.356765][T10132] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:24:30 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:30 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(0xffffffffffffffff, &(0x7f00000003c0)=""/199, 0x114) 02:24:30 executing program 2: r0 = userfaultfd(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000000080)={{&(0x7f00005e3000/0x800000)=nil, 0x800000}, 0x200000}) 02:24:30 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040), 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r2, 0x0, r5) dup3(r1, r6, 0x0) close(r0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:30 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4801, 0x0) 02:24:30 executing program 4: mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = socket(0x15, 0x5, 0x0) getsockopt(r0, 0x200000000114, 0x2721, &(0x7f0000000580)=""/102400, &(0x7f0000019580)=0x19000) 02:24:30 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:30 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040), 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r2, 0x0, r5) dup3(r1, r6, 0x0) close(r0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) [ 275.641236][T10150] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:24:30 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, 0x0, 0x0) 02:24:30 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4801, 0x0) 02:24:30 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 02:24:30 executing program 2: mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = socket(0x15, 0x5, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockopt(r0, 0x200000000114, 0x2721, &(0x7f0000000580)=""/102400, &(0x7f0000019580)=0x19000) 02:24:30 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r0, 0x0, r3) dup3(0xffffffffffffffff, r4, 0x0) close(0xffffffffffffffff) vmsplice(r4, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:30 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:30 executing program 2: timer_create(0x0, &(0x7f0000000000)={0x0, 0x400014}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_gettime(r0, &(0x7f0000000000)) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000080)=0x9, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}, [@typed={0x14, 0xc}]}, 0x28}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r4, 0xc0045405, &(0x7f0000a07fff)) pidfd_getfd(r4, r3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f00000000c0)=0x8, 0x4) [ 275.947498][T10169] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:24:30 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, 0x0, 0x0) 02:24:30 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x4801, 0x0) 02:24:30 executing program 4: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='S\x00\x00'], 0x1c2) r1 = socket$inet6(0x10, 0x8000000100000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="5500000018007fd500fe01b2a4a269930a06000000a84308910000003900080008000c0000dc13382d0007009b84186ef75afb83de448daa72540d816ed2c55327c43ab8220000060cec4fab91d400000000000000", 0x55}], 0x1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) 02:24:31 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r0, 0x0, r3) dup3(0xffffffffffffffff, r4, 0x0) close(0xffffffffffffffff) vmsplice(r4, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) [ 276.170631][T10188] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:24:31 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, &(0x7f00000002c0)=""/214, 0xd6) 02:24:31 