[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 56.015475][ T26] audit: type=1800 audit(1572374540.207:25): pid=8569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 56.043386][ T26] audit: type=1800 audit(1572374540.207:26): pid=8569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 56.090613][ T26] audit: type=1800 audit(1572374540.207:27): pid=8569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.247' (ECDSA) to the list of known hosts. 2019/10/29 18:42:30 fuzzer started 2019/10/29 18:42:31 dialing manager at 10.128.0.26:38767 2019/10/29 18:42:31 syscalls: 2541 2019/10/29 18:42:31 code coverage: enabled 2019/10/29 18:42:31 comparison tracing: enabled 2019/10/29 18:42:31 extra coverage: extra coverage is not supported by the kernel 2019/10/29 18:42:31 setuid sandbox: enabled 2019/10/29 18:42:31 namespace sandbox: enabled 2019/10/29 18:42:31 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/29 18:42:31 fault injection: enabled 2019/10/29 18:42:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/29 18:42:31 net packet injection: enabled 2019/10/29 18:42:31 net device setup: enabled 2019/10/29 18:42:31 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 18:44:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000640)="d3abc7990d535c9e70bc111c8eff68a1110c19fcc0b30002", 0x18) 18:44:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x3011, r0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000fc0)={'security\x00'}, &(0x7f0000000040)=0x54) syzkaller login: [ 161.720785][ T8736] IPVS: ftp: loaded support on port[0] = 21 18:44:06 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) [ 161.875165][ T8738] IPVS: ftp: loaded support on port[0] = 21 [ 161.936828][ T8736] chnl_net:caif_netlink_parms(): no params data found [ 162.079490][ T8736] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.094433][ T8736] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.111619][ T8736] device bridge_slave_0 entered promiscuous mode 18:44:06 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x400000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") [ 162.131369][ T8738] chnl_net:caif_netlink_parms(): no params data found [ 162.151361][ T8736] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.160353][ T8736] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.169100][ T8736] device bridge_slave_1 entered promiscuous mode [ 162.202422][ T8742] IPVS: ftp: loaded support on port[0] = 21 [ 162.279835][ T8736] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.315957][ T8736] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.330575][ T8738] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.339027][ T8738] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.348982][ T8738] device bridge_slave_0 entered promiscuous mode [ 162.378461][ T8738] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.386390][ T8738] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.395821][ T8738] device bridge_slave_1 entered promiscuous mode [ 162.435456][ T8736] team0: Port device team_slave_0 added [ 162.448442][ T8744] IPVS: ftp: loaded support on port[0] = 21 [ 162.462760][ T8736] team0: Port device team_slave_1 added 18:44:06 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) [ 162.501509][ T8738] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.567801][ T8738] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.591189][ T8742] chnl_net:caif_netlink_parms(): no params data found [ 162.650488][ T8738] team0: Port device team_slave_0 added [ 162.706356][ T8736] device hsr_slave_0 entered promiscuous mode 18:44:06 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10700, 0x10) [ 162.766719][ T8736] device hsr_slave_1 entered promiscuous mode [ 162.847830][ T8738] team0: Port device team_slave_1 added [ 162.875549][ T8747] IPVS: ftp: loaded support on port[0] = 21 [ 162.937921][ T8749] IPVS: ftp: loaded support on port[0] = 21 [ 162.950434][ T8742] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.957741][ T8742] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.965802][ T8742] device bridge_slave_0 entered promiscuous mode [ 163.025324][ T8738] device hsr_slave_0 entered promiscuous mode [ 163.074675][ T8738] device hsr_slave_1 entered promiscuous mode [ 163.133609][ T8738] debugfs: Directory 'hsr0' with parent '/' already present! [ 163.150233][ T8742] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.159023][ T8742] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.166909][ T8742] device bridge_slave_1 entered promiscuous mode [ 163.200821][ T8744] chnl_net:caif_netlink_parms(): no params data found [ 163.272350][ T8742] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.310354][ T8742] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.350632][ T8742] team0: Port device team_slave_0 added [ 163.358360][ T8742] team0: Port device team_slave_1 added [ 163.365679][ T8744] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.372761][ T8744] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.381082][ T8744] device bridge_slave_0 entered promiscuous mode [ 163.412521][ T8744] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.419937][ T8744] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.427902][ T8744] device bridge_slave_1 entered promiscuous mode [ 163.506987][ T8744] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.519828][ T8744] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.576604][ T8742] device hsr_slave_0 entered promiscuous mode [ 163.633843][ T8742] device hsr_slave_1 entered promiscuous mode [ 163.693515][ T8742] debugfs: Directory 'hsr0' with parent '/' already present! [ 163.725089][ T8747] chnl_net:caif_netlink_parms(): no params data found [ 163.808045][ T8744] team0: Port device team_slave_0 added [ 163.836957][ T8744] team0: Port device team_slave_1 added [ 163.850953][ T8749] chnl_net:caif_netlink_parms(): no params data found [ 163.869005][ T8747] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.877063][ T8747] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.885365][ T8747] device bridge_slave_0 entered promiscuous mode [ 163.892887][ T8747] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.900089][ T8747] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.908053][ T8747] device bridge_slave_1 entered promiscuous mode [ 164.016856][ T8744] device hsr_slave_0 entered promiscuous mode [ 164.077053][ T8744] device hsr_slave_1 entered promiscuous mode [ 164.113565][ T8744] debugfs: Directory 'hsr0' with parent '/' already present! [ 164.136549][ T8747] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.152041][ T8747] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.179445][ T8747] team0: Port device team_slave_0 added [ 164.187767][ T8747] team0: Port device team_slave_1 added [ 164.208474][ T8749] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.216935][ T8749] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.224952][ T8749] device bridge_slave_0 entered promiscuous mode [ 164.232518][ T8749] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.240206][ T8749] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.248186][ T8749] device bridge_slave_1 entered promiscuous mode [ 164.316587][ T8747] device hsr_slave_0 entered promiscuous mode [ 164.373859][ T8747] device hsr_slave_1 entered promiscuous mode [ 164.433534][ T8747] debugfs: Directory 'hsr0' with parent '/' already present! [ 164.443770][ T8736] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.507978][ T8749] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.523209][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.531826][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.542566][ T8736] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.557159][ T8749] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.590190][ T8738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.600769][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.610992][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.620274][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.627464][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.642571][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.660807][ T3536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.673264][ T3536] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.683861][ T3536] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.690970][ T3536] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.709451][ T8742] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.718588][ T8749] team0: Port device team_slave_0 added [ 164.729490][ T8749] team0: Port device team_slave_1 added [ 164.749903][ T8738] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.764305][ T8750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.774125][ T8750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.781783][ T8750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.789780][ T8750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.798650][ T8750] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.807836][ T8750] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.814951][ T8750] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.824919][ T8750] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.870457][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.879091][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.890258][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.899085][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.908499][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.917614][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.926423][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.935202][ T8754] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.942251][ T8754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.949992][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.959917][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.972524][ T8742] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.026927][ T8749] device hsr_slave_0 entered promiscuous mode [ 165.073917][ T8749] device hsr_slave_1 entered promiscuous mode [ 165.113927][ T8749] debugfs: Directory 'hsr0' with parent '/' already present! [ 165.146688][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.157937][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.165756][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.174904][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.184280][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.192976][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.216287][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.229246][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.241884][ T8736] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 165.254636][ T8736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.273239][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.289760][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.298954][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.308241][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.317080][ T84] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.324179][ T84] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.333277][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.353235][ T8738] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 165.364929][ T8738] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 165.392784][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.401675][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.410966][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.419355][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.428019][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.437295][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.445682][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.454454][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.462752][ T8754] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.470007][ T8754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.477990][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.486857][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.496734][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.531267][ T8744] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.551815][ T8738] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.566801][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.581883][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.591226][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.599587][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.616275][ T8744] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.628878][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.638030][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.652721][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.661434][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.670675][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.700206][ T8742] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 165.712822][ T8742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.726518][ T8736] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.749356][ T8749] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.764253][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.786428][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.803205][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.813068][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.821583][ T2867] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.828671][ T2867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.844516][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.855499][ T8742] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.876771][ T8747] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.900978][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.912930][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.926302][ T8754] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.933426][ T8754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.941739][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.951124][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.959160][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.970249][ T8749] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.002014][ T8747] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.024748][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.032489][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.090484][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.114468][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 18:44:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x3011, r0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000fc0)={'security\x00'}, &(0x7f0000000040)=0x54) [ 166.139767][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.164422][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.186520][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.198496][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.207600][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.216375][ T84] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.223491][ T84] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.231141][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.240562][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.249539][ T84] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.256657][ T84] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.265278][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.274088][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.310520][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.327518][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.341727][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 18:44:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x3011, r0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000fc0)={'security\x00'}, &(0x7f0000000040)=0x54) [ 166.359870][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.369148][ T84] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.376312][ T84] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.417909][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.433845][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.435156][ C0] hrtimer: interrupt took 57344 ns [ 166.442349][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 18:44:10 executing program 2: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000140)=""/95) syz_open_procfs(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x1e, 0x80005, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000040)={'team0\x00\x00\x01\x00', 0x9843}) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000240)={'team0\x00\x030\xff\xfd\x00%`\xc3\xff\xff', 0xb5}) [ 166.470981][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.486003][ T84] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.493131][ T84] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.508105][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.518887][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.532832][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.547932][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.558582][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 18:44:10 executing program 0: sysfs$1(0xfe0, 0x0) [ 166.569764][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.578686][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.588697][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.597358][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.607953][ T8744] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 18:44:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x3011, r0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000fc0)={'security\x00'}, &(0x7f0000000040)=0x54) [ 166.652401][ T8750] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.677191][ T8750] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.716200][ T8750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 18:44:10 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) unshare(0x20020000) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') [ 166.760771][ T8749] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 166.782539][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.829972][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.846540][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 18:44:11 executing program 1: r0 = socket$packet(0x11, 0x4000000000002, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x0, 0x0, 0x7}, 0x1c) 18:44:11 executing program 2: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000140)=""/95) syz_open_procfs(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x1e, 0x80005, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000040)={'team0\x00\x00\x01\x00', 0x9843}) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000240)={'team0\x00\x030\xff\xfd\x00%`\xc3\xff\xff', 0xb5}) [ 166.879744][ T8744] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.943738][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.952545][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.002658][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.028101][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.046022][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.055580][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.065696][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.074771][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.087528][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.135089][ T8749] 8021q: adding VLAN 0 to HW filter on device batadv0 18:44:11 executing program 2: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000140)=""/95) syz_open_procfs(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x1e, 0x80005, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000040)={'team0\x00\x00\x01\x00', 0x9843}) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000240)={'team0\x00\x030\xff\xfd\x00%`\xc3\xff\xff', 0xb5}) [ 167.201472][ T8747] 8021q: adding VLAN 0 to HW filter on device batadv0 18:44:11 