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_nanosleep(0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0) 02:24:31 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(r0, 0x0, 0x0) 02:24:31 executing program 4: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[], [{@fowner_gt={'fowner>'}}]}) 02:24:31 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r0, 0x0, r3) dup3(0xffffffffffffffff, r4, 0x0) close(0xffffffffffffffff) vmsplice(r4, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) 02:24:31 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x4801, 0x0) 02:24:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') r3 = getgid() write$FUSE_DIRENTPLUS(r2, &(0x7f0000000080)=ANY=[@ANYRESOCT=r3], 0x17) [ 276.394744][T10203] hfs: unable to parse mount options 02:24:31 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r2, 0x0, r4) dup3(r1, r5, 0x0) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) [ 276.462287][T10203] hfs: unable to parse mount options 02:24:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000200)) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 02:24:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae46, &(0x7f0000000000)={r2, 0x0, 0x0, 0xffffffffffffffff, [0x0, 0x0, 0x0, 0x4]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 02:24:31 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/214, 0xd6) [ 276.529849][T10217] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:24:31 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x4801, 0x0) 02:24:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000180)={'bond0\x00', @ifru_names='gretap0\x00'}) [ 276.661774][T10230] ================================================================== [ 276.670464][T10230] BUG: KASAN: slab-out-of-bounds in gfn_to_hva+0x4a0/0x4c0 [ 276.677680][T10230] Read of size 8 at addr ffff8880a689d468 by task syz-executor.4/10230 [ 276.685924][T10230] [ 276.688263][T10230] CPU: 1 PID: 10230 Comm: syz-executor.4 Not tainted 5.7.0-rc1-next-20200415-syzkaller #0 [ 276.698166][T10230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.708320][T10230] Call Trace: [ 276.711744][T10230] dump_stack+0x188/0x20d [ 276.716177][T10230] print_address_description.constprop.0.cold+0xd3/0x315 [ 276.723252][T10230] ? gfn_to_hva+0x4a0/0x4c0 [ 276.727765][T10230] __kasan_report.cold+0x35/0x4d [ 276.732721][T10230] ? gfn_to_hva+0x4a0/0x4c0 [ 276.737608][T10230] ? gfn_to_hva+0x4a0/0x4c0 [ 276.746725][T10230] kasan_report+0x33/0x50 [ 276.751069][T10230] gfn_to_hva+0x4a0/0x4c0 [ 276.755506][T10230] kvm_arch_mmu_notifier_invalidate_range+0x21/0x80 02:24:31 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1709, 0x6ad) getdents(0xffffffffffffffff, &(0x7f00000002c0)=""/214, 0xd6) 02:24:31 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r2, 0x0, r4) dup3(r1, r5, 0x0) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) [ 276.762120][T10230] kvm_mmu_notifier_invalidate_range_start+0x1a1/0x280 [ 276.769854][T10230] ? kvm_flush_remote_tlbs+0x120/0x120 [ 276.775391][T10230] __mmu_notifier_invalidate_range_start+0x4bc/0x6b0 [ 276.782137][T10230] mmu_notifier_invalidate_range_start+0xda/0x100 [ 276.788561][T10230] wp_page_copy+0x4c4/0x1650 [ 276.793171][T10230] ? add_mm_counter+0x330/0x330 [ 276.798052][T10230] ? lock_downgrade+0x840/0x840 [ 276.802917][T10230] ? __handle_mm_fault+0x1dec/0x3ac0 [ 276.806927][T10240] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 276.808296][T10230] do_wp_page+0x598/0x1440 [ 276.820464][T10230] ? finish_mkwrite_fault+0x560/0x560 [ 276.825897][T10230] ? rwlock_bug.part.0+0x90/0x90 [ 276.830966][T10230] ? fault_around_bytes_set+0x90/0x90 [ 276.836352][T10230] __handle_mm_fault+0x288c/0x3ac0 [ 276.841490][T10230] ? vm_insert_pages+0x6a0/0x6a0 [ 276.846437][T10230] ? count_memcg_event_mm+0x1e2/0x3d0 [ 276.851837][T10230] ? mark_held_locks+0x9f/0xe0 [ 276.856633][T10230] handle_mm_fault+0x1a5/0x660 [ 276.861482][T10230] do_page_fault+0x55b/0x13da [ 276.866263][T10230] page_fault+0x39/0x40 [ 276.870472][T10230] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 276.876804][T10230] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 276.896413][T10230] RSP: 0018:ffffc900097d7b40 EFLAGS: 00010206 [ 276.902487][T10230] RAX: 0000000000000001 RBX: 000000000073c058 RCX: 0000000000000005 02:24:31 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffc]}, 0x0, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r2, 0x0, r4) dup3(r1, r5, 0x0) close(r0) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f00000000c0)="d3", 0x1}], 0x1, 0x0) [ 276.910464][T10230] RDX: 0000000000000000 RSI: ffffc900097d7bd0 RDI: 000000000073c058 [ 276.918440][T10230] RBP: ffffc900097d7bd0 R08: 0000000000006f6c R09: fffff520012faf7f [ 276.926416][T10230] R10: ffffc900097d7bf7 R11: fffff520012faf7e R12: 0000000000000028 [ 276.934391][T10230] R13: 000000000073c080 R14: 00007ffffffff000 R15: 0000000000000000 [ 276.942618][T10230] _copy_to_user+0x11e/0x160 [ 276.947243][T10230] inet_gifconf+0x23c/0x490 [ 276.951741][T10230] ? inet_set_link_af+0x3f0/0x3f0 [ 276.956760][T10230] ? inet_set_link_af+0x3f0/0x3f0 [ 276.961838][T10230] dev_ifconf+0xd3/0x230 [ 276.966110][T10230] sock_do_ioctl+0x260/0x2f0 [ 276.970685][T10230] ? compat_ifr_data_ioctl+0x160/0x160 [ 276.977819][T10230] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 276.984011][T10230] ? do_vfs_ioctl+0x50c/0x12d0 [ 276.988760][T10230] ? ioctl_file_clone+0x180/0x180 [ 276.993766][T10230] sock_ioctl+0x3ec/0x790 [ 276.998088][T10230] ? dlci_ioctl_set+0x30/0x30 [ 277.002789][T10230] ? do_dup2+0x520/0x520 [ 277.007045][T10230] ? __x64_sys_futex+0x380/0x4f0 [ 277.011969][T10230] ? dlci_ioctl_set+0x30/0x30 [ 277.016629][T10230] ksys_ioctl+0x11a/0x180 [ 277.020942][T10230] __x64_sys_ioctl+0x6f/0xb0 [ 277.025549][T10230] ? lockdep_hardirqs_on+0x463/0x620 [ 277.030929][T10230] do_syscall_64+0xf6/0x7d0 [ 277.035427][T10230] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 277.041314][T10230] RIP: 0033:0x45ca29 [ 277.045267][T10230] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.064855][T10230] RSP: 002b:00007f83871a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 277.073784][T10230] RAX: ffffffffffffffda RBX: 00000000004e9380 RCX: 000000000045ca29 [ 277.082012][T10230] RDX: 0000000000400200 RSI: 0000000000008912 RDI: 0000000000000007 [ 277.089984][T10230] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 277.097952][T10230] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 277.106004][T10230] R13: 0000000000000415 R14: 00000000004c6d64 R15: 00007f83871a56d4 [ 277.113982][T10230] [ 277.116291][T10230] Allocated by task 10230: [ 277.120805][T10230] save_stack+0x1b/0x40 [ 277.124950][T10230] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 277.130639][T10230] kvmalloc_node+0x61/0xf0 [ 277.135049][T10230] kvm_set_memslot+0x115/0x1530 [ 277.139912][T10230] __kvm_set_memory_region+0xcf7/0x1320 [ 277.145442][T10230] kvm_set_memory_region+0x29/0x50 [ 