executing program 3: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000140)=""/95) syz_open_procfs(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x1e, 0x80005, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000040)={'team0\x00\x00\x01\x00', 0x9843}) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000240)={'team0\x00\x030\xff\xfd\x00%`\xc3\xff\xff', 0xb5}) 18:44:12 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) 18:44:12 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10700, 0x10) 18:44:12 executing program 2: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000140)=""/95) syz_open_procfs(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x1e, 0x80005, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000040)={'team0\x00\x00\x01\x00', 0x9843}) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000240)={'team0\x00\x030\xff\xfd\x00%`\xc3\xff\xff', 0xb5}) 18:44:12 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10700, 0x10) 18:44:12 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) 18:44:12 executing program 3: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000140)=""/95) syz_open_procfs(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x1e, 0x80005, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000040)={'team0\x00\x00\x01\x00', 0x9843}) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000240)={'team0\x00\x030\xff\xfd\x00%`\xc3\xff\xff', 0xb5}) 18:44:12 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10700, 0x10) 18:44:13 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='[d::],[::6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 18:44:13 executing program 1: r0 = socket(0x400020000000010, 0x2, 0x0) write(r0, &(0x7f0000a1cf6c)="1f00000043000d0000000000fc07ff1b070404000400030007000100010039", 0x1f) 18:44:13 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) 18:44:13 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) 18:44:13 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_open_dev$radio(0x0, 0x2, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) socket(0x1e, 0x805, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0)={0x0, 0x0, 0x4}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 18:44:13 executing program 3: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000140)=""/95) syz_open_procfs(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x1e, 0x80005, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000040)={'team0\x00\x00\x01\x00', 0x9843}) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000240)={'team0\x00\x030\xff\xfd\x00%`\xc3\xff\xff', 0xb5}) [ 169.001148][ T8888] libceph: parse_ips bad ip '[d::],[::6' 18:44:13 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() pread64(r0, 0x0, 0x2, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='\xf7\xadQ\xb1\x00', 0x1390c2, 0x0) dup2(r2, r0) tkill(r1, 0x15) 18:44:13 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) 18:44:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") close(r0) [ 169.119477][ T8890] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 18:44:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x14, 0x29, 0x829}, 0x14}}, 0x0) 18:44:13 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_open_dev$radio(0x0, 0x2, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) socket(0x1e, 0x805, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0)={0x0, 0x0, 0x4}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 18:44:13 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f00000010c0)=0x916, 0x4) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) 18:44:13 executing program 3: open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lchown(&(0x7f0000000000)='./bus\x00', 0xee01, 0xffffffffffffffff) 18:44:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") close(r0) 18:44:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") close(r0) 18:44:13 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() pread64(r0, 0x0, 0x2, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='\xf7\xadQ\xb1\x00', 0x1390c2, 0x0) dup2(r2, r0) tkill(r1, 0x15) 18:44:13 executing program 5: syz_open_dev$loop(0x0, 0x0, 0x100082) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0)=0x4, 0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101000, 0x0) r2 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000000)) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) write$uinput_user_dev(r2, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {0x0, 0x1, 0x6a}, 0x3f, [0x0, 0x3, 0x0, 0x5a, 0x0, 0x0, 0x9227, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x1f, 0x0, 0x401, 0x7, 0x0, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6, 0xb15, 0x0, 0x5, 0xae8, 0x5, 0x101, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1000, 0x0, 0x4, 0x5, 0xfffffffffffffff8, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff0001], [0x3, 0xfffffff5, 0x2, 0x0, 0x0, 0x8000, 0x1000, 0x1f, 0xbe, 0x100000000, 0x1, 0x1, 0x95, 0x0, 0x5, 0x0, 0x8ffe, 0x1, 0x0, 0xe27, 0xe3, 0x0, 0x100, 0x1, 0x8, 0x7, 0xca, 0x0, 0x7ff, 0x6, 0x0, 0x7fff, 0x0, 0x80000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, 0x0, 0x6, 0x9, 0x8, 0x0, 0x1, 0x0, 0x5, 0x3ae9, 0x0, 0xfffffffc, 0x4, 0x9, 0x2, 0x7, 0x0, 0x0, 0x8], [0x4, 0x0, 0xfff, 0x0, 0x5a, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x2, 0x0, 0xfffffffffffffff9, 0x0, 0x4, 0xff, 0x0, 0x400, 0x0, 0x7, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xffffffff, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x80000001, 0x6, 0xfffffffffffffffb, 0x0, 0x7, 0x800, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x9, 0x800, 0x2, 0x7, 0x2], [0x0, 0x5, 0x5d, 0x0, 0x0, 0x1, 0x408de, 0x0, 0xffff, 0x3ff, 0x401, 0xe16, 0x0, 0x0, 0x2, 0x1, 0x0, 0x401, 0x0, 0x0, 0x9, 0x5, 0x5, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x56e4, 0x0, 0x3, 0x10000, 0xfffffffffffff000, 0x1, 0xfffffffd, 0x0, 0x1, 0x100000, 0x6, 0x2, 0x5, 0x9, 0x3ff, 0x2, 0x0, 0x2, 0x2, 0x0, 0x8, 0x60ef, 0x0, 0xffffffffafd63bfb, 0x0, 0x7fffffff, 0x0, 0x0, 0x2]}, 0x45c) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) ptrace(0x10, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0x81) wait4(0x0, 0x0, 0x5d6be6634f90cd7d, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 18:44:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") close(r0) 18:44:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="7c0000002400070f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030003000000000000000046000000000000000000000000000000000000000000000000000000000002000000000000ee3143f99109e1a173ff78cc8b53605d3222118a887a5f1c3d6d4c8fe16633f83348fe63dc697cb89bbee7b776c25e0c2be3501bdf1a741803efd7e352a2af892c446aeb6424c9c6b2caf3226ec6f0a7686751fad0377ee6f4b5f0edd4f3b2b0ae0ee74fa98656c26ce43b4f41db92fd68177a2553c39f8281e3dc11bc87a2"], 0x7c}}, 0x0) r2 = socket(0x4000000000010, 0x1000000000080002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg$alg(r2, &(0x7f0000000140), 0x42, 0x0) 18:44:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") close(r0) 18:44:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") close(r0) 18:44:14 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() pread64(r0, 0x0, 0x2, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='\xf7\xadQ\xb1\x00', 0x1390c2, 0x0) dup2(r2, r0) tkill(r1, 0x15) [ 169.762020][ T8931] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 18:44:14 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_open_dev$radio(0x0, 0x2, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) socket(0x1e, 0x805, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0)={0x0, 0x0, 0x4}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 18:44:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="7c0000002400070f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030003000000000000000046000000000000000000000000000000000000000000000000000000000002000000000000ee3143f99109e1a173ff78cc8b53605d3222118a887a5f1c3d6d4c8fe16633f83348fe63dc697cb89bbee7b776c25e0c2be3501bdf1a741803efd7e352a2af892c446aeb6424c9c6b2caf3226ec6f0a7686751fad0377ee6f4b5f0edd4f3b2b0ae0ee74fa98656c26ce43b4f41db92fd68177a2553c39f8281e3dc11bc87a2"], 0x7c}}, 0x0) r2 = socket(0x4000000000010, 0x1000000000080002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg$alg(r2, &(0x7f0000000140), 0x42, 0x0) 18:44:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") close(r0) 18:44:14 executing program 0: r0 = creat(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='vegas\x00', 0x6) getsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:44:14 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() pread64(r0, 0x0, 0x2, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='\xf7\xadQ\xb1\x00', 0x1390c2, 0x0) dup2(r2, r0) tkill(r1, 0x15) 18:44:14 executing program 5: syz_open_dev$loop(0x0, 0x0, 0x100082) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0)=0x4, 0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101000, 0x0) r2 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000000)) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) write$uinput_user_dev(r2, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {0x0, 0x1, 0x6a}, 0x3f, [0x0, 0x3, 0x0, 0x5a, 0x0, 0x0, 0x9227, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x1f, 0x0, 0x401, 0x7, 0x0, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6, 0xb15, 0x0, 0x5, 0xae8, 0x5, 0x101, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1000, 0x0, 0x4, 0x5, 0xfffffffffffffff8, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff0001], [0x3, 0xfffffff5, 0x2, 0x0, 0x0, 0x8000, 0x1000, 0x1f, 0xbe, 0x100000000, 0x1, 0x1, 0x95, 0x0, 0x5, 0x0, 0x8ffe, 0x1, 0x0, 0xe27, 0xe3, 0x0, 0x100, 0x1, 0x8, 0x7, 0xca, 0x0, 0x7ff, 0x6, 0x0, 0x7fff, 0x0, 0x80000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, 0x0, 0x6, 0x9, 0x8, 0x0, 0x1, 0x0, 0x5, 0x3ae9, 0x0, 0xfffffffc, 0x4, 0x9, 0x2, 0x7, 0x0, 0x0, 0x8], [0x4, 0x0, 0xfff, 0x0, 0x5a, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x2, 0x0, 0xfffffffffffffff9, 0x0, 0x4, 0xff, 0x0, 0x400, 0x0, 0x7, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xffffffff, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x80000001, 0x6, 0xfffffffffffffffb, 0x0, 0x7, 0x800, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x9, 0x800, 0x2, 0x7, 0x2], [0x0, 0x5, 0x5d, 0x0, 0x0, 0x1, 0x408de, 0x0, 0xffff, 0x3ff, 0x401, 0xe16, 0x0, 0x0, 0x2, 0x1, 0x0, 0x401, 0x0, 0x0, 0x9, 0x5, 0x5, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x56e4, 0x0, 0x3, 0x10000, 0xfffffffffffff000, 0x1, 0xfffffffd, 0x0, 0x1, 0x100000, 0x6, 0x2, 0x5, 0x9, 0x3ff, 0x2, 0x0, 0x2, 0x2, 0x0, 0x8, 0x60ef, 0x0, 0xffffffffafd63bfb, 0x0, 0x7fffffff, 0x0, 0x0, 0x2]}, 0x45c) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) ptrace(0x10, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0x81) wait4(0x0, 0x0, 0x5d6be6634f90cd7d, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 18:44:14 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x1000) connect$inet6(r3, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "07613a9bdc3144c7", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) close(r3) 18:44:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="7c0000002400070f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030003000000000000000046000000000000000000000000000000000000000000000000000000000002000000000000ee3143f99109e1a173ff78cc8b53605d3222118a887a5f1c3d6d4c8fe16633f83348fe63dc697cb89bbee7b776c25e0c2be3501bdf1a741803efd7e352a2af892c446aeb6424c9c6b2caf3226ec6f0a7686751fad0377ee6f4b5f0edd4f3b2b0ae0ee74fa98656c26ce43b4f41db92fd68177a2553c39f8281e3dc11bc87a2"], 0x7c}}, 0x0) r2 = socket(0x4000000000010, 0x1000000000080002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg$alg(r2, &(0x7f0000000140), 0x42, 0x0) [ 170.339506][ T8963] mmap: syz-executor.0 (8963) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 18:44:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x9, @local}]]}}}]}, 0x48}}, 0x0) 18:44:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="7c0000002400070f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030003000000000000000046000000000000000000000000000000000000000000000000000000000002000000000000ee3143f99109e1a173ff78cc8b53605d3222118a887a5f1c3d6d4c8fe16633f83348fe63dc697cb89bbee7b776c25e0c2be3501bdf1a741803efd7e352a2af892c446aeb6424c9c6b2caf3226ec6f0a7686751fad0377ee6f4b5f0edd4f3b2b0ae0ee74fa98656c26ce43b4f41db92fd68177a2553c39f8281e3dc11bc87a2"], 0x7c}}, 0x0) r2 = socket(0x4000000000010, 0x1000000000080002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg$alg(r2, &(0x7f0000000140), 0x42, 0x0) [ 170.556508][ T8977] netlink: 'syz-executor.4': attribute type 9 has an invalid length. 18:44:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x9, @local}]]}}}]}, 0x48}}, 0x0) 18:44:15 executing program 5: syz_open_dev$loop(0x0, 0x0, 0x100082) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0)=0x4, 0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101000, 0x0) r2 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000000)) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) write$uinput_user_dev(r2, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {0x0, 0x1, 0x6a}, 0x3f, [0x0, 0x3, 0x0, 0x5a, 0x0, 0x0, 0x9227, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x1f, 0x0, 0x401, 0x7, 0x0, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6, 0xb15, 0x0, 0x5, 0xae8, 0x5, 0x101, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1000, 0x0, 0x4, 0x5, 0xfffffffffffffff8, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff0001], [0x3, 0xfffffff5, 0x2, 0x0, 0x0, 0x8000, 0x1000, 0x1f, 0xbe, 0x100000000, 0x1, 0x1, 0x95, 0x0, 0x5, 0x0, 0x8ffe, 0x1, 0x0, 0xe27, 0xe3, 0x0, 0x100, 0x1, 0x8, 0x7, 0xca, 0x0, 0x7ff, 0x6, 0x0, 0x7fff, 0x0, 0x80000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, 0x0, 0x6, 0x9, 0x8, 0x0, 0x1, 0x0, 0x5, 0x3ae9, 0x0, 0xfffffffc, 0x4, 0x9, 0x2, 0x7, 0x0, 0x0, 0x8], [0x4, 0x0, 0xfff, 0x0, 0x5a, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x2, 0x0, 0xfffffffffffffff9, 0x0, 0x4, 0xff, 0x0, 0x400, 0x0, 0x7, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xffffffff, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x80000001, 0x6, 0xfffffffffffffffb, 0x0, 0x7, 0x800, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x9, 0x800, 0x2, 0x7, 0x2], [0x0, 0x5, 0x5d, 0x0, 0x0, 0x1, 0x408de, 0x0, 0xffff, 0x3ff, 0x401, 0xe16, 0x0, 0x0, 0x2, 0x1, 0x0, 0x401, 0x0, 0x0, 0x9, 0x5, 0x5, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x56e4, 0x0, 0x3, 0x10000, 0xfffffffffffff000, 0x1, 0xfffffffd, 0x0, 0x1, 0x100000, 0x6, 0x2, 0x5, 0x9, 0x3ff, 0x2, 0x0, 0x2, 0x2, 0x0, 0x8, 0x60ef, 0x0, 0xffffffffafd63bfb, 0x0, 0x7fffffff, 0x0, 0x0, 0x2]}, 0x45c) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) ptrace(0x10, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0x81) wait4(0x0, 0x0, 0x5d6be6634f90cd7d, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 170.819046][ T8992] netlink: 'syz-executor.4': attribute type 9 has an invalid length. 18:44:15 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_open_dev$radio(0x0, 0x2, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) socket(0x1e, 0x805, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0)={0x0, 0x0, 0x4}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 18:44:15 executing program 3: r0 = socket$inet(0x2, 0x3, 0x480000000002) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) setsockopt$inet_int(r0, 0x0, 0xc9, 0x0, 0xb3) 18:44:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x9, @local}]]}}}]}, 0x48}}, 0x0) [ 171.123999][ T9011] netlink: 'syz-executor.4': attribute type 9 has an invalid length. 18:44:15 executing program 0: r0 = creat(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='vegas\x00', 0x6) getsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:44:15 executing program 3: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r0, &(0x7f00000042c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/247, 0xf7}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) sendto$inet6(r2, &(0x7f00000003c0)="84", 0x1, 0x0, 0x0, 0x0) dup2(r1, r2) 18:44:15 executing program 5: syz_open_dev$loop(0x0, 0x0, 0x100082) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0)=0x4, 0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101000, 0x0) r2 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000000)) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) write$uinput_user_dev(r2, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {0x0, 0x1, 0x6a}, 0x3f, [0x0, 0x3, 0x0, 0x5a, 0x0, 0x0, 0x9227, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x1f, 0x0, 0x401, 0x7, 0x0, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6, 0xb15, 0x0, 0x5, 0xae8, 0x5, 0x101, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1000, 0x0, 0x4, 0x5, 0xfffffffffffffff8, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff0001], [0x3, 0xfffffff5, 0x2, 0x0, 0x0, 0x8000, 0x1000, 0x1f, 0xbe, 0x100000000, 0x1, 0x1, 0x95, 0x0, 0x5, 0x0, 0x8ffe, 0x1, 0x0, 0xe27, 0xe3, 0x0, 0x100, 0x1, 0x8, 0x7, 0xca, 0x0, 0x7ff, 0x6, 0x0, 0x7fff, 0x0, 0x80000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, 0x0, 0x6, 0x9, 0x8, 0x0, 0x1, 0x0, 0x5, 0x3ae9, 0x0, 0xfffffffc, 0x4, 0x9, 0x2, 0x7, 0x0, 0x0, 0x8], [0x4, 0x0, 0xfff, 0x0, 0x5a, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x2, 0x0, 0xfffffffffffffff9, 0x0, 0x4, 0xff, 0x0, 0x400, 0x0, 0x7, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xffffffff, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x80000001, 0x6, 0xfffffffffffffffb, 0x0, 0x7, 0x800, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x9, 0x800, 0x2, 0x7, 0x2], [0x0, 0x5, 0x5d, 0x0, 0x0, 0x1, 0x408de, 0x0, 0xffff, 0x3ff, 0x401, 0xe16, 0x0, 0x0, 0x2, 0x1, 0x0, 0x401, 0x0, 0x0, 0x9, 0x5, 0x5, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x56e4, 0x0, 0x3, 0x10000, 0xfffffffffffff000, 0x1, 0xfffffffd, 0x0, 0x1, 0x100000, 0x6, 0x2, 0x5, 0x9, 0x3ff, 0x2, 0x0, 0x2, 0x2, 0x0, 0x8, 0x60ef, 0x0, 0xffffffffafd63bfb, 0x0, 0x7fffffff, 0x0, 0x0, 0x2]}, 0x45c) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) ptrace(0x10, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0x81) wait4(0x0, 0x0, 0x5d6be6634f90cd7d, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 18:44:15 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000000)={r4}, 0x8) 18:44:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x9, @local}]]}}}]}, 0x48}}, 0x0) 18:44:15 executing program 4: r0 = creat(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='vegas\x00', 0x6) getsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 171.483906][ T9030] netlink: 'syz-executor.4': attribute type 9 has an invalid length. 18:44:15 executing program 3: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r0, &(0x7f00000042c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/247, 0xf7}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) sendto$inet6(r2, &(0x7f00000003c0)="84", 0x1, 0x0, 0x0, 0x0) dup2(r1, r2) 18:44:16 executing program 2: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r0, &(0x7f00000042c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/247, 0xf7}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) sendto$inet6(r2, &(0x7f00000003c0)="84", 0x1, 0x0, 0x0, 0x0) dup2(r1, r2) 18:44:16 executing program 3: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r0, &(0x7f00000042c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/247, 0xf7}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) sendto$inet6(r2, &(0x7f00000003c0)="84", 0x1, 0x0, 0x0, 0x0) dup2(r1, r2) 18:44:16 executing program 3: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r0, &(0x7f00000042c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/247, 0xf7}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) sendto$inet6(r2, &(0x7f00000003c0)="84", 0x1, 0x0, 0x0, 0x0) dup2(r1, r2) 18:44:16 executing program 2: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r0, &(0x7f00000042c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/247, 0xf7}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) sendto$inet6(r2, &(0x7f00000003c0)="84", 0x1, 0x0, 0x0, 0x0) dup2(r1, r2) 18:44:16 executing program 5: r0 = creat(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='vegas\x00', 0x6) getsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:44:16 executing program 0: r0 = creat(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='vegas\x00', 0x6) getsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:44:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f00000001c0)="f40011000d2b0625fe8000000000000005baa68754c16b99efd2ba00e8cd344f3e62d76c27e80000410200000000000000a18afd6c18b1d9b72c1d63a7cbb877", 0x40}], 0x1}, 0x0) 18:44:16 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="240000005e0007041dfffd946f610500070000001d00000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 18:44:16 executing program 2: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(r0, &(0x7f00000042c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/247, 0xf7}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) sendto$inet6(r2, &(0x7f00000003c0)="84", 0x1, 0x0, 0x0, 0x0) dup2(r1, r2) 18:44:16 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x28020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0100000000000000a2439b3bb10d9f7a46a2550657be7f2a12c05febc68693f0deccf23361ba7d1ee0f0687c05a5f1a97a3d6d1ab2b1e0dec64d98dcfe121fcc242071c603f53cadbae796d86def1e7a5a67b19dfbc3aa21a14c8ca8b6635216e60a0a994b77f48f5b821eed42ce0b33fd978fa3e599e7527075d5d3227b92f25fbf1b5dd7606e1302f46898805730ae1d6856d91f22bd63958d9cbcf7b39e284ef44eaf33f0e2b6a3172933f0188c3a709fec947c7fb93573a9d21e7752ecc929fccba44f011eaaa5274450a2098e07959b28f87c3180d824bc08310147038391e73107a424fb02fa95def4ac0d9466bdcb6887f1f53b4a16ffdc4a51ae3d24a0463c13a04106a175939151ee776f4460f3f7e8b6da21305bcef9b93bb4bea964a1ff2898905dc4f6e8379f1ebd477f689b06f8cf87dcd4219a8621e628bb7a5f7d7ab959e0c14cc990103134e3f55501c58c57fb011b15df475961bad4e6f9e2294a10babd37c7ae4f02233cf2c4d3ad47195424c05ee5e27332160c3acbd1f6cb28abe4c2a2499146b1a86659fe70f87978904cf46727072f02a4c6bd866dc9dd1acd2d18a19370de789ef3284361ff834e2a80fc5eb3e8ae4611ce88ee18c592e8baa5cd636a145a493dd4835eff97dc0f00b403aa806105013ece26669a6291b4e93cb7205f69a026ec56869155f7205c07630954f1a53c9b7417340d7f9a0ca3ce546e5c61aa194543634515543e6943767a003737600571adf966b99ce5b02432d2a9dddfdc2b7eafa89ce065c38e9a69b769c3b8a3b6942c322536f163d8584d5ec163935a05cd27f9b2a35258065a1a1dfb9740584cb759e93fcc6bcdce5f514b26f5be587b820b6f594f2c9b3730a1cf3ae749870d3ac8aad0e2a2a09f7b7b0ea1de3ed54aef38bcfde3450e64e5da5dc4a168962a22afba852522906a407b8688a1210f9d087093e437e0d47b7b1591d73a42e0fc872f01463e296b0a1d99a1758cb935069c89dfdabcecaf5436ce548c1fd3dfea2d6cb86775bebeb339e6612317ac74c99e8196ffd58402b96bd40bf91bb5ed065d1ea0f4aedf4946d090f745bff808cf708c8da46f7d1f87a01f4e0ea4cf0b7c37bd964f0f3f510a0d927799abdc5ea55514b7886e4e370ea9a1645281029ce45c80f7ac20714cf4963f8db26bbe604a42990b7993364f1fd637d64498951afb5c239c0dd3ea9da6d058842c5fc4b7162c6c57518d5135bdbf2e03b3ce9b60c9322cfede32bead5986f24f4a3ea7984a02eb7600d95b6cd660777742c3891d3fbb1e106af9a75b5693b0db26e71cc13b7da29c816969ffc2447add1a0a1f8c35d3c99ee891e320c421c61aeb71855e4159ff5a6e2c671da8c3aaabb3b8d8001a91f6d6b019919293c5b7d76e38374385dac84b1edc776e643f1c6c9e621c8798edad8d8b9465a45146e355ad639770508d55f9a8a74fe03e157bbc3410084146edb178b92954ba0c40f44fa71c600bc29521190de260e3243a1e22d0e0ecf8e55884b2eba3c2d1b20788011792a9fcf949e2a411fae9f7c27646462600609ab4b99efab693d97ab364ec8c15addc0b94fc935bfd124598970d8af469dc83f68abf0a4c347c0c01dd5aa093c64268041732f6e5a295c7eae07ebce3b32396f4f60c667ed006a783658904cad0491ea33b3a525f69b6b10044965f1ca8f4476e0c617260f6fceb746e1c93a679523ac15b70bb1226f6ccabca940368ba8bec006ce3373e30b91c9fd9a6a6f0ba179db25ede325f6ddb3c414d19ead967d878b3ca0e7bea5bbbe4e7014877fd411add32187027f06e881c94a697840cc1b7803111c5190f2eaf43d8c01996d30c8458a357c17273b6b30e5a55466ce5adce8ed780e17a230fa2258a4bc104df733a9ff100e071a6b5674b5d6239f33f09dbace16a758466e5c465ada180e9c25e6d0633cb961003742bdd20bb6e822da770baa268594f1f7cd92c7886245adc400de819d88cf8897b11e0bbd8a892ca9eb43224400824a60bb0a07f83e1369018df120756c65a9c604962656419ff5fd76033545458d19d1a8c7b6cac5d9b79b8c4ee4832a9339d1f477415b203f4886e9a44e4a42532bce44ea761243703575a38188c25f300501ee9b44335dd6e7def9c59143692d409f411c18499b3306dabfc53c4bba72c7b26910760a61305e10f108151a8e0b56db2707e4715c28a1120883c96ccec9c6bc58420448961688daabd9ee935eb87294a24ec459edb203531cbaa0545e4219690ae054111e4afb16dffcf0496512655fc62cbe3ceb3c64938b282fcc2a98a00221ad46eefe76d05521c473d2b7d04a447b4521a868c946d424db918706c7ddf8f2bb0aaea8b93808b92a489b7d1f1756eb0af1b1b027f6bed31b0011a389ad48bce73eb82092b462975f73f71f81592bad57278ecec665b928469fe63361ca6c5ec40fa490f04d330e58add1aca36ea6d112f0bcf84a4eea097713d551b4369d62a3ebf108a7c041bee33d2e67118c0dc58530b157a2934199c0608f3a615a3cda1f93f382ac3c022a0e341210283c0f435074dfd7375b8d56cfc6a4882a5c25051415936a692435b7f9cbef6e73f9bed1798da2b83047203b2fd64f869e99c1f8c878fed462d9894d2c9e2742954d6a1db87eb983de9ab62bd1a4c14df79e0596761c6d482c25c688fa31b4586bb791f93baef1c5f4a8cb961769d839763b172d58bd3fc01b0a41067d704da744bf1192e1db18b5c3149e8d7f007c3ab10fb511b9119919f6964800ddf528103faf84291013e81930da0710695b2adf326bd037477dad23b0ce234befdef23bd135cb3ae05198742987fe511a06286ad95d49fa0356f14f42baf9f4116f51f8cb45b49e83294866a27dc4d7e5497ebe6d0f0200faca864e61743c09408b2658f20ce67bbea2ce86cc7e20897b59645168af25a3930ab732f305a077dcd20a24bda00fa68dd664c36f7b02d0fc3d29c64642f37472cce6dff80f983c537971829d694997250423719c254299b336ff5790b64e7232c2fcc4eaa9b1ce004300e9ff19a6895fd2eb271ed88e189d32d7cae136536be7cefdaa38994b1a5a61578a3cd947d1ddad1b81d97415315bae8e88926b8f0e833b303b1b22dacb3babfbb8af549add31754c31ca08c7f04c1cf39ee9d350fdaecee1557985fbcb943c130b2976d72558efe6767a94e2feed76d5ba09d197d09a0fda2886458f0a41ac324128a9a5734782203854ebb5172935f18e05042312db9613629bcd4b49db1b0505244bdc59001788ac593889994ca42aac729936ce88135e6bba8b6343bed40f8c89275cf617b00f8038a45e92f171ed0f179bb233ce6b5b12a3828eef1c83b129f60e1aa43b52541888b52414996349a9589cd2a3d2ecca43693b1896dfadae5f40ddd5571793a009aee7129a342068008184b4db3b46141ebaaee34d545b448087d48ca14bc49017ccf98a873df158d47ae0a9f7e6240ec2004acc817e5b52c131cf81d123d60c79377d4cbf1ed5d14ebc6ffcf9e346a4eb00f99ecd68578081b221f0755f467bdc8c9ca084e5fe452c13257c65893640a42fe298aff170cbab606f2b1e2a791b6d0a516e44dd564abfb03915e034473731f17674cf1dbf88f6bc0a2c33428b1a4c82bfa5547aa512257e8f76ab9b7be7cff3d6d5bd5a0ad7768c419b729fbdee9949a2be5aa8675b05c68f4fb7df6509f9839f959dd5ac6bd11086edaafe741ff9a5cccae5819a58990f4f8cd9013a546513433b62861daf42f9e3b33ba5efc346021bf9af634dde27caaa3226bfc6b9539b499e458d39c0efdd539ed988db45ca9c9113b6bccf6e158cb4fe42f79eb8148a99d06a7f3d899527e4523c854f7d95e7145e4e1da3adfc7468bed971ea247ebc0a7a1199b8879f4f0f70e6f90ced3e4ad3d4c5dc30e5a92ee4f9cb5695a9e7b45b9a4acd7f496f86748d06a2528e1271dcfe1a797595fcf60eedb3b0860829f03581996ff03105fb6c24ce8f88e2147364b6b2b69916777932c8fdcb1d25dc17eb41910ade00a0edc9aa9271d512531d28d3bd4c27eefdc6540327557c69d664dedb2655839f880b0a4c028749ffad5ed548b6bed3d73a60d54399c93101e6bbc6e116a60086af7ce4dba89ce099e6ad9d9cec713180ba21ec30a23b5ef44b7dc1655fa88362ca574f27a049d6bf46e1f7e9dc9fb76a38e87b8f975d34e3fdf94d2b70203a6df95423a76939955bb730c9aeae69ddc8e6e2220a9835195f82e6c10fbb4dfbcbf2eeca59cfd67d16b8ae788e94be3201c9092403daac2d1d1ba7dd3e21391110c16d8dab96458ff6ad66d14ed2c84c2653b450306c632ab1249e6d4e5e7c75dc36c7bc77e01199bd0f4fa74cf4906f314efd65f86618153473e30e12342b1e19a839ab334e5d1198f268a48bd67709133cb41336102bb815b682ffb183becce38a5e358f1151ce97d6e0b64d1ff3bbce5f3844202c36de71319ec55a07c46e5ccde67af176ec445b4e796b6c35815b22ac1dfc5b873408d859da74734a3672ee27367377a341f93d9d9799d53cbcff55d360e69eef7fbed0b8ca718d87b24c134b597f592a95d154dd93b61800f1ca930708a3a0806a63ff5d5576bd06dd69b0ca83f51124877d0bd0c5e5363e14ec9584f2baaf1e9bc9e3cd890c707f9d26757f0cf40411e7f2e1966cb2dd637772d7b848f0e4ddf87f365e228bee8de4480b27f0b1b95205d5bb8ba8b26ce1a2a8471ba2eb8c7c1013d8bb307b5151fbbe2bcb4a215e9e58f6c09dfce6df5f150262bec6e2d8005bf3c2c71ea4fea4e2bb80b6b44ed693f64282b338903cc28e3638285fedcc0d2452d0806d2332c1e7c6b1d72647d67ff3ecc44aa478feabcfb085a505880090eae5d600bf78bc9402206339bb0c7703920c0075c89edd6c566be572ae31cf721560b47b499add1fbbdfa26c62b03ab05c7760ddace916296f5c2f8e13284c5b897684109d19226ba7c810a474dcce11886a0febd44c3d61044a975e67707d27d5319ef80178208532606a66ea42633271661122f53956473ee4086d58d993cb8c10db6d2604101247756c24d3b9112f4bf1d35a058bb583d9ab88d4d6af2b871aecb7ed8630e77631358f081b5e39783812f293050040a0120ff491c7830c6c30ba4fece81be9212d514072a4fa8e9b90226205970722ca4a06d2e3a4f36773a2c49566be5a31d96b2a9d084d34dc8ef70669142ae845a132ea3a330a9103d033a393c739a31eba931f7133fdc5ce2d048917c581737026cec013abe8ba85720ceed52431e09c65afceea0a5afc9bb792b058a982a3e67eabbfa50dc92ff4aaa0faf4e81afcaab8575cff1213f566b6e6318c00ba6e193434780c476b8046395e151bd1b1a6e015fc78127fa4ca19b2cff7f43c270f528844c6f7b1d4a90527e7be89fae09bdfdec77a4ab65099f1772509224cd4badbb242fa76fa85f6197d9a661cd9e7d3a2f426bd8dd2bc6f0c62d6ba71c2ca7cc5322be08baf857feef4e95e7e859df0b77391b87ca77f3b0a7f43e8f330d1c61468578b73cc6132ded6a6b82313bef91cf875c5bf855086a60000000000f32a7a55a2166b0869af208aaab2408a62b9413c71c0d7111269a61642e26a769f4a0f128d6a3e163292b889bdbb4d56ac2569cfcd17fe153f12516cbee98cd0b3353c8515093c6e36e936acf8aecdc717cc06a8662a5dc8b7afff480f26c3f12b20bfb85b787f24debf9468f49e857396362012f0ff8c2fe1f1d917ba701d82d1b38e808247aa3d6d724a2e64ad86dccf700569631d89c5ea6c5d537d0fed1887dea642d1a201792007b32991bf800f10ce7399e46cbb9aa3f757e2915542d552b51b976a739ba7dcd124fe27b586b642b026c3beb64ec7d30d006608a807ee0cd6de344a66cb98199e142331a7aa2021031ff6541676f8a4a1b7e737c40bab4000000000000000000005df31a0844fa6f0959d3a0559da57d1ecfbbd8b0ce0eb94e83cad934071c96704c8e18fa317a2fab665998b5d23921bf76fd59262c52cbd228c0ec612f91de7cf9809c6814ed253b2e4304a9b56df3427b0990bf8ae8dccc3ba2a6059e158f14296dd654b968c266ba120dfc62379db46f86565161700db525ce2275e2cec0dcd8c42c53008726d66f45d570790564bfc2e144d910b130fb52597f6f4fd075c40124df27c985b17255ec02ec2ed6718277c2f14781657a7af596473459e3ed04e050d54853ac0fd5e948d709559900000000000000000000000000000000c9d504230489560f7d669b330bc02aa5ade5d813f32ac82b5193ac7a75dea860196b7a12c22696c556891870f5b979a4eac90903960fd51211a6a519d85d81c8c09e8a27cf5b7d6bb55023d10be50a624ee4e11ed946c5d794aad4f7b81a5dcf6bccc88986feb5e07a8c4358714083723c937731add331bf4ac9e335a7fa43a55f71a59a88059b0e6199995a0e0bfc8d1d8b3c2450c612f7c6014260a89747376d00495e74f5ad5640175d340e1ccd47eea7acbaf8165f1dd9d088fde1929cb8dcd797b983257b5e8b3a4cab6d9ca04a6b333d74ecda8929ac83386da167365cf129fed1835a200375168f47d2533fec5f7db333e05c261c80332935f954aaaba7f45d9d9de34ba1beb5eceae920eb8c8ab2e7c185806178e2b68b82a1461b27ab14d7f9207ab2c375d9da5c8c21a234b4d9103070769e8a43ec8a1a548bdbd779cee760c2b240ca"], 0x2000, 0x0) msgrcv(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008aacd66214f8a650cc5aa8e965f2da000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000f1000000000000000000000000000000e100"/228], 0xffffffc9, 0x0, 0x0) 18:44:17 executing program 4: r0 = creat(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='vegas\x00', 0x6) getsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:44:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 18:44:17 executing program 1: r0 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000a00)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000094440000000000000000000000050000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000edffffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000e2ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff02000000000000000000000000000100000000080000000000000000000000000000000000000000000000000040ac0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000001c0000000000000000000000000000a613a2230000000000000000000000dfd0282e31b8046d600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ded937a77f657744296e5d4300000000000404110061ca7c55a5e42d81d14334c789375b23d36d0b7bd15e04e813cd723f47ce56dffa04c1f203e51942829b669c021a132a47ccf4ac88c150bfed88c8aa4d9defaf6839814663b22c44fc5c577657253c50de4d1797c8a8195d482f8537d4f9aeaf495c01d5a31348917325b55b4136f49a20b50d881350d03870439d9749097585033723069099a0c14b7ca9b9fdbba4b31e8658d38d801fc0741fd6d09437d0c202fb169986510e42a9013102247ae529fe94b9529742c76d1825a441f8205c765deabf008b3e6ac5064c0c2ca8030c651abbfe7fe8803ff6a2a5de91470a21ed3a29fbe853bf2625e006004540a74b2b69d9add19c110c2cccfc32f7f99ea69994f81d903641120915cdcf49efeed42a2054e0544b5f53f43e4f7ab5b6037071e14229606aa0c3d7b7313232a904dbaedc6bd9fe7a1e54afc699624941b6c58fe24ca2338d97bbae7b60c350e72039f84320e39fdf444997aa080a882a81da917d4739bcbb223be6ab216c4426283ebf2a37e3e88b6c09b5cde0603e2f899871f52e76054243f680e620f6896c8c78a66f84e43692478c0135b491ac8248dd51f11f90704784f1912f13541c500158cae97708faf31b49"], 0x310) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 18:44:17 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r2, @ANYBLOB="00000014f1ffffffffffffff0800010092667100480002000000000000000080b9a00600000000000000030000000033cc3598c9aa81da8faa78bdf1000000000000000000000000de7f4687000000000000000000000001009900007c24f1583940ea0e363002e94564838f54825863fe646c248656cb5d845549c5ceffcfeaab4260fca524afef20c0034fbd32262c964c61f3771603fd386dc70a77e574632bd950e808d63007d6c6251ac28f9305ccc10036b4385f7c3b376b621f863af067671514a292528d7d2bef3b8444b64c875270810633f2eb7d7a89d0f3cf2074bb2e190708593cd728026dfe7b7bc2cbc705ed95700983ea22eefa47c53200758e28ba5302e15a86aff40a0cb61a079c3d088e18f3326fa3a5dcd32cb951da688b87961591b4671e40cf37feaa14dd000000000000321e6e4daef23cf875a4f2da5da7ecf526f153140e6740200000b3c3c0f6656f9021957cb27486eea0345bdf43b770452e1353b94884160ab1357707dacc631c885e515d18f9e1697a8604cd27f232de351b821c373ad44e60efd73e28c85c3f602e"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 18:44:17 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000013c0)=[{&(0x7f00000000c0)="c3115bef32dfe62e787d1486d70472424812d1496091", 0x16}, {&(0x7f0000001340)="462fb57685ed5a228b3c62cee61179aaac7c83b0e2ccb1fb58fdc6bccda312f6c09488b1cc4501b06a75", 0x2a}], 0x2, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x8000000f, 0x0) 18:44:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 18:44:18 executing program 5: r0 = creat(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='vegas\x00', 0x6) getsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:44:18 executing program 0: r0 = creat(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='vegas\x00', 0x6) getsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:44:18 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r2, @ANYBLOB="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"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 18:44:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 18:44:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 18:44:18 executing program 4: r0 = creat(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='vegas\x00', 0x6) getsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:44:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 18:44:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 18:44:18 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r2, @ANYBLOB="00000014f1ffffffffffffff0800010092667100480002000000000000000080b9a00600000000000000030000000033cc3598c9aa81da8faa78bdf1000000000000000000000000de7f4687000000000000000000000001009900007c24f1583940ea0e363002e94564838f54825863fe646c248656cb5d845549c5ceffcfeaab4260fca524afef20c0034fbd32262c964c61f3771603fd386dc70a77e574632bd950e808d63007d6c6251ac28f9305ccc10036b4385f7c3b376b621f863af067671514a292528d7d2bef3b8444b64c875270810633f2eb7d7a89d0f3cf2074bb2e190708593cd728026dfe7b7bc2cbc705ed95700983ea22eefa47c53200758e28ba5302e15a86aff40a0cb61a079c3d088e18f3326fa3a5dcd32cb951da688b87961591b4671e40cf37feaa14dd000000000000321e6e4daef23cf875a4f2da5da7ecf526f153140e6740200000b3c3c0f6656f9021957cb27486eea0345bdf43b770452e1353b94884160ab1357707dacc631c885e515d18f9e1697a8604cd27f232de351b821c373ad44e60efd73e28c85c3f602e"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 18:44:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000128000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 18:44:18 executing program 2: socket(0x1a, 0x0, 0x0) 18:44:18 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r2, @ANYBLOB="00000014f1ffffffffffffff0800010092667100480002000000000000000080b9a00600000000000000030000000033cc3598c9aa81da8faa78bdf1000000000000000000000000de7f4687000000000000000000000001009900007c24f1583940ea0e363002e94564838f54825863fe646c248656cb5d845549c5ceffcfeaab4260fca524afef20c0034fbd32262c964c61f3771603fd386dc70a77e574632bd950e808d63007d6c6251ac28f9305ccc10036b4385f7c3b376b621f863af067671514a292528d7d2bef3b8444b64c875270810633f2eb7d7a89d0f3cf2074bb2e190708593cd728026dfe7b7bc2cbc705ed95700983ea22eefa47c53200758e28ba5302e15a86aff40a0cb61a079c3d088e18f3326fa3a5dcd32cb951da688b87961591b4671e40cf37feaa14dd000000000000321e6e4daef23cf875a4f2da5da7ecf526f153140e6740200000b3c3c0f6656f9021957cb27486eea0345bdf43b770452e1353b94884160ab1357707dacc631c885e515d18f9e1697a8604cd27f232de351b821c373ad44e60efd73e28c85c3f602e"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 18:44:19 executing program 5: r0 = creat(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='vegas\x00', 0x6) getsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:44:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000bc0), 0x4000000000002e5, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000004e00)=[{0x0, 0xfffffe43, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000100001e03000010", @ANYRES32, @ANYRES32], 0x18}], 0x492492492492556, 0x0) 18:44:19 executing program 3: r0 = socket$inet(0x10, 0x803, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 18:44:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpriority(0x2, 0x0) 18:44:19 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x7c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}], 0x1c) 18:44:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 18:44:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x136, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100005}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) 18:44:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x136, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x22, 0x829, 0xf0ffff, 0x0, {0x4, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) 18:44:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003000)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/136, 0x88}, {&(0x7f0000000a40)=""/185, 0xb9}, {&(0x7f0000000b00)=""/48, 0x30}], 0x3}}], 0x1, 0x0, 0x0) 18:44:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 175.881340][ T9206] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:44:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 18:44:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000019500)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8, 0xa}]]}}}]}, 0x3c}}, 0x0) 18:44:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 176.312567][ T9218] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 18:44:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000bc0), 0x4000000000002e5, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000004e00)=[{0x0, 0xfffffe43, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000100001e03000010", @ANYRES32, @ANYRES32], 0x18}], 0x492492492492556, 0x0) 18:44:20 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffd) 18:44:20 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0x368, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000440)) 18:44:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xffffffffffffff95) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x44c50b86, @ipv4={[], [], @multicast2}}, 0xfffffffffffffee5) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:44:20 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f00000000c0)={0x5, 0x7, 0x0, 0x0, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}]}) 18:44:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x136, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100005}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) 18:44:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x136, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x22, 0x829, 0xf0ffff, 0x0, {0x4, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) 18:44:21 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000080), 0x4) 18:44:21 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f00000000c0)={0x5, 0x7, 0x0, 