277.150726][T10230] kvm_vm_ioctl+0x678/0x2400 [ 277.155295][T10230] ksys_ioctl+0x11a/0x180 [ 277.159616][T10230] __x64_sys_ioctl+0x6f/0xb0 [ 277.164213][T10230] do_syscall_64+0xf6/0x7d0 [ 277.168696][T10230] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 277.175167][T10230] [ 277.177480][T10230] Freed by task 9774: [ 277.181456][T10230] save_stack+0x1b/0x40 [ 277.185608][T10230] __kasan_slab_free+0xf7/0x140 [ 277.190434][T10230] kfree+0x109/0x2b0 [ 277.194313][T10230] kvfree+0x42/0x50 [ 277.198379][T10230] __free_fdtable+0x2d/0x70 [ 277.202869][T10230] put_files_struct+0x248/0x2e0 [ 277.207710][T10230] exit_files+0x7e/0xa0 [ 277.211906][T10230] do_exit+0xb24/0x2e10 [ 277.216162][T10230] do_group_exit+0x125/0x340 [ 277.220774][T10230] get_signal+0x47b/0x24e0 [ 277.225208][T10230] do_signal+0x81/0x2240 [ 277.229436][T10230] exit_to_usermode_loop+0x26c/0x360 [ 277.234701][T10230] do_syscall_64+0x6b1/0x7d0 [ 277.239275][T10230] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 277.245247][T10230] [ 277.247574][T10230] The buggy address belongs to the object at ffff8880a689d000 [ 277.247574][T10230] which belongs to the cache kmalloc-2k of size 2048 [ 277.261879][T10230] The buggy address is located 1128 bytes inside of [ 277.261879][T10230] 2048-byte region [ffff8880a689d000, ffff8880a689d800) [ 277.275318][T10230] The buggy address belongs to the page: [ 277.280952][T10230] page:ffffea00029a2740 refcount:1 mapcount:0 mapping:0000000092bd646b index:0x0 [ 277.290066][T10230] flags: 0xfffe0000000200(slab) [ 277.294936][T10230] raw: 00fffe0000000200 ffffea000232f508 ffffea0002443f48 ffff8880aa000e00 [ 277.303525][T10230] raw: 0000000000000000 ffff8880a689d000 0000000100000001 0000000000000000 [ 277.312137][T10230] page dumped because: kasan: bad access detected [ 277.318524][T10230] [ 277.320831][T10230] Memory state around the buggy address: [ 277.326441][T10230] ffff8880a689d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 277.334481][T10230] ffff8880a689d380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 277.346531][T10230] >ffff8880a689d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc [ 277.354590][T10230] ^ [ 277.362034][T10230] ffff8880a689d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 277.370183][T10230] ffff8880a689d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 277.378248][T10230] ================================================================== [ 277.386288][T10230] Disabling lock debugging due to kernel taint [ 277.396952][T10230] Kernel panic - not syncing: panic_on_warn set ... [ 277.403569][T10230] CPU: 1 PID: 10230 Comm: syz-executor.4 Tainted: G B 5.7.0-rc1-next-20200415-syzkaller #0 [ 277.414860][T10230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.424904][T10230] Call Trace: [ 277.428182][T10230] dump_stack+0x188/0x20d [ 277.433079][T10230] panic+0x2e3/0x75c [ 277.436959][T10230] ? add_taint.cold+0x16/0x16 [ 277.441648][T10230] ? preempt_schedule_common+0x5e/0xc0 [ 277.447097][T10230] ? gfn_to_hva+0x4a0/0x4c0 [ 277.451595][T10230] ? preempt_schedule_thunk+0x16/0x18 [ 277.456963][T10230] ? trace_hardirqs_on+0x55/0x220 [ 277.461966][T10230] ? gfn_to_hva+0x4a0/0x4c0 [ 277.466450][T10230] end_report+0x4d/0x53 [ 277.470597][T10230] __kasan_report.cold+0xd/0x4d [ 277.475425][T10230] ? gfn_to_hva+0x4a0/0x4c0 [ 277.479919][T10230] ? gfn_to_hva+0x4a0/0x4c0 [ 277.484399][T10230] kasan_report+0x33/0x50 [ 277.488706][T10230] gfn_to_hva+0x4a0/0x4c0 [ 