0x0, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}]}) [ 176.882463][ T9238] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 18:44:21 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000440)=[{&(0x7f0000001680)=""/4096, 0x1000}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x100000032, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 18:44:21 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f00000000c0)={0x5, 0x7, 0x0, 0x0, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}]}) 18:44:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f0000000100)={0x1}, 0x116) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r2, &(0x7f0000002780)=[{{0x0, 0x363, &(0x7f0000000200)=[{&(0x7f0000000140), 0x304}], 0x8}, 0x2}], 0x13, 0x24000004) 18:44:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000bc0), 0x4000000000002e5, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000004e00)=[{0x0, 0xfffffe43, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000100001e03000010", @ANYRES32, @ANYRES32], 0x18}], 0x492492492492556, 0x0) 18:44:21 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = pidfd_open(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r1, &(0x7f0000000340), 0x40000000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x4, 0x5, 0xff800000, 0x3, 0x3, 0xb68a, 0x0, 0x40, 0x343, 0x1, 0xd5, 0x38, 0x1, 0x81, 0x1, 0x1f}, [{0x0, 0x7, 0x0, 0x3f, 0x5, 0x800, 0x653, 0x7}], "a204c623fec0fc271d9e791f69dad12e941bdf9e04030b482b4c0cf3f014", [[], [], [], [], [], [], [], [], [], []]}, 0xa96) pread64(r2, &(0x7f0000000180)=""/64, 0x40, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x20000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 18:44:21 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f00000000c0)={0x5, 0x7, 0x0, 0x0, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}]}) 18:44:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x136, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100005}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) 18:44:21 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 18:44:21 executing program 5: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r2, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) utimes(&(0x7f0000000040)='./file0\x00', 0x0) 18:44:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x136, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x22, 0x829, 0xf0ffff, 0x0, {0x4, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) 18:44:21 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x5, 0x4) listen(r0, 0x6) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x204e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) [ 177.606543][ T9275] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 177.942978][ T9284] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 18:44:22 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) listen(r0, 0x4d) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) [ 177.995589][ T9275] syz-executor.0 (9275) used greatest stack depth: 21592 bytes left 18:44:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x136, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100005}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) 18:44:22 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = pidfd_open(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r1, &(0x7f0000000340), 0x40000000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x4, 0x5, 0xff800000, 0x3, 0x3, 0xb68a, 0x0, 0x40, 0x343, 0x1, 0xd5, 0x38, 0x1, 0x81, 0x1, 0x1f}, [{0x0, 0x7, 0x0, 0x3f, 0x5, 0x800, 0x653, 0x7}], "a204c623fec0fc271d9e791f69dad12e941bdf9e04030b482b4c0cf3f014", [[], [], [], [], [], [], [], [], [], []]}, 0xa96) pread64(r2, &(0x7f0000000180)=""/64, 0x40, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x20000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 18:44:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x136, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x22, 0x829, 0xf0ffff, 0x0, {0x4, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) 18:44:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000bc0), 0x4000000000002e5, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000004e00)=[{0x0, 0xfffffe43, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000100001e03000010", @ANYRES32, @ANYRES32], 0x18}], 0x492492492492556, 0x0) 18:44:22 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) listen(r0, 0x4d) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 18:44:22 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = pidfd_open(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r1, &(0x7f0000000340), 0x40000000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x4, 0x5, 0xff800000, 0x3, 0x3, 0xb68a, 0x0, 0x40, 0x343, 0x1, 0xd5, 0x38, 0x1, 0x81, 0x1, 0x1f}, [{0x0, 0x7, 0x0, 0x3f, 0x5, 0x800, 0x653, 0x7}], "a204c623fec0fc271d9e791f69dad12e941bdf9e04030b482b4c0cf3f014", [[], [], [], [], [], [], [], [], [], []]}, 0xa96) pread64(r2, &(0x7f0000000180)=""/64, 0x40, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x20000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 18:44:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x14, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000c88000)={r1, 0x0, &(0x7f000089b000)}, 0x20) 18:44:22 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) listen(r0, 0x4d) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 18:44:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) inotify_init1(0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xb4/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec{3nC\xbe\xd2v:\x95\xf2\x99:\xa2fK>\xc8i\xb3\xad4\x05\x87GJ%\x95\x9f{G\xd02j\xdek\xca\x9ax\xcd:P~\xd3g\xa5T04\xee\xe8[2\xd7\x8e\x92~m\x1f4\xef.\xd1\xf9!V\xb5\xf7\x12\x85\x7f\xbf\xe6\x1f\xa1\xcc\xd4\xda\n~>0\xc5.\x84\xda\xfc\x9e\xde\xaa\xee\xa6\xbb\xc20\x9e\xd5\x93\xf0p6N\xd6WL\x7fP\xe3\xd9\x8dK\xffG\xe0\x98\x14\xb5\xe5z\x036\xc2o\xc8\xa9\xdc\x85\xd8\x14\xcda\xf2\xc5Xr\x9d\x91\xd0\x18\x86\xa2\xdb\xbe\xa3bwE{\xcbr\x88\xc5\xc3\xab\t\x9a\x0e\xd7\xbcb\\\f\x05O\xe2dUQ\xef?W\xf49U\x16\xe8\xee\xea\xaa\x88\x1f\xf3Lp4\xf1\xe9\xb2!\x0e+\x9f\x89\x03^z\xa8C\xa2\x14\xd6Pt\x89\xc0\xbe\xff\xd60$\x0e\x81\xa3\xccO\x101\x10\x9d\xb7\xf3\xba\xaa\xd6\xdf*\xe7\"`\xb8.\x97G\f\xe1xh\x16\x9f^\x06C', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8) r1 = socket$inet(0xa, 0x0, 0x0) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x8) accept4(r1, 0x0, 0x0, 0x0) [ 178.731285][ T9318] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 18:44:23 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) listen(r0, 0x4d) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 18:44:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x14, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000c88000)={r1, 0x0, &(0x7f000089b000)}, 0x20) 18:44:23 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = pidfd_open(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r1, &(0x7f0000000340), 0x40000000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x4, 0x5, 0xff800000, 0x3, 0x3, 0xb68a, 0x0, 0x40, 0x343, 0x1, 0xd5, 0x38, 0x1, 0x81, 0x1, 0x1f}, [{0x0, 0x7, 0x0, 0x3f, 0x5, 0x800, 0x653, 0x7}], "a204c623fec0fc271d9e791f69dad12e941bdf9e04030b482b4c0cf3f014", [[], [], [], [], [], [], [], [], [], []]}, 0xa96) pread64(r2, &(0x7f0000000180)=""/64, 0x40, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x20000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 18:44:23 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6f20f56d24, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 179.369521][ T9348] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 179.383510][ T9348] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 179.422475][ T9348] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 179.477292][ T9348] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 179.503635][ T9348] EXT4-fs (loop3): mount failed 18:44:24 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = pidfd_open(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r1, &(0x7f0000000340), 0x40000000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x4, 0x5, 0xff800000, 0x3, 0x3, 0xb68a, 0x0, 0x40, 0x343, 0x1, 0xd5, 0x38, 0x1, 0x81, 0x1, 0x1f}, [{0x0, 0x7, 0x0, 0x3f, 0x5, 0x800, 0x653, 0x7}], "a204c623fec0fc271d9e791f69dad12e941bdf9e04030b482b4c0cf3f014", [[], [], [], [], [], [], [], [], [], []]}, 0xa96) pread64(r2, &(0x7f0000000180)=""/64, 0x40, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x20000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 18:44:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) inotify_init1(0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xb4/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec{3nC\xbe\xd2v:\x95\xf2\x99:\xa2fK>\xc8i\xb3\xad4\x05\x87GJ%\x95\x9f{G\xd02j\xdek\xca\x9ax\xcd:P~\xd3g\xa5T04\xee\xe8[2\xd7\x8e\x92~m\x1f4\xef.\xd1\xf9!V\xb5\xf7\x12\x85\x7f\xbf\xe6\x1f\xa1\xcc\xd4\xda\n~>0\xc5.\x84\xda\xfc\x9e\xde\xaa\xee\xa6\xbb\xc20\x9e\xd5\x93\xf0p6N\xd6WL\x7fP\xe3\xd9\x8dK\xffG\xe0\x98\x14\xb5\xe5z\x036\xc2o\xc8\xa9\xdc\x85\xd8\x14\xcda\xf2\xc5Xr\x9d\x91\xd0\x18\x86\xa2\xdb\xbe\xa3bwE{\xcbr\x88\xc5\xc3\xab\t\x9a\x0e\xd7\xbcb\\\f\x05O\xe2dUQ\xef?W\xf49U\x16\xe8\xee\xea\xaa\x88\x1f\xf3Lp4\xf1\xe9\xb2!\x0e+\x9f\x89\x03^z\xa8C\xa2\x14\xd6Pt\x89\xc0\xbe\xff\xd60$\x0e\x81\xa3\xccO\x101\x10\x9d\xb7\xf3\xba\xaa\xd6\xdf*\xe7\"`\xb8.\x97G\f\xe1xh\x16\x9f^\x06C', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8) r1 = socket$inet(0xa, 0x0, 0x0) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x8) accept4(r1, 0x0, 0x0, 0x0) 18:44:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) inotify_init1(0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xb4/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec{3nC\xbe\xd2v:\x95\xf2\x99:\xa2fK>\xc8i\xb3\xad4\x05\x87GJ%\x95\x9f{G\xd02j\xdek\xca\x9ax\xcd:P~\xd3g\xa5T04\xee\xe8[2\xd7\x8e\x92~m\x1f4\xef.\xd1\xf9!V\xb5\xf7\x12\x85\x7f\xbf\xe6\x1f\xa1\xcc\xd4\xda\n~>0\xc5.\x84\xda\xfc\x9e\xde\xaa\xee\xa6\xbb\xc20\x9e\xd5\x93\xf0p6N\xd6WL\x7fP\xe3\xd9\x8dK\xffG\xe0\x98\x14\xb5\xe5z\x036\xc2o\xc8\xa9\xdc\x85\xd8\x14\xcda\xf2\xc5Xr\x9d\x91\xd0\x18\x86\xa2\xdb\xbe\xa3bwE{\xcbr\x88\xc5\xc3\xab\t\x9a\x0e\xd7\xbcb\\\f\x05O\xe2dUQ\xef?W\xf49U\x16\xe8\xee\xea\xaa\x88\x1f\xf3Lp4\xf1\xe9\xb2!\x0e+\x9f\x89\x03^z\xa8C\xa2\x14\xd6Pt\x89\xc0\xbe\xff\xd60$\x0e\x81\xa3\xccO\x101\x10\x9d\xb7\xf3\xba\xaa\xd6\xdf*\xe7\"`\xb8.\x97G\f\xe1xh\x16\x9f^\x06C', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8) r1 = socket$inet(0xa, 0x0, 0x0) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x8) accept4(r1, 0x0, 0x0, 0x0) 18:44:24 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket(0x40000000015, 0x5, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x89e1, 0x70f000) 18:44:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x14, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000c88000)={r1, 0x0, &(0x7f000089b000)}, 0x20) 18:44:24 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001200098417feb1ae7aa778f40000ff3f0e000000000000000000001419001c", 0x23}], 0x1) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x103}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") 18:44:24 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = pidfd_open(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r1, &(0x7f0000000340), 0x40000000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x4, 0x5, 0xff800000, 0x3, 0x3, 0xb68a, 0x0, 0x40, 0x343, 0x1, 0xd5, 0x38, 0x1, 0x81, 0x1, 0x1f}, [{0x0, 0x7, 0x0, 0x3f, 0x5, 0x800, 0x653, 0x7}], "a204c623fec0fc271d9e791f69dad12e941bdf9e04030b482b4c0cf3f014", [[], [], [], [], [], [], [], [], [], []]}, 0xa96) pread64(r2, &(0x7f0000000180)=""/64, 0x40, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x20000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 18:44:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x14, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000c88000)={r1, 0x0, &(0x7f000089b000)}, 0x20) 18:44:24 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = pidfd_open(0xffffffffffffffff, 0x0) waitid$P_PIDFD(0x3, r1, &(0x7f0000000340), 0x40000000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x4, 0x5, 0xff800000, 0x3, 0x3, 0xb68a, 0x0, 0x40, 0x343, 0x1, 0xd5, 0x38, 0x1, 0x81, 0x1, 0x1f}, [{0x0, 0x7, 0x0, 0x3f, 0x5, 0x800, 0x653, 0x7}], "a204c623fec0fc271d9e791f69dad12e941bdf9e04030b482b4c0cf3f014", [[], [], [], [], [], [], [], [], [], []]}, 0xa96) pread64(r2, &(0x7f0000000180)=""/64, 0x40, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x20000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 18:44:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) inotify_init1(0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xb4/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec{3nC\xbe\xd2v:\x95\xf2\x99:\xa2fK>\xc8i\xb3\xad4\x05\x87GJ%\x95\x9f{G\xd02j\xdek\xca\x9ax\xcd:P~\xd3g\xa5T04\xee\xe8[2\xd7\x8e\x92~m\x1f4\xef.\xd1\xf9!V\xb5\xf7\x12\x85\x7f\xbf\xe6\x1f\xa1\xcc\xd4\xda\n~>0\xc5.\x84\xda\xfc\x9e\xde\xaa\xee\xa6\xbb\xc20\x9e\xd5\x93\xf0p6N\xd6WL\x7fP\xe3\xd9\x8dK\xffG\xe0\x98\x14\xb5\xe5z\x036\xc2o\xc8\xa9\xdc\x85\xd8\x14\xcda\xf2\xc5Xr\x9d\x91\xd0\x18\x86\xa2\xdb\xbe\xa3bwE{\xcbr\x88\xc5\xc3\xab\t\x9a\x0e\xd7\xbcb\\\f\x05O\xe2dUQ\xef?W\xf49U\x16\xe8\xee\xea\xaa\x88\x1f\xf3Lp4\xf1\xe9\xb2!\x0e+\x9f\x89\x03^z\xa8C\xa2\x14\xd6Pt\x89\xc0\xbe\xff\xd60$\x0e\x81\xa3\xccO\x101\x10\x9d\xb7\xf3\xba\xaa\xd6\xdf*\xe7\"`\xb8.\x97G\f\xe1xh\x16\x9f^\x06C', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8) r1 = socket$inet(0xa, 0x0, 0x0) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x8) accept4(r1, 0x0, 0x0, 0x0) [ 180.181504][ T9381] netlink: 'syz-executor.3': attribute type 28 has an invalid length. 18:44:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) inotify_init1(0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xb4/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec{3nC\xbe\xd2v:\x95\xf2\x99:\xa2fK>\xc8i\xb3\xad4\x05\x87GJ%\x95\x9f{G\xd02j\xdek\xca\x9ax\xcd:P~\xd3g\xa5T04\xee\xe8[2\xd7\x8e\x92~m\x1f4\xef.\xd1\xf9!V\xb5\xf7\x12\x85\x7f\xbf\xe6\x1f\xa1\xcc\xd4\xda\n~>0\xc5.\x84\xda\xfc\x9e\xde\xaa\xee\xa6\xbb\xc20\x9e\xd5\x93\xf0p6N\xd6WL\x7fP\xe3\xd9\x8dK\xffG\xe0\x98\x14\xb5\xe5z\x036\xc2o\xc8\xa9\xdc\x85\xd8\x14\xcda\xf2\xc5Xr\x9d\x91\xd0\x18\x86\xa2\xdb\xbe\xa3bwE{\xcbr\x88\xc5\xc3\xab\t\x9a\x0e\xd7\xbcb\\\f\x05O\xe2dUQ\xef?W\xf49U\x16\xe8\xee\xea\xaa\x88\x1f\xf3Lp4\xf1\xe9\xb2!\x0e+\x9f\x89\x03^z\xa8C\xa2\x14\xd6Pt\x89\xc0\xbe\xff\xd60$\x0e\x81\xa3\xccO\x101\x10\x9d\xb7\xf3\xba\xaa\xd6\xdf*\xe7\"`\xb8.\x97G\f\xe1xh\x16\x9f^\x06C', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8) r1 = socket$inet(0xa, 0x0, 0x0) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x8) accept4(r1, 0x0, 0x0, 0x0) 18:44:24 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x400445a0, &(0x7f0000000100)=""/51) 18:44:24 executing program 4: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x20000004e21, @multicast1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 18:44:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) inotify_init1(0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xb4/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec{3nC\xbe\xd2v:\x95\xf2\x99:\xa2fK>\xc8i\xb3\xad4\x05\x87GJ%\x95\x9f{G\xd02j\xdek\xca\x9ax\xcd:P~\xd3g\xa5T04\xee\xe8[2\xd7\x8e\x92~m\x1f4\xef.\xd1\xf9!V\xb5\xf7\x12\x85\x7f\xbf\xe6\x1f\xa1\xcc\xd4\xda\n~>0\xc5.\x84\xda\xfc\x9e\xde\xaa\xee\xa6\xbb\xc20\x9e\xd5\x93\xf0p6N\xd6WL\x7fP\xe3\xd9\x8dK\xffG\xe0\x98\x14\xb5\xe5z\x036\xc2o\xc8\xa9\xdc\x85\xd8\x14\xcda\xf2\xc5Xr\x9d\x91\xd0\x18\x86\xa2\xdb\xbe\xa3bwE{\xcbr\x88\xc5\xc3\xab\t\x9a\x0e\xd7\xbcb\\\f\x05O\xe2dUQ\xef?W\xf49U\x16\xe8\xee\xea\xaa\x88\x1f\xf3Lp4\xf1\xe9\xb2!\x0e+\x9f\x89\x03^z\xa8C\xa2\x14\xd6Pt\x89\xc0\xbe\xff\xd60$\x0e\x81\xa3\xccO\x101\x10\x9d\xb7\xf3\xba\xaa\xd6\xdf*\xe7\"`\xb8.\x97G\f\xe1xh\x16\x9f^\x06C', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8) r1 = socket$inet(0xa, 0x0, 0x0) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x8) accept4(r1, 0x0, 0x0, 0x0) 18:44:24 executing program 3: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @remote}}, 0x1e) connect$pptp(r0, &(0x7f0000000300)={0x18, 0x2, {0x8, @initdev={0xac, 0x1d}}}, 0x1e) 18:44:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f00000000c0)=0x1, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) 18:44:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) inotify_init1(0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xb4/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec{3nC\xbe\xd2v:\x95\xf2\x99:\xa2fK>\xc8i\xb3\xad4\x05\x87GJ%\x95\x9f{G\xd02j\xdek\xca\x9ax\xcd:P~\xd3g\xa5T04\xee\xe8[2\xd7\x8e\x92~m\x1f4\xef.\xd1\xf9!V\xb5\xf7\x12\x85\x7f\xbf\xe6\x1f\xa1\xcc\xd4\xda\n~>0\xc5.\x84\xda\xfc\x9e\xde\xaa\xee\xa6\xbb\xc20\x9e\xd5\x93\xf0p6N\xd6WL\x7fP\xe3\xd9\x8dK\xffG\xe0\x98\x14\xb5\xe5z\x036\xc2o\xc8\xa9\xdc\x85\xd8\x14\xcda\xf2\xc5Xr\x9d\x91\xd0\x18\x86\xa2\xdb\xbe\xa3bwE{\xcbr\x88\xc5\xc3\xab\t\x9a\x0e\xd7\xbcb\\\f\x05O\xe2dUQ\xef?W\xf49U\x16\xe8\xee\xea\xaa\x88\x1f\xf3Lp4\xf1\xe9\xb2!\x0e+\x9f\x89\x03^z\xa8C\xa2\x14\xd6Pt\x89\xc0\xbe\xff\xd60$\x0e\x81\xa3\xccO\x101\x10\x9d\xb7\xf3\xba\xaa\xd6\xdf*\xe7\"`\xb8.\x97G\f\xe1xh\x16\x9f^\x06C', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8) r1 = socket$inet(0xa, 0x0, 0x0) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x8) accept4(r1, 0x0, 0x0, 0x0) 18:44:25 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000240)='/dev/v4l-subdev#\x00', 0x4e7, 0x0) ppoll(&(0x7f00000003c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 182.515420][ T9457] IPVS: ftp: loaded support on port[0] = 21 [ 182.645997][ T9457] chnl_net:caif_netlink_parms(): no params data found [ 182.681238][ T9457] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.688518][ T9457] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.696797][ T9457] device bridge_slave_0 entered promiscuous mode [ 182.705065][ T9457] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.712174][ T9457] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.720131][ T9457] device bridge_slave_1 entered promiscuous mode [ 182.739867][ T9457] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 182.751014][ T9457] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 182.842468][ T9457] team0: Port device team_slave_0 added [ 182.850293][ T9457] team0: Port device team_slave_1 added [ 182.915705][ T9457] device hsr_slave_0 entered promiscuous mode [ 182.963853][ T9457] device hsr_slave_1 entered promiscuous mode [ 183.003452][ T9457] debugfs: Directory 'hsr0' with parent '/' already present! [ 183.019990][ T9457] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.027188][ T9457] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.035047][ T9457] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.042122][ T9457] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.085053][ T9457] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.206295][ T9457] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.213880][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.222685][ T8755] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.231112][ T8755] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.240947][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 183.263783][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.265730][ T9460] IPVS: ftp: loaded support on port[0] = 21 [ 183.272241][ T2867] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.284831][ T2867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.292665][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.301432][ T2867] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.308531][ T2867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.358891][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.368274][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.387092][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.410158][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.513489][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.523577][ T9457] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.546565][ T9460] chnl_net:caif_netlink_parms(): no params data found [ 183.590078][ T9460] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.597396][ T9460] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.606562][ T9460] device bridge_slave_0 entered promiscuous mode [ 183.617597][ T9457] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.625672][ T9460] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.632753][ T9460] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.641443][ T9460] device bridge_slave_1 entered promiscuous mode [ 183.668541][ T9460] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 183.682114][ T9460] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 183.709486][ T9460] team0: Port device team_slave_0 added [ 183.791290][ T9460] team0: Port device team_slave_1 added [ 183.856602][ T9460] device hsr_slave_0 entered promiscuous mode [ 183.888309][ T9460] device hsr_slave_1 entered promiscuous mode [ 183.923764][ T9460] debugfs: Directory 'hsr0' with parent '/' already present! [ 183.966649][ T9468] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 18:44:28 executing program 5: syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x0, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0xfffffd7a, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 18:44:28 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x196) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:44:28 executing program 2: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x33}}}, 0xa0) r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180), 0xc, 0x0}, 0x0) ioctl(r0, 0xffffffffffffffaa, &(0x7f0000000180)) [ 185.051561][ T9460] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.079922][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.088766][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.102332][ T9460] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.121849][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.139031][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.148209][ T2867] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.155590][ T2867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.244561][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.252480][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.265972][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.276559][ T84] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.283691][ T84] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.291644][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.300879][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.309745][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.318758][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.327519][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.336474][ T84] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.351149][ T9460] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 185.361893][ T9460] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 185.375888][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.384127][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.392606][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.401124][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.409781][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.418206][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.440940][ T9460] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.486968][ T395] device bridge_slave_1 left promiscuous mode [ 185.493519][ T395] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.528072][ T395] device bridge_slave_0 left promiscuous mode [ 185.535301][ T395] bridge0: port 1(bridge_slave_0) entered disabled state 18:44:29 executing program 5: unshare(0x400) r0 = perf_event_open(&(0x7f0000001900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f00000003c0)) 18:44:29 executing program 2: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x33}}}, 0xa0) r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180), 0xc, 0x0}, 0x0) ioctl(r0, 0xffffffffffffffaa, &(0x7f0000000180)) 18:44:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f00000003c0)) timer_delete(0x0) 18:44:29 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0x46, 0x0, &(0x7f00000000c0)=0xfffffd9b) 18:44:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 18:44:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup(0xffffffffffffffff) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 18:44:29 executing program 2: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x33}}}, 0xa0) r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180), 0xc, 0x0}, 0x0) ioctl(r0, 0xffffffffffffffaa, &(0x7f0000000180)) 18:44:29 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x31f}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r0, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000002, 0x4) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, 0x0) [ 185.729896][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:44:30 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000540)=[{0x0, 0x0, 0x1000}, {&(0x7f0000000840)="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", 0x157, 0x7f}]) 18:44:30 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89ec, &(0x7f0000000100)={0x0, "ae865c7c379c228cd25a0e412724038a47e316858b8a858286d250198267519f138fb4f147f00535e7fccda5c371a0b5545757bd4613d77bd685b331a2822b851a8bfb16660756ddcd0246a3ffcef3e2796c1dcc1df1820d0bf53055a0bd1c391d943eafef6c37cbf8560e7fe9412801e69027477d6e3cc388f7b2d1c00241a7"}) [ 186.215205][ T9542] loop4: AHDI p2 18:44:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup(0xffffffffffffffff) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 18:44:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup(0xffffffffffffffff) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 186.335947][ T9542] loop4: AHDI p2 18:44:30 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x31f}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r0, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000002, 0x4) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, 0x0) 18:44:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x3}}, 0x2e) dup2(r1, r2) [ 186.549773][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:44:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) [ 186.655251][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:44:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xffffff92) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x2, {0x7, 0x1d, 0x0, 0x0, 0xc00, 0xc00}}, 0x50) [ 189.274325][ T395] device hsr_slave_0 left promiscuous mode [ 189.313611][ T395] device hsr_slave_1 left promiscuous mode [ 189.368339][ T395] team0 (unregistering): Port device team_slave_1 removed [ 189.386031][ T395] team0 (unregistering): Port device team_slave_0 removed [ 189.400755][ T395] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 189.481332][ T395] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 189.602459][ T395] bond0 (unregistering): Released all slaves [ 189.785722][ T9583] IPVS: ftp: loaded support on port[0] = 21 [ 189.906718][ T9583] chnl_net:caif_netlink_parms(): no params data found [ 189.940593][ T9583] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.948170][ T9583] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.956101][ T9583] device bridge_slave_0 entered promiscuous mode [ 189.964146][ T9583] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.971373][ T9583] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.980087][ T9583] device bridge_slave_1 entered promiscuous mode [ 190.000917][ T9583] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 190.012014][ T9583] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 190.035402][ T9583] team0: Port device team_slave_0 added [ 190.042793][ T9583] team0: Port device team_slave_1 added [ 190.106779][ T9583] device hsr_slave_0 entered promiscuous mode [ 190.143840][ T9583] device hsr_slave_1 entered promiscuous mode [ 190.196660][ T9583] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.203821][ T9583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.211138][ T9583] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.218282][ T9583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.260114][ T9583] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.274061][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.282821][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.291593][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.308885][ T9583] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.319981][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.328921][ T8780] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.336019][ T8780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.355688][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.364638][ T2867] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.371708][ T2867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.392533][ T9583] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 190.408534][ T9583] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.421011][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.430302][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.438951][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.447475][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.456491][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.464322][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.483973][ T9583] 8021q: adding VLAN 0 to HW filter on device batadv0 18:44:34 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0x5f, 0x1) getdents(r0, &(0x7f0000000180)=""/150, 0x96) 18:44:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 18:44:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x31f}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r0, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000002, 0x4) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, 0x0) 18:44:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup(0xffffffffffffffff) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 18:44:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup(0xffffffffffffffff) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 18:44:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 190.677727][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 190.816071][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:44:35 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0x5f, 0x1) getdents(r0, &(0x7f0000000180)=""/150, 0x96) 18:44:35 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0x5f, 0x1) getdents(r0, &(0x7f0000000180)=""/150, 0x96) 18:44:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000440)=0x0) io_destroy(r0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$KDGKBLED(0xffffffffffffffff, 0x40045108, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x304}, 0x9c) 18:44:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup(0xffffffffffffffff) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 18:44:35 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0x5f, 0x1) getdents(r0, &(0x7f0000000180)=""/150, 0x96) 18:44:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup(0xffffffffffffffff) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 18:44:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000440)=0x0) io_destroy(r0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$KDGKBLED(0xffffffffffffffff, 0x40045108, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x304}, 0x9c) [ 191.774645][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 191.788575][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:44:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x31f}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r0, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000002, 0x4) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, 0x0) 18:44:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000440)=0x0) io_destroy(r0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$KDGKBLED(0xffffffffffffffff, 0x40045108, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x304}, 0x9c) 18:44:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000500)=@newsa={0x140, 0x10, 0x40d, 0x0, 0x0, {{@in=@dev, @in6=@rand_addr="53ac9fe54f55edf45596dbdd8f96b25d"}, {@in=@empty, 0x0, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@tfcpad={0x8}, @algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x140}}, 0x0) 18:44:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x492492492492805, 0x0) 18:44:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:44:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9067f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@can_newroute={0x34, 0x18, 0x0, 0x0, 0x0, {}, [@CGW_MOD_UID={0x8}, @CGW_MOD_AND={0x18, 0x1, {{{}, 0x0, 0x3, 0x0, 0x0, "da6427a6d86063da"}}}]}, 0x34}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) 18:44:36 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x1e9c, &(0x7f0000000100)=0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r1, 0x2, &(0x7f0000000540)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 18:44:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000440)=0x0) io_destroy(r0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$KDGKBLED(0xffffffffffffffff, 0x40045108, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x304}, 0x9c) 18:44:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x492492492492805, 0x0) 18:44:37 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x1e9c, &(0x7f0000000100)=0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r1, 0x2, &(0x7f0000000540)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 192.988581][ T9674] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 193.018998][ T9674] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 18:44:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x492492492492805, 0x0) 18:44:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000440)=0x0) io_destroy(r0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$KDGKBLED(0xffffffffffffffff, 0x40045108, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x304}, 0x9c) [ 193.044669][ T9674] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 193.116817][ T9674] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 18:44:37 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x1e9c, &(0x7f0000000100)=0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r1, 0x2, &(0x7f0000000540)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 193.304792][ T9674] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 18:44:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x492492492492805, 0x0) 18:44:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:44:37 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x1e9c, &(0x7f0000000100)=0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r1, 0x2, &(0x7f0000000540)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 18:44:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:44:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000440)=0x0) io_destroy(r0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$KDGKBLED(0xffffffffffffffff, 0x40045108, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x304}, 0x9c) 18:44:39 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x0) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x3c9, 0x341) 18:44:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_PACKETS_PER_SLAVE={0x8, 0x2, 0xffffffff}]}}}]}, 0x3c}}, 0x0) 18:44:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000440)=0x0) io_destroy(r0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$KDGKBLED(0xffffffffffffffff, 0x40045108, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x304}, 0x9c) 18:44:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:44:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet6(r0, &(0x7f0000002dc0)=[{{0x0, 0x101, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=[@pktinfo={{0x24, 0x29, 0x32, {@initdev={0xfe, 0x88, [], 0x0, 0x0}, r2}}}], 0x28}}], 0x2, 0x0) 18:44:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000000)={0x300, [0x0]}) 18:44:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_PACKETS_PER_SLAVE={0x8, 0x2, 0xffffffff}]}}}]}, 0x3c}}, 0x0) 18:44:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x20) r1 = socket(0xa, 0x40000000002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/anycast6\x00') preadv(r2, &(0x7f0000001a00)=[{&(0x7f0000001840)=""/67, 0x43}, {&(0x7f00000018c0)=""/85, 0x55}], 0x2, 0x0) 18:44:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet6(r0, &(0x7f0000002dc0)=[{{0x0, 0x101, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=[@pktinfo={{0x24, 0x29, 0x32, {@initdev={0xfe, 0x88, [], 0x0, 0x0}, r2}}}], 0x28}}], 0x2, 0x0) 18:44:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_PACKETS_PER_SLAVE={0x8, 0x2, 0xffffffff}]}}}]}, 0x3c}}, 0x0) 18:44:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:44:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = dup(r0) sendto$inet(r0, 0x0, 0x0, 0x20008779, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 18:44:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet6(r0, &(0x7f0000002dc0)=[{{0x0, 0x101, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=[@pktinfo={{0x24, 0x29, 0x32, {@initdev={0xfe, 0x88, [], 0x0, 0x0}, r2}}}], 0x28}}], 0x2, 0x0) 18:44:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r2 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2d, 0x4, @tid=r2}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r4 = gettid() r5 = getpid() rt_tgsigqueueinfo(r5, r4, 0x15, &(0x7f0000000080)) read(r3, &(0x7f0000000080)=""/117, 0xfdc9) 18:44:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_PACKETS_PER_SLAVE={0x8, 0x2, 0xffffffff}]}}}]}, 0x3c}}, 0x0) 18:44:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:44:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = dup(r0) sendto$inet(r0, 0x0, 0x0, 0x20008779, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 18:44:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet6(r0, &(0x7f0000002dc0)=[{{0x0, 0x101, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=[@pktinfo={{0x24, 0x29, 0x32, {@initdev={0xfe, 0x88, [], 0x0, 0x0}, r2}}}], 0x28}}], 0x2, 0x0) 18:44:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'eql\x00', 0xd102}) preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000ec0)=""/202, 0x200011b9}], 0x1, 0x0) dup2(r2, r3) r4 = gettid() tkill(r4, 0x1000000000016) 18:44:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) 18:44:42 executing program 3: unshare(0x2040400) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x20000001}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0x2, 0x800000000000004, 0x15, 0x28ad, 0x0, 0xffffffffffffffff, 0x0, [0x30], 0x0, r0, 0x0, 0x1}, 0x3c) 18:44:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'eql\x00', 0xd102}) preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000ec0)=""/202, 0x200011b9}], 0x1, 0x0) dup2(r2, r3) r4 = gettid() tkill(r4, 0x1000000000016) 18:44:43 executing program 3: syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x10000000000000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x10, r2, 0x0) write$P9_RSYMLINK(r2, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="56ef63761508000000000000dca311833f47c70327b3a774ab1c31ad5c4ba2c0d7cc34e0841e5a543503ab"], 0x2b) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) fchown(0xffffffffffffffff, 0x0, 0xee01) 18:44:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = dup(r0) sendto$inet(r0, 0x0, 0x0, 0x20008779, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 18:44:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'eql\x00', 0xd102}) preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000ec0)=""/202, 0x200011b9}], 0x1, 0x0) dup2(r2, r3) r4 = gettid() tkill(r4, 0x1000000000016) [ 199.098352][ T9822] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 199.107888][ T9822] FAT-fs (loop3): Filesystem has been set read-only [ 199.117627][ T9822] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 199.128324][ T9822] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 199.138155][ T9822] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 199.157253][ T9817] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 18:44:43 executing program 1: syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x10000000000000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x10, r2, 0x0) write$P9_RSYMLINK(r2, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="56ef63761508000000000000dca311833f47c70327b3a774ab1c31ad5c4ba2c0d7cc34e0841e5a543503ab"], 0x2b) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) fchown(0xffffffffffffffff, 0x0, 0xee01) 18:44:43 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 18:44:43 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = socket(0xa, 0x0, 0x0) close(r1) 18:44:43 executing program 3: syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x10000000000000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x10, r2, 0x0) write$P9_RSYMLINK(r2, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="56ef63761508000000000000dca311833f47c70327b3a774ab1c31ad5c4ba2c0d7cc34e0841e5a543503ab"], 0x2b) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) fchown(0xffffffffffffffff, 0x0, 0xee01) 18:44:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'eql\x00', 0xd102}) preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000ec0)=""/202, 0x200011b9}], 0x1, 0x0) dup2(r2, r3) r4 = gettid() tkill(r4, 0x1000000000016) 18:44:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = dup(r0) sendto$inet(r0, 0x0, 0x0, 0x20008779, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 18:44:44 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000000)=0x9, 0x4) 18:44:44 executing program 1: syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x10000000000000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x10, r2, 0x0) write$P9_RSYMLINK(r2, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="56ef63761508000000000000dca311833f47c70327b3a774ab1c31ad5c4ba2c0d7cc34e0841e5a543503ab"], 0x2b) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) fchown(0xffffffffffffffff, 0x0, 0xee01) 18:44:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000000c0)={'n\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x2, [{}, {}]}, 0x48) 18:44:44 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = socket(0xa, 0x0, 0x0) close(r1) 18:44:44 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 18:44:44 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 18:44:44 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = socket(0xa, 0x0, 0x0) close(r1) 18:44:45 executing program 3: syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x10000000000000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x10, r2, 0x0) write$P9_RSYMLINK(r2, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="56ef63761508000000000000dca311833f47c70327b3a774ab1c31ad5c4ba2c0d7cc34e0841e5a543503ab"], 0x2b) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) fchown(0xffffffffffffffff, 0x0, 0xee01) 18:44:45 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = socket(0xa, 0x0, 0x0) close(r1) 18:44:45 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = socket(0xa, 0x0, 0x0) close(r1) 18:44:45 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 18:44:46 executing program 1: syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x10000000000000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x10, r2, 0x0) write$P9_RSYMLINK(r2, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="56ef63761508000000000000dca311833f47c70327b3a774ab1c31ad5c4ba2c0d7cc34e0841e5a543503ab"], 0x2b) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) fchown(0xffffffffffffffff, 0x0, 0xee01) 18:44:46 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 18:44:46 executing program 3: syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x10000000000000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x10, r2, 0x0) write$P9_RSYMLINK(r2, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="56ef63761508000000000000dca311833f47c70327b3a774ab1c31ad5c4ba2c0d7cc34e0841e5a543503ab"], 0x2b) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) fchown(0xffffffffffffffff, 0x0, 0xee01) 18:44:46 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = socket(0xa, 0x0, 0x0) close(r1) 18:44:47 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = socket(0xa, 0x0, 0x0) close(r1) 18:44:47 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 18:44:47 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = socket(0xa, 0x0, 0x0) close(r1) 18:44:47 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = socket(0xa, 0x0, 0x0) close(r1) 18:44:47 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) [ 203.614712][ T9959] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 203.886745][ T9959] FAT-fs (loop3): Filesystem has been set read-only [ 204.010108][ T9959] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 204.093748][ T9959] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 18:44:48 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x20141042, 0x0) write$selinux_attr(r2, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, &(0x7f0000000300), 0x2008000fffffffe) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000000)=""/56, 0x38}], 0x1) 18:44:48 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = socket(0xa, 0x0, 0x0) close(r1) 18:44:48 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = socket(0xa, 0x0, 0x0) close(r1) 18:44:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x100000000000021a) 18:44:48 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0x0, 0x1000}, {0x0, 0x68}, {}], 0x3) semop(r0, &(0x7f0000000240), 0x6) semctl$IPC_RMID(r0, 0x0, 0x0) 18:44:48 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0x0, 0x1000}, {0x0, 0x68}, {}], 0x3) semop(r0, &(0x7f0000000240), 0x6) semctl$IPC_RMID(r0, 0x0, 0x0) 18:44:48 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0x0, 0x1000}, {0x0, 0x68}, {}], 0x3) semop(r0, &(0x7f0000000240), 0x6) semctl$IPC_RMID(r0, 0x0, 0x0) 18:44:48 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0x0, 0x1000}, {0x0, 0x68}, {}], 0x3) semop(r0, &(0x7f0000000240), 0x6) semctl$IPC_RMID(r0, 0x0, 0x0) 18:44:49 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0x0, 0x1000}, {0x0, 0x68}, {}], 0x3) semop(r0, &(0x7f0000000240), 0x6) semctl$IPC_RMID(r0, 0x0, 0x0) 18:44:49 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0x0, 0x1000}, {0x0, 0x68}, {}], 0x3) semop(r0, &(0x7f0000000240), 0x6) semctl$IPC_RMID(r0, 0x0, 0x0) 18:44:49 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0x0, 0x1000}, {0x0, 0x68}, {}], 0x3) semop(r0, &(0x7f0000000240), 0x6) semctl$IPC_RMID(r0, 0x0, 0x0) 18:44:49 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0x0, 0x1000}, {0x0, 0x68}, {}], 0x3) semop(r0, &(0x7f0000000240), 0x6) semctl$IPC_RMID(r0, 0x0, 0x0) 18:44:49 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x20141042, 0x0) write$selinux_attr(r2, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, &(0x7f0000000300), 0x2008000fffffffe) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000000)=""/56, 0x38}], 0x1) 18:44:49 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0x0, 0x1000}, {0x0, 0x68}, {}], 0x3) semop(r0, &(0x7f0000000240), 0x6) semctl$IPC_RMID(r0, 0x0, 0x0) 18:44:49 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0x0, 0x1000}, {0x0, 0x68}, {}], 0x3) semop(r0, &(0x7f0000000240), 0x6) semctl$IPC_RMID(r0, 0x0, 0x0) 18:44:49 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = socket(0xa, 0x0, 0x0) close(r1) 18:44:49 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = socket(0xa, 0x0, 0x0) close(r1) 18:44:49 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x73) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000006fc0), 0x9, 0x10000, 0x0) 18:44:50 executing program 0: r0 = eventfd2(0x0, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x20141042, 0x0) write$selinux_attr(r2, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, &(0x7f0000000300), 0x2008000fffffffe) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000000)=""/56, 0x38}], 0x1) 18:44:50 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r1, 0x107, 0x14, &(0x7f0000651000)=""/240, &(0x7f0000000100)=0x483) 18:44:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}, @ptr={0x0, 0x0, 0x0, 0xa}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x1}, 0x20) 18:44:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0xf0ffff, &(0x7f0000000180)={&(0x7f0000000340)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x3c}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14}]}, 0x104}}, 0x0) 18:44:50 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x20141042, 0x0) write$selinux_attr(r2, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, &(0x7f0000000300), 0x2008000fffffffe) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000000)=""/56, 0x38}], 0x1) 18:44:50 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r1, 0x107, 0x14, &(0x7f0000651000)=""/240, &(0x7f0000000100)=0x483) [ 206.244516][T10117] mip6: mip6_destopt_init_state: state's mode is not 2: 0 18:44:50 executing program 0: r0 = eventfd2(0x0, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x20141042, 0x0) write$selinux_attr(r2, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, &(0x7f0000000300), 0x2008000fffffffe) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000000)=""/56, 0x38}], 0x1) 18:44:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x32, &(0x7f0000000000), 0x4) 18:44:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000200), 0x0) [ 206.465253][T10124] mip6: mip6_destopt_init_state: state's mode is not 2: 0 [ 206.583527][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 206.589882][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 206.595793][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 206.601585][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:44:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0xfffffe9a, 0x3, 0x0, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:44:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000200), 0x0) [ 206.743426][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 206.749326][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 206.823436][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 206.829325][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 206.868733][T10146] kvm [10140]: vcpu0, guest rIP: 0xcc kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x1, nop [ 206.887863][T10146] kvm [10140]: vcpu0, guest rIP: 0xcc kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x1, nop 18:44:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000200), 0x0) 18:44:51 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x20141042, 0x0) write$selinux_attr(r2, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, &(0x7f0000000300), 0x2008000fffffffe) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000000)=""/56, 0x38}], 0x1) 18:44:51 executing program 0: r0 = eventfd2(0x0, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x20141042, 0x0) write$selinux_attr(r2, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, &(0x7f0000000300), 0x2008000fffffffe) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000000)=""/56, 0x38}], 0x1) 18:44:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r1, 0x107, 0x14, &(0x7f0000651000)=""/240, &(0x7f0000000100)=0x483) [ 206.916686][T10146] kvm [10140]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 18:44:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000240)={0x1, 0x0, [{0x0, 0x1, 0x0, 0x0, @msi={0x0, 0x80000000}}]}) 18:44:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r1, 0x107, 0x14, &(0x7f0000651000)=""/240, &(0x7f0000000100)=0x483) 18:44:51 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)='y\x00', 0x2, 0x4) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443"}}}, 0x88) syz_genetlink_get_family_id$tipc(0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x4c02, &(0x7f0000000180)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x12}) fcntl$setlease(r1, 0x400, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001900), 0xa) creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) 18:44:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000200), 0x0) 18:44:51 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) r2 = dup2(r1, r0) read$char_usb(r2, &(0x7f0000000080)=""/147, 0x93) 18:44:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) syz_open_procfs(0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) 18:44:51 executing program 2: r0 = socket$inet(0x10, 0x2000000003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@uid={'uid', 0x3d, r1}}]}) 18:44:51 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) dup(0xffffffffffffffff) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) shutdown(0xffffffffffffffff, 0x0) futex(&(0x7f0000000340)=0x1, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f0000000440)=0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000280)={0xa0, 0x0, 0x8, {{0x0, 0x3, 0x2000000000000, 0x6, 0x1f, 0x7, {0x3, 0x5, 0x8, 0x153c, 0xfffffffe0, 0x7, 0x4, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x1ff}}, {0x0, 0x66b0c27fb34fd0cf}}}, 0xa0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000001000800120000000100000000000000000006000000000000000000000800000200e00040e0ff00000000000000000000000000ada800800400004015000000000003000600df120000020000809014ffbbf00000000000000003000500000100000200423b30632bd7b820000000000003"], 0x80}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x32bc45944b084a6, 0x7000028) 18:44:51 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x6e, 0x0, 0xa, 0x4, 0x3f}) 18:44:51 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x6e, 0x0, 0xa, 0x4, 0x3f}) 18:44:52 executing program 2: r0 = socket$inet(0x10, 0x2000000003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@uid={'uid', 0x3d, r1}}]}) 18:44:52 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)='y\x00', 0x2, 0x4) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443"}}}, 0x88) syz_genetlink_get_family_id$tipc(0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x4c02, &(0x7f0000000180)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x12}) fcntl$setlease(r1, 0x400, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001900), 0xa) creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) 18:44:52 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x6e, 0x0, 0xa, 0x4, 0x3f}) 18:44:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) syz_open_procfs(0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) 18:44:52 executing program 2: r0 = socket$inet(0x10, 0x2000000003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@uid={'uid', 0x3d, r1}}]}) 18:44:52 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x6e, 0x0, 0xa, 0x4, 0x3f}) 18:44:52 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) r2 = dup2(r1, r0) read$char_usb(r2, &(0x7f0000000080)=""/147, 0x93) 18:44:52 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)='y\x00', 0x2, 0x4) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443"}}}, 0x88) syz_genetlink_get_family_id$tipc(0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x4c02, &(0x7f0000000180)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x12}) fcntl$setlease(r1, 0x400, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001900), 0xa) creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) 18:44:53 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) dup(0xffffffffffffffff) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) shutdown(0xffffffffffffffff, 0x0) futex(&(0x7f0000000340)=0x1, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f0000000440)=0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000280)={0xa0, 0x0, 0x8, {{0x0, 0x3, 0x2000000000000, 0x6, 0x1f, 0x7, {0x3, 0x5, 0x8, 0x153c, 0xfffffffe0, 0x7, 0x4, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x1ff}}, {0x0, 0x66b0c27fb34fd0cf}}}, 0xa0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000001000800120000000100000000000000000006000000000000000000000800000200e00040e0ff00000000000000000000000000ada800800400004015000000000003000600df120000020000809014ffbbf00000000000000003000500000100000200423b30632bd7b820000000000003"], 0x80}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x32bc45944b084a6, 0x7000028) 18:44:53 executing program 2: r0 = socket$inet(0x10, 0x2000000003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@uid={'uid', 0x3d, r1}}]}) 18:44:53 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)='y\x00', 0x2, 0x4) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443"}}}, 0x88) syz_genetlink_get_family_id$tipc(0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x4c02, &(0x7f0000000180)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x12}) fcntl$setlease(r1, 0x400, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001900), 0xa) creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) 18:44:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) syz_open_procfs(0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) 18:44:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg$inet6(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@tclass={{0x14, 0x29, 0x43, 0x3}}], 0x18}, 0x0) 18:44:53 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)='y\x00', 0x2, 0x4) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443"}}}, 0x88) syz_genetlink_get_family_id$tipc(0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x4c02, &(0x7f0000000180)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x12}) fcntl$setlease(r1, 0x400, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001900), 0xa) creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) 18:44:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x2, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:44:53 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) r2 = dup2(r1, r0) read$char_usb(r2, &(0x7f0000000080)=""/147, 0x93) 18:44:54 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) dup(0xffffffffffffffff) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) shutdown(0xffffffffffffffff, 0x0) futex(&(0x7f0000000340)=0x1, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f0000000440)=0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000280)={0xa0, 0x0, 0x8, {{0x0, 0x3, 0x2000000000000, 0x6, 0x1f, 0x7, {0x3, 0x5, 0x8, 0x153c, 0xfffffffe0, 0x7, 0x4, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x1ff}}, {0x0, 0x66b0c27fb34fd0cf}}}, 0xa0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000001000800120000000100000000000000000006000000000000000000000800000200e00040e0ff00000000000000000000000000ada800800400004015000000000003000600df120000020000809014ffbbf00000000000000003000500000100000200423b30632bd7b820000000000003"], 0x80}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x32bc45944b084a6, 0x7000028) 18:44:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x2, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:44:54 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)='y\x00', 0x2, 0x4) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443"}}}, 0x88) syz_genetlink_get_family_id$tipc(0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x4c02, &(0x7f0000000180)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x12}) fcntl$setlease(r1, 0x400, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001900), 0xa) creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) 18:44:54 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)='y\x00', 0x2, 0x4) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443"}}}, 0x88) syz_genetlink_get_family_id$tipc(0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x4c02, &(0x7f0000000180)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x12}) fcntl$setlease(r1, 0x400, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001900), 0xa) creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) 18:44:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) syz_open_procfs(0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) 18:44:55 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) r2 = dup2(r1, r0) read$char_usb(r2, &(0x7f0000000080)=""/147, 0x93) 18:44:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x2, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:44:55 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/p\x92mx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000040)=""/148, 0x18) 18:44:55 executing program 1: ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000000)=""/41) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) ftruncate(0xffffffffffffffff, 