277.493019][T10230] kvm_arch_mmu_notifier_invalidate_range+0x21/0x80 [ 277.499585][T10230] kvm_mmu_notifier_invalidate_range_start+0x1a1/0x280 [ 277.506414][T10230] ? kvm_flush_remote_tlbs+0x120/0x120 [ 277.511865][T10230] __mmu_notifier_invalidate_range_start+0x4bc/0x6b0 [ 277.518519][T10230] mmu_notifier_invalidate_range_start+0xda/0x100 [ 277.524909][T10230] wp_page_copy+0x4c4/0x1650 [ 277.529480][T10230] ? add_mm_counter+0x330/0x330 [ 277.534325][T10230] ? lock_downgrade+0x840/0x840 [ 277.539167][T10230] ? __handle_mm_fault+0x1dec/0x3ac0 [ 277.544430][T10230] do_wp_page+0x598/0x1440 [ 277.548825][T10230] ? finish_mkwrite_fault+0x560/0x560 [ 277.554173][T10230] ? rwlock_bug.part.0+0x90/0x90 [ 277.559087][T10230] ? fault_around_bytes_set+0x90/0x90 [ 277.564441][T10230] __handle_mm_fault+0x288c/0x3ac0 [ 277.569540][T10230] ? vm_insert_pages+0x6a0/0x6a0 [ 277.574458][T10230] ? count_memcg_event_mm+0x1e2/0x3d0 [ 277.579813][T10230] ? mark_held_locks+0x9f/0xe0 [ 277.584571][T10230] handle_mm_fault+0x1a5/0x660 [ 277.589319][T10230] do_page_fault+0x55b/0x13da [ 277.593976][T10230] page_fault+0x39/0x40 [ 277.598136][T10230] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 277.604440][T10230] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 277.624019][T10230] RSP: 0018:ffffc900097d7b40 EFLAGS: 00010206 [ 277.630061][T10230] RAX: 0000000000000001 RBX: 000000000073c058 RCX: 0000000000000005 [ 277.638009][T10230] RDX: 0000000000000000 RSI: ffffc900097d7bd0 RDI: 000000000073c058 [ 277.645957][T10230] RBP: ffffc900097d7bd0 R08: 0000000000006f6c R09: fffff520012faf7f [ 277.653917][T10230] R10: ffffc900097d7bf7 R11: fffff520012faf7e R12: 0000000000000028 [ 277.661879][T10230] R13: 000000000073c080 R14: 00007ffffffff000 R15: 0000000000000000 [ 277.672274][T10230] _copy_to_user+0x11e/0x160 [ 277.676846][T10230] inet_gifconf+0x23c/0x490 [ 277.681442][T10230] ? inet_set_link_af+0x3f0/0x3f0 [ 277.686458][T10230] ? inet_set_link_af+0x3f0/0x3f0 [ 277.691460][T10230] dev_ifconf+0xd3/0x230 [ 277.695681][T10230] sock_do_ioctl+0x260/0x2f0 [ 277.700252][T10230] ? compat_ifr_data_ioctl+0x160/0x160 [ 277.705691][T10230] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 277.711590][T10230] ? do_vfs_ioctl+0x50c/0x12d0 [ 277.716331][T10230] ? ioctl_file_clone+0x180/0x180 [ 277.721332][T10230] sock_ioctl+0x3ec/0x790 [ 277.725638][T10230] ? dlci_ioctl_set+0x30/0x30 [ 277.730307][T10230] ? do_dup2+0x520/0x520 [ 277.734528][T10230] ? __x64_sys_futex+0x380/0x4f0 [ 277.739443][T10230] ? dlci_ioctl_set+0x30/0x30 [ 277.744098][T10230] ksys_ioctl+0x11a/0x180 [ 277.748406][T10230] __x64_sys_ioctl+0x6f/0xb0 [ 277.752974][T10230] ? lockdep_hardirqs_on+0x463/0x620 [ 277.758236][T10230] do_syscall_64+0xf6/0x7d0 [ 277.762721][T10230] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 277.768588][T10230] RIP: 0033:0x45ca29 [ 277.772462][T10230] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.792044][T10230] RSP: 002b:00007f83871a4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 277.800433][T10230] RAX: ffffffffffffffda RBX: 00000000004e9380 RCX: 000000000045ca29 [ 277.808381][T10230] RDX: 0000000000400200 RSI: 0000000000008912 RDI: 0000000000000007 [ 277.816329][T10230] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 277.825165][T10230] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 277.833126][T10230] R13: 0000000000000415 R14: 00000000004c6d64 R15: 00007f83871a56d4 [ 277.842599][T10230] Kernel Offset: disabled [ 277.846916][T10230] Rebooting in 86400 seconds..