0x200004) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) 18:44:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r1 = syz_open_dev$radio(0x0, 0x0, 0x2) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[], 0x0) r2 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00'}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000), 0x4) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x0, 0x6}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000004c0)={r5, @in6={{0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}}}, &(0x7f00000005c0)=0x84) recvmmsg(r2, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}], 0x1a8, 0x2040, 0x0) r6 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)='X', 0x1, r6) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000080)={r6, 0xd7, 0xca}, &(0x7f0000000140)={'enc=', 'raw', ' hash=', {'crct10dif\x00'}}, &(0x7f00000001c0)="4200adf5f7f659f5e41db37411fbe44cc70f74fb5d9fa1194df8bf2c663e0897f4b3465ea0281542db3f816073e10a09f5549446cf4e262a1dabc73049043782eb41a3b97dcc0a025eb8d08733942a3670ececd0c633d9ac3901f50ca161bc42eabd8f988f1ac8160274fc4569457cc41b0fdd0555490c96426d2b217211de9b727578b0e519cc603912c94c05f9ad2c7e31f5de6dece559dea1b3113bf08b5e05e51eda2358b8118949d000d7912fcf9ae034a6df6484273bb8899c4cb14dc98f6db6f1479a8a01b1fc719db6672eab11d151e44c4683", &(0x7f00000003c0)=""/202) 18:44:55 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/p\x92mx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000040)=""/148, 0x18) 18:44:55 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) dup(0xffffffffffffffff) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) shutdown(0xffffffffffffffff, 0x0) futex(&(0x7f0000000340)=0x1, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f0000000440)=0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000280)={0xa0, 0x0, 0x8, {{0x0, 0x3, 0x2000000000000, 0x6, 0x1f, 0x7, {0x3, 0x5, 0x8, 0x153c, 0xfffffffe0, 0x7, 0x4, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x1ff}}, {0x0, 0x66b0c27fb34fd0cf}}}, 0xa0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000001000800120000000100000000000000000006000000000000000000000800000200e00040e0ff00000000000000000000000000ada800800400004015000000000003000600df120000020000809014ffbbf00000000000000003000500000100000200423b30632bd7b820000000000003"], 0x80}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x32bc45944b084a6, 0x7000028) 18:44:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x2, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:44:55 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/p\x92mx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000040)=""/148, 0x18) 18:44:56 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/p\x92mx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000040)=""/148, 0x18) 18:44:56 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/p\x92mx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000040)=""/148, 0x18) 18:44:56 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000100)=""/41, 0x2) close(r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x2d) write$binfmt_misc(r2, &(0x7f0000001400)=ANY=[@ANYRES32], 0x4) splice(r0, 0x0, r1, 0x0, 0x200, 0x0) [ 212.356452][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 212.356468][ T26] audit: type=1804 audit(1572374696.527:31): pid=10534 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir774372386/syzkaller.S2GX1R/53/file0/file0" dev="loop1" ino=26 res=1 18:44:56 executing program 1: ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000000)=""/41) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) ftruncate(0xffffffffffffffff, 0x200004) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) 18:44:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r1 = syz_open_dev$radio(0x0, 0x0, 0x2) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[], 0x0) r2 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00'}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000), 0x4) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x0, 0x6}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000004c0)={r5, @in6={{0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}}}, &(0x7f00000005c0)=0x84) recvmmsg(r2, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}], 0x1a8, 0x2040, 0x0) r6 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)='X', 0x1, r6) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000080)={r6, 0xd7, 0xca}, &(0x7f0000000140)={'enc=', 'raw', ' hash=', {'crct10dif\x00'}}, &(0x7f00000001c0)="4200adf5f7f659f5e41db37411fbe44cc70f74fb5d9fa1194df8bf2c663e0897f4b3465ea0281542db3f816073e10a09f5549446cf4e262a1dabc73049043782eb41a3b97dcc0a025eb8d08733942a3670ececd0c633d9ac3901f50ca161bc42eabd8f988f1ac8160274fc4569457cc41b0fdd0555490c96426d2b217211de9b727578b0e519cc603912c94c05f9ad2c7e31f5de6dece559dea1b3113bf08b5e05e51eda2358b8118949d000d7912fcf9ae034a6df6484273bb8899c4cb14dc98f6db6f1479a8a01b1fc719db6672eab11d151e44c4683", &(0x7f00000003c0)=""/202) 18:44:56 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/p\x92mx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000040)=""/148, 0x18) 18:44:56 executing program 3: ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000000)=""/41) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) ftruncate(0xffffffffffffffff, 0x200004) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) 18:44:56 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000100)=""/41, 0x2) close(r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x2d) write$binfmt_misc(r2, &(0x7f0000001400)=ANY=[@ANYRES32], 0x4) splice(r0, 0x0, r1, 0x0, 0x200, 0x0) 18:44:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r1 = syz_open_dev$radio(0x0, 0x0, 0x2) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[], 0x0) r2 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00'}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000), 0x4) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x0, 0x6}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000004c0)={r5, @in6={{0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}}}, &(0x7f00000005c0)=0x84) recvmmsg(r2, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}], 0x1a8, 0x2040, 0x0) r6 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)='X', 0x1, r6) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000080)={r6, 0xd7, 0xca}, &(0x7f0000000140)={'enc=', 'raw', ' hash=', {'crct10dif\x00'}}, &(0x7f00000001c0)="4200adf5f7f659f5e41db37411fbe44cc70f74fb5d9fa1194df8bf2c663e0897f4b3465ea0281542db3f816073e10a09f5549446cf4e262a1dabc73049043782eb41a3b97dcc0a025eb8d08733942a3670ececd0c633d9ac3901f50ca161bc42eabd8f988f1ac8160274fc4569457cc41b0fdd0555490c96426d2b217211de9b727578b0e519cc603912c94c05f9ad2c7e31f5de6dece559dea1b3113bf08b5e05e51eda2358b8118949d000d7912fcf9ae034a6df6484273bb8899c4cb14dc98f6db6f1479a8a01b1fc719db6672eab11d151e44c4683", &(0x7f00000003c0)=""/202) [ 212.669327][ T26] audit: type=1804 audit(1572374696.607:32): pid=10508 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir774372386/syzkaller.S2GX1R/53/file0/file0" dev="loop1" ino=26 res=1 18:44:56 executing program 0: ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000000)=""/41) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) ftruncate(0xffffffffffffffff, 0x200004) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) 18:44:57 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/p\x92mx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000040)=""/148, 0x18) 18:44:57 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000100)=""/41, 0x2) close(r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x2d) write$binfmt_misc(r2, &(0x7f0000001400)=ANY=[@ANYRES32], 0x4) splice(r0, 0x0, r1, 0x0, 0x200, 0x0) 18:44:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) r1 = syz_open_dev$radio(0x0, 0x0, 0x2) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[], 0x0) r2 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00'}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000), 0x4) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x0, 0x6}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000004c0)={r5, @in6={{0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}}}, &(0x7f00000005c0)=0x84) recvmmsg(r2, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}], 0x1a8, 0x2040, 0x0) r6 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)='X', 0x1, r6) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000080)={r6, 0xd7, 0xca}, &(0x7f0000000140)={'enc=', 'raw', ' hash=', {'crct10dif\x00'}}, &(0x7f00000001c0)="4200adf5f7f659f5e41db37411fbe44cc70f74fb5d9fa1194df8bf2c663e0897f4b3465ea0281542db3f816073e10a09f5549446cf4e262a1dabc73049043782eb41a3b97dcc0a025eb8d08733942a3670ececd0c633d9ac3901f50ca161bc42eabd8f988f1ac8160274fc4569457cc41b0fdd0555490c96426d2b217211de9b727578b0e519cc603912c94c05f9ad2c7e31f5de6dece559dea1b3113bf08b5e05e51eda2358b8118949d000d7912fcf9ae034a6df6484273bb8899c4cb14dc98f6db6f1479a8a01b1fc719db6672eab11d151e44c4683", &(0x7f00000003c0)=""/202) 18:44:57 executing program 2: ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000000)=""/41) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) ftruncate(0xffffffffffffffff, 0x200004) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) 18:44:57 executing program 0: ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000000)=""/41) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) ftruncate(0xffffffffffffffff, 0x200004) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) 18:44:57 executing program 1: ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000000)=""/41) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) ftruncate(0xffffffffffffffff, 0x200004) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) 18:44:57 executing program 3: ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000000)=""/41) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) ftruncate(0xffffffffffffffff, 0x200004) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) 18:44:57 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000100)=""/41, 0x2) close(r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x2d) write$binfmt_misc(r2, &(0x7f0000001400)=ANY=[@ANYRES32], 0x4) splice(r0, 0x0, r1, 0x0, 0x200, 0x0) 18:44:59 executing program 2: ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000000)=""/41) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) ftruncate(0xffffffffffffffff, 0x200004) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) 18:44:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) dup2(r1, r0) 18:44:59 executing program 1: ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000000)=""/41) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) ftruncate(0xffffffffffffffff, 0x200004) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) 18:44:59 executing program 3: ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000000)=""/41) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) ftruncate(0xffffffffffffffff, 0x200004) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) 18:44:59 executing program 0: ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000000)=""/41) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) ftruncate(0xffffffffffffffff, 0x200004) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) 18:44:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) dup2(r1, r0) 18:44:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) dup2(r1, r0) 18:44:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) dup2(r1, r0) 18:45:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) dup2(r1, r0) 18:45:00 executing program 2: ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000000)=""/41) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) ftruncate(0xffffffffffffffff, 0x200004) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) 18:45:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) dup2(r1, r0) 18:45:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) dup2(r1, r0) 18:45:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) dup2(r1, r0) 18:45:00 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@rand_addr="849a16a8a178e5001bbdb420f3ca2184", @in6=@remote}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in=@local}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) 18:45:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@remote, @in=@empty}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 18:45:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) 18:45:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) dup2(r1, r0) 18:45:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000000)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 18:45:01 executing program 2: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x2011, r1, 0x0) mmap(&(0x7f0000196000/0x4000)=nil, 0xc07000, 0xffffffffefffffff, 0x8032, 0xffffffffffffffff, 0x0) 18:45:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) dup2(r1, r0) [ 217.482501][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 217.488409][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 217.494283][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 217.500056][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 217.506567][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 217.512338][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:45:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}) 18:45:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@remote, @in=@empty}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 18:45:02 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) [ 217.767971][T10697] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 18:45:02 executing program 4: rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2fffd, 0xa30000}, 0xffffffffffffffff}, 0x20, 0x0, 0x0) 18:45:02 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@rand_addr="849a16a8a178e5001bbdb420f3ca2184", @in6=@remote}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in=@local}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) 18:45:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@remote, @in=@empty}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 18:45:02 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00\x1e\x00', &(0x7f0000002fc0)=@ethtool_gstrings={0x1b, 0x5}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0xee, 0x0, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) [ 218.238562][T10724] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 18:45:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@remote, @in=@empty}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 18:45:02 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@rand_addr="849a16a8a178e5001bbdb420f3ca2184", @in6=@remote}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in=@local}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) [ 218.522505][T10740] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 18:45:02 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x0) ioctl$BLKFRASET(r0, 0x1264, 0x0) 18:45:02 executing program 2: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x2011, r1, 0x0) mmap(&(0x7f0000196000/0x4000)=nil, 0xc07000, 0xffffffffefffffff, 0x8032, 0xffffffffffffffff, 0x0) 18:45:02 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@rand_addr="849a16a8a178e5001bbdb420f3ca2184", @in6=@remote}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in=@local}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) [ 218.893683][T10749] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 18:45:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}) 18:45:03 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) 18:45:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1002}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x01\x00\x01\x00\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6a\xd8c\xe4\x9b\b\x00\x00\x00\x00\x00\x00\x00[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf1X\x8bk9fx\xe7\xba\x156\x04\b\x00\x00\x00\x00\x00\x00\x001\xeb\x8e\xb1\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4m\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd7|\xde^U\x11\x02\x1dm\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\xa5\xca\x91\xe5u#D\xbd\xdfCZ\xf52\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R\x01\x00\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f\f\x9d\xcb\x11\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\r=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x1bR\r>\xd1P\x10;9o\xc2>\t\x0eZ9\x0f\xa1\xc2\x96\x1c\xff\xca\x98\xa8$sj\x99\b\xc7\x94F \xfd\x11H\xc3\xaaM\x8a\x98\x96\xd5\xab\xc6\x01\n1\bN\x14\xd5\fp\x8e\xd7\n^\xa0\xbfP\xd4\xd0~\xach#5\xd9\x11\xba\xb9Z\x95\xe7z\xec\xf7\x01V\xce\xcd\xc39\xb3\xa2\x8b\xd6H\x9bhsK\xbd\x9a/\xc9\xd3\x9f\xbb\xe6X\x91\x00f\xd0\x96Q;\xc7M\xf0Y\xc6\xd6o,\f\x03\x9b\xb1~5r2\n>zH\xdc^\xc6\xb0\x15\xce\xf8s=\xf5\x17-\x90\x86,\x93t\xc8\x9585\x17h\x8bB!z)|\xe8k\xb9\xfd1\x0eL\nh\x0f\xbf)\xa1\x90\xd3 6T\x13\xc6&\x1a;T\xc7\xf3\\Ek\x0e\xcd\xbbv\x11\x91\xaby\xb8|1\x9a\x1c\x8a\xb6\xe7\x0e,\xaaU<\\m\x14|\xe3}\x00'/616) write(r0, &(0x7f0000000040)="35a8e9e12ed879815686f41f8864eaaec47fce97", 0x14) 18:45:03 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00\x1e\x00', &(0x7f0000002fc0)=@ethtool_gstrings={0x1b, 0x5}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0xee, 0x0, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) [ 219.011105][T10762] device nr0 entered promiscuous mode 18:45:03 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00\x1e\x00', &(0x7f0000002fc0)=@ethtool_gstrings={0x1b, 0x5}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0xee, 0x0, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) 18:45:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}) 18:45:03 executing program 2: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x2011, r1, 0x0) mmap(&(0x7f0000196000/0x4000)=nil, 0xc07000, 0xffffffffefffffff, 0x8032, 0xffffffffffffffff, 0x0) 18:45:03 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) [ 219.553420][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 219.559296][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 219.565173][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 219.570959][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:45:04 executing program 2: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x2011, r1, 0x0) mmap(&(0x7f0000196000/0x4000)=nil, 0xc07000, 0xffffffffefffffff, 0x8032, 0xffffffffffffffff, 0x0) [ 220.270241][T10792] device nr0 entered promiscuous mode 18:45:04 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) 18:45:04 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00\x1e\x00', &(0x7f0000002fc0)=@ethtool_gstrings={0x1b, 0x5}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0xee, 0x0, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) 18:45:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}) 18:45:04 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00\x1e\x00', &(0x7f0000002fc0)=@ethtool_gstrings={0x1b, 0x5}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0xee, 0x0, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) 18:45:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}) 18:45:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x24020400) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) recvfrom$x25(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 18:45:05 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00\x1e\x00', &(0x7f0000002fc0)=@ethtool_gstrings={0x1b, 0x5}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0xee, 0x0, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) 18:45:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x1}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 221.664992][T10825] netlink: 'syz-executor.4': attribute type 24 has an invalid length. [ 221.718152][T10825] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 221.761101][T10825] INFO: trying to register non-static key. [ 221.766949][T10825] the code is fine but needs lockdep annotation. [ 221.773271][T10825] turning off the locking correctness validator. [ 221.779605][T10825] CPU: 0 PID: 10825 Comm: syz-executor.4 Not tainted 5.4.0-rc5-next-20191029 #0 [ 221.788626][T10825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.798694][T10825] Call Trace: [ 221.801993][T10825] dump_stack+0x172/0x1f0 [ 221.806331][T10825] register_lock_class+0x179e/0x1850 [ 221.811616][T10825] ? unwind_get_return_address+0x61/0xa0 [ 221.817259][T10825] ? profile_setup.cold+0xbb/0xbb [ 221.822295][T10825] ? arch_stack_walk+0x97/0xf0 [ 221.827066][T10825] ? is_dynamic_key+0x1c0/0x1c0 [ 221.831909][T10825] __lock_acquire+0xf4/0x4a00 [ 221.836570][T10825] ? kasan_kmalloc+0x9/0x10 [ 221.841064][T10825] ? kmem_cache_alloc_node_trace+0x15a/0x750 [ 221.847131][T10825] ? __kmalloc_node+0x3d/0x70 [ 221.851795][T10825] ? kvmalloc_node+0x68/0x100 [ 221.856472][T10825] ? alloc_netdev_mqs+0x8b4/0xde0 [ 221.861502][T10825] ? rtnl_create_link+0x22d/0xab0 [ 221.866508][T10825] ? mark_held_locks+0xf0/0xf0 [ 221.871245][T10825] ? kasan_kmalloc+0x9/0x10 [ 221.875741][T10825] ? __kmalloc_node+0x4e/0x70 [ 221.880483][T10825] ? kvmalloc_node+0x68/0x100 [ 221.885147][T10825] ? alloc_netdev_mqs+0x8b4/0xde0 [ 221.890219][T10825] ? rtnl_create_link+0x22d/0xab0 [ 221.895246][T10825] ? __rtnl_newlink+0xfa3/0x16e0 [ 221.900161][T10825] ? rtnl_newlink+0x69/0xa0 [ 221.904653][T10825] ? rtnetlink_rcv_msg+0x45e/0xaf0 [ 221.909747][T10825] lock_acquire+0x190/0x410 [ 221.914231][T10825] ? bond_3ad_update_ad_actor_settings+0x37b/0x7b0 [ 221.920739][T10825] _raw_spin_lock_bh+0x33/0x50 [ 221.925492][T10825] ? bond_3ad_update_ad_actor_settings+0x37b/0x7b0 [ 221.931984][T10825] bond_3ad_update_ad_actor_settings+0x37b/0x7b0 [ 221.938292][T10825] ? bond_3ad_bind_slave+0x12e0/0x12e0 [ 221.943744][T10825] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 221.949704][T10825] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 221.955649][T10825] bond_option_ad_actor_sys_prio_set+0x67/0x80 [ 221.961902][T10825] __bond_opt_set+0x2a1/0x540 [ 221.966564][T10825] bond_changelink+0x14ed/0x1bd0 [ 221.971484][T10825] ? memset+0x32/0x40 [ 221.975445][T10825] ? bond_slave_changelink+0x1e0/0x1e0 [ 221.980884][T10825] bond_newlink+0x2d/0x90 [ 221.985191][T10825] ? bond_changelink+0x1bd0/0x1bd0 [ 221.990341][T10825] __rtnl_newlink+0x10a1/0x16e0 [ 221.995178][T10825] ? rtnl_link_unregister+0x250/0x250 [ 222.000533][T10825] ? is_bpf_text_address+0xce/0x160 [ 222.005755][T10825] ? kernel_text_address+0x73/0xf0 [ 222.010846][T10825] ? unwind_get_return_address+0x61/0xa0 [ 222.016455][T10825] ? profile_setup.cold+0xbb/0xbb [ 222.021458][T10825] ? arch_stack_walk+0x97/0xf0 [ 222.026315][T10825] ? stack_trace_save+0xac/0xe0 [ 222.031160][T10825] ? stack_trace_consume_entry+0x190/0x190 [ 222.036999][T10825] ? mark_lock+0xc2/0x1220 [ 222.041445][T10825] ? save_stack+0x5c/0x90 [ 222.045752][T10825] ? save_stack+0x23/0x90 [ 222.050070][T10825] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 222.055865][T10825] ? kasan_kmalloc+0x9/0x10 [ 222.060483][T10825] ? kmem_cache_alloc_trace+0x158/0x790 [ 222.066035][T10825] ? rtnl_newlink+0x4b/0xa0 [ 222.070620][T10825] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 222.076158][T10825] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 222.082122][T10825] rtnl_newlink+0x69/0xa0 [ 222.086441][T10825] ? __rtnl_newlink+0x16e0/0x16e0 [ 222.091445][T10825] rtnetlink_rcv_msg+0x45e/0xaf0 [ 222.096374][T10825] ? rtnl_bridge_getlink+0x910/0x910 [ 222.101637][T10825] ? netlink_deliver_tap+0x228/0xbe0 [ 222.106906][T10825] ? find_held_lock+0x35/0x130 [ 222.111657][T10825] netlink_rcv_skb+0x177/0x450 [ 222.116398][T10825] ? rtnl_bridge_getlink+0x910/0x910 [ 222.121669][T10825] ? netlink_ack+0xb50/0xb50 [ 222.126240][T10825] ? __kasan_check_read+0x11/0x20 [ 222.131240][T10825] ? netlink_deliver_tap+0x24a/0xbe0 [ 222.136511][T10825] rtnetlink_rcv+0x1d/0x30 [ 222.140921][T10825] netlink_unicast+0x531/0x710 [ 222.145681][T10825] ? netlink_attachskb+0x7c0/0x7c0 [ 222.150792][T10825] ? _copy_from_iter_full+0x25d/0x8c0 [ 222.156160][T10825] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 222.161873][T10825] ? __check_object_size+0x3d/0x437 [ 222.167049][T10825] netlink_sendmsg+0x8cf/0xda0 [ 222.171789][T10825] ? netlink_unicast+0x710/0x710 [ 222.176706][T10825] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 222.182238][T10825] ? apparmor_socket_sendmsg+0x2a/0x30 [ 222.187675][T10825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 222.193890][T10825] ? security_socket_sendmsg+0x8d/0xc0 [ 222.199380][T10825] ? netlink_unicast+0x710/0x710 [ 222.204309][T10825] sock_sendmsg+0xd7/0x130 [ 222.208738][T10825] ___sys_sendmsg+0x803/0x920 [ 222.213415][T10825] ? copy_msghdr_from_user+0x440/0x440 [ 222.218923][T10825] ? __kasan_check_read+0x11/0x20 [ 222.223998][T10825] ? __fget+0x37f/0x550 [ 222.228152][T10825] ? ksys_dup3+0x3e0/0x3e0 [ 222.232573][T10825] ? __fget_light+0x1a9/0x230 [ 222.237241][T10825] ? __fdget+0x1b/0x20 [ 222.241295][T10825] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 222.247531][T10825] __sys_sendmsg+0x105/0x1d0 [ 222.252102][T10825] ? __sys_sendmsg_sock+0xd0/0xd0 [ 222.257200][T10825] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 222.262644][T10825] ? do_syscall_64+0x26/0x760 [ 222.267308][T10825] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.273359][T10825] ? do_syscall_64+0x26/0x760 [ 222.278035][T10825] __x64_sys_sendmsg+0x78/0xb0 [ 222.282778][T10825] do_syscall_64+0xfa/0x760 [ 222.287262][T10825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.293133][T10825] RIP: 0033:0x459f49 [ 222.297008][T10825] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 222.316603][T10825] RSP: 002b:00007f743f98cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 222.325001][T10825] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 [ 222.332971][T10825] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000005 [ 222.340940][T10825] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 222.348891][T10825] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f743f98d6d4 18:45:06 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00\x1e\x00', &(0x7f0000002fc0)=@ethtool_gstrings={0x1b, 0x5}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0xee, 0x0, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) 18:45:06 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00\x1e\x00', &(0x7f0000002fc0)=@ethtool_gstrings={0x1b, 0x5}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0xee, 0x0, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) [ 222.356854][T10825] R13: 00000000004c8338 R14: 00000000004de608 R15: 00000000ffffffff [ 222.376831][ T3920] kobject: 'loop1' (0000000062d69964): kobject_uevent_env [ 222.384785][ T3920] kobject: 'loop1' (0000000062d69964): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 222.399326][T10825] kobject: 'bond1' (00000000c2ecf3f6): kobject_add_internal: parent: 'net', set: 'devices' [ 222.400677][ T3920] kobject: 'loop2' (0000000013544cc2): kobject_uevent_env [ 222.425915][ T3920] kobject: 'loop2' (0000000013544cc2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 222.433237][T10825] kobject: 'bond1' (00000000c2ecf3f6): kobject_uevent_env [ 222.443463][T10825] kobject: 'bond1' (00000000c2ecf3f6): fill_kobj_path: path = '/devices/virtual/net/bond1' [ 222.459361][T10825] kobject: 'queues' (000000009e8f6a6e): kobject_add_internal: parent: 'bond1', set: '' [ 222.469775][T10825] kobject: 'queues' (000000009e8f6a6e): kobject_uevent_env [ 222.478694][T10825] kobject: 'queues' (000000009e8f6a6e): kobject_uevent_env: filter function caused the event to drop! [ 222.493750][T10825] kobject: 'rx-0' (00000000d7f5733b): kobject_add_internal: parent: 'queues', set: 'queues' [ 222.507932][T10825] kobject: 'rx-0' (00000000d7f5733b): kobject_uevent_env [ 222.518518][T10825] kobject: 'rx-0' (00000000d7f5733b): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-0' [ 222.533233][T10825] kobject: 'rx-1' (00000000a2731a3c): kobject_add_internal: parent: 'queues', set: 'queues' [ 222.547140][T10825] kobject: 'rx-1' (00000000a2731a3c): kobject_uevent_env [ 222.554643][T10825] kobject: 'rx-1' (00000000a2731a3c): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-1' [ 222.570172][T10825] kobject: 'rx-2' (00000000a91d7209): kobject_add_internal: parent: 'queues', set: 'queues' [ 222.580755][T10825] kobject: 'rx-2' (00000000a91d7209): kobject_uevent_env [ 222.593055][T10825] kobject: 'rx-2' (00000000a91d7209): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-2' [ 222.607886][T10825] kobject: 'rx-3' (00000000080c4cc1): kobject_add_internal: parent: 'queues', set: 'queues' [ 222.618500][T10825] kobject: 'rx-3' (00000000080c4cc1): kobject_uevent_env [ 222.629276][T10825] kobject: 'rx-3' (00000000080c4cc1): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-3' [ 222.640773][T10825] kobject: 'rx-4' (0000000052d5acc3): kobject_add_internal: parent: 'queues', set: 'queues' [ 222.654829][T10825] kobject: 'rx-4' (0000000052d5acc3): kobject_uevent_env [ 222.662105][T10825] kobject: 'rx-4' (0000000052d5acc3): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-4' [ 222.676906][T10825] kobject: 'rx-5' (000000000bd90bef): kobject_add_internal: parent: 'queues', set: 'queues' [ 222.687619][T10825] kobject: 'rx-5' (000000000bd90bef): kobject_uevent_env [ 222.698356][T10825] kobject: 'rx-5' (000000000bd90bef): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-5' [ 222.709861][T10825] kobject: 'rx-6' (000000004ba59ab7): kobject_add_internal: parent: 'queues', set: 'queues' [ 222.731188][T10825] kobject: 'rx-6' (000000004ba59ab7): kobject_uevent_env [ 222.750142][T10825] kobject: 'rx-6' (000000004ba59ab7): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-6' [ 222.761627][T10825] kobject: 'rx-7' (00000000b66a5aac): kobject_add_internal: parent: 'queues', set: 'queues' [ 222.772323][T10825] kobject: 'rx-7' (00000000b66a5aac): kobject_uevent_env [ 222.779719][T10825] kobject: 'rx-7' (00000000b66a5aac): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-7' [ 222.790993][T10825] kobject: 'rx-8' (00000000c0df28b7): kobject_add_internal: parent: 'queues', set: 'queues' [ 222.801166][T10825] kobject: 'rx-8' (00000000c0df28b7): kobject_uevent_env [ 222.808256][T10825] kobject: 'rx-8' (00000000c0df28b7): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-8' [ 222.819382][T10825] kobject: 'rx-9' (0000000009c4183a): kobject_add_internal: parent: 'queues', set: 'queues' [ 222.829979][T10825] kobject: 'rx-9' (0000000009c4183a): kobject_uevent_env [ 222.837166][T10825] kobject: 'rx-9' (0000000009c4183a): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-9' [ 222.848228][T10825] kobject: 'rx-10' (000000004236ffed): kobject_add_internal: parent: 'queues', set: 'queues' [ 222.858471][T10825] kobject: 'rx-10' (000000004236ffed): kobject_uevent_env [ 222.865656][T10825] kobject: 'rx-10' (000000004236ffed): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-10' [ 222.876896][T10825] kobject: 'rx-11' (000000002f00ac6b): kobject_add_internal: parent: 'queues', set: 'queues' [ 222.887122][T10825] kobject: 'rx-11' (000000002f00ac6b): kobject_uevent_env [ 222.894315][T10825] kobject: 'rx-11' (000000002f00ac6b): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-11' [ 222.905613][T10825] kobject: 'rx-12' (00000000b2704edf): kobject_add_internal: parent: 'queues', set: 'queues' [ 222.915853][T10825] kobject: 'rx-12' (00000000b2704edf): kobject_uevent_env [ 222.922978][T10825] kobject: 'rx-12' (00000000b2704edf): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-12' [ 222.934319][T10825] kobject: 'rx-13' (000000008248d047): kobject_add_internal: parent: 'queues', set: 'queues' [ 222.944598][T10825] kobject: 'rx-13' (000000008248d047): kobject_uevent_env [ 222.951718][T10825] kobject: 'rx-13' (000000008248d047): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-13' [ 222.962947][T10825] kobject: 'rx-14' (000000006d584c74): kobject_add_internal: parent: 'queues', set: 'queues' [ 222.973206][T10825] kobject: 'rx-14' (000000006d584c74): kobject_uevent_env [ 222.980543][T10825] kobject: 'rx-14' (000000006d584c74): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-14' [ 222.991751][T10825] kobject: 'rx-15' (000000005ab15d52): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.002136][T10825] kobject: 'rx-15' (000000005ab15d52): kobject_uevent_env [ 223.009328][T10825] kobject: 'rx-15' (000000005ab15d52): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-15' [ 223.020574][T10825] kobject: 'tx-0' (00000000424c81ac): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.030750][T10825] kobject: 'tx-0' (00000000424c81ac): kobject_uevent_env [ 223.037836][T10825] kobject: 'tx-0' (00000000424c81ac): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-0' [ 223.048876][T10825] kobject: 'tx-1' (0000000033bb6f18): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.059203][T10825] kobject: 'tx-1' (0000000033bb6f18): kobject_uevent_env [ 223.066319][T10825] kobject: 'tx-1' (0000000033bb6f18): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-1' [ 223.078095][T10825] kobject: 'tx-2' (0000000052ee342f): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.088360][T10825] kobject: 'tx-2' (0000000052ee342f): kobject_uevent_env [ 223.095452][T10825] kobject: 'tx-2' (0000000052ee342f): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-2' [ 223.106466][T10825] kobject: 'tx-3' (00000000ac220e17): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.116667][T10825] kobject: 'tx-3' (00000000ac220e17): kobject_uevent_env [ 223.123759][T10825] kobject: 'tx-3' (00000000ac220e17): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-3' [ 223.134817][T10825] kobject: 'tx-4' (00000000bfcee895): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.145023][T10825] kobject: 'tx-4' (00000000bfcee895): kobject_uevent_env [ 223.152286][T10825] kobject: 'tx-4' (00000000bfcee895): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-4' [ 223.163442][T10825] kobject: 'tx-5' (00000000f38ba6a4): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.173702][T10825] kobject: 'tx-5' (00000000f38ba6a4): kobject_uevent_env [ 223.180749][T10825] kobject: 'tx-5' (00000000f38ba6a4): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-5' [ 223.191984][T10825] kobject: 'tx-6' (00000000a3d36dc7): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.202169][T10825] kobject: 'tx-6' (00000000a3d36dc7): kobject_uevent_env [ 223.209403][T10825] kobject: 'tx-6' (00000000a3d36dc7): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-6' [ 223.220487][T10825] kobject: 'tx-7' (00000000e7bdc7e9): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.230706][T10825] kobject: 'tx-7' (00000000e7bdc7e9): kobject_uevent_env [ 223.237819][T10825] kobject: 'tx-7' (00000000e7bdc7e9): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-7' [ 223.249037][T10825] kobject: 'tx-8' (00000000402eee68): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.259286][T10825] kobject: 'tx-8' (00000000402eee68): kobject_uevent_env [ 223.266395][T10825] kobject: 'tx-8' (00000000402eee68): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-8' [ 223.277472][T10825] kobject: 'tx-9' (000000000371a689): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.287673][T10825] kobject: 'tx-9' (000000000371a689): kobject_uevent_env [ 223.294816][T10825] kobject: 'tx-9' (000000000371a689): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-9' [ 223.305846][T10825] kobject: 'tx-10' (0000000025d8ef74): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.316149][T10825] kobject: 'tx-10' (0000000025d8ef74): kobject_uevent_env [ 223.323344][T10825] kobject: 'tx-10' (0000000025d8ef74): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-10' [ 223.334584][T10825] kobject: 'tx-11' (000000009fa95ca7): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.344894][T10825] kobject: 'tx-11' (000000009fa95ca7): kobject_uevent_env [ 223.352044][T10825] kobject: 'tx-11' (000000009fa95ca7): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-11' [ 223.363315][T10825] kobject: 'tx-12' (000000005282ce89): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.373650][T10825] kobject: 'tx-12' (000000005282ce89): kobject_uevent_env [ 223.380785][T10825] kobject: 'tx-12' (000000005282ce89): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-12' [ 223.392115][T10825] kobject: 'tx-13' (00000000ee59f929): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.402438][T10825] kobject: 'tx-13' (00000000ee59f929): kobject_uevent_env [ 223.409615][T10825] kobject: 'tx-13' (00000000ee59f929): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-13' [ 223.420856][T10825] kobject: 'tx-14' (0000000063c49062): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.431238][T10825] kobject: 'tx-14' (0000000063c49062): kobject_uevent_env [ 223.438403][T10825] kobject: 'tx-14' (0000000063c49062): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-14' [ 223.449605][T10825] kobject: 'tx-15' (0000000097edb395): kobject_add_internal: parent: 'queues', set: 'queues' [ 223.459874][T10825] kobject: 'tx-15' (0000000097edb395): kobject_uevent_env [ 223.467397][T10825] kobject: 'tx-15' (0000000097edb395): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-15' [ 223.473672][ C0] net_ratelimit: 16 callbacks suppressed 18:45:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x24020400) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) recvfrom$x25(r2, 0x0, 0x0, 0x0, 0x0, 0x0) [ 223.473679][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 223.479464][T10825] kobject: 'batman_adv' (00000000bc81399e): kobject_add_internal: parent: 'bond1', set: '' [ 223.484312][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 223.506381][ T395] kobject: 'tunl0' (00000000568c9a89): kobject_cleanup, parent 00000000e833d8e6 [ 223.518062][ T3920] kobject: 'loop0' (000000000ffa2858): kobject_uevent_env [ 223.525603][T10810] kobject: 'nr0' (00000000cc958f09): kobject_cleanup, parent 00000000e833d8e6 [ 223.527745][ T395] kobject: 'tunl0' (00000000568c9a89): calling ktype release [ 223.535901][ T3920] kobject: 'loop0' (000000000ffa2858): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 223.547062][T10814] kobject: 'nr0' (00000000aa7ef3a3): kobject_cleanup, parent 00000000e833d8e6 [ 223.552952][T10810] kobject: 'nr0' (00000000cc958f09): calling ktype release [ 223.576105][T10814] kobject: 'nr0' (00000000aa7ef3a3): calling ktype release 18:45:07 executing program 4: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) 18:45:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}) [ 223.576307][ T395] kobject: 'tunl0': free name [ 223.587384][T10814] kobject: 'nr0': free name 18:45:07 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00\x1e\x00', &(0x7f0000002fc0)=@ethtool_gstrings={0x1b, 0x5}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0xee, 0x0, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) [ 223.628612][ T3920] kobject: 'loop4' (00000000b4748c9a): kobject_uevent_env [ 223.643377][T10810] kobject: 'nr0': free name [ 223.658606][ T3920] kobject: 'loop4' (00000000b4748c9a): fill_kobj_path: path = '/devices/virtual/block/loop4' 18:45:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}) 18:45:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x24020400) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) recvfrom$x25(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 18:45:07 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00\x1e\x00', &(0x7f0000002fc0)=@ethtool_gstrings={0x1b, 0x5}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0xee, 0x0, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000280)=0x8, 0x4) [ 223.682366][ T3920] kobject: 'loop3' (000000001be7c62b): kobject_uevent_env [ 223.690229][ T3920] kobject: 'loop3' (000000001be7c62b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 223.695897][T10851] kobject: 'nr0' (0000000012a4248b): kobject_add_internal: parent: 'net', set: 'devices' [ 223.709735][ T3920] kobject: 'loop2' (0000000013544cc2): kobject_uevent_env [ 223.731683][ T3920] kobject: 'loop2' (0000000013544cc2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 223.754434][ T3920] kobject: 'loop1' (0000000062d69964): kobject_uevent_env [ 223.761669][ T3920] kobject: 'loop1' (0000000062d69964): fill_kobj_path: path = '/devices/virtual/block/loop1' 18:45:08 executing program 4: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) [ 223.785293][ T3920] kobject: 'loop5' (000000007d37d61a): kobject_uevent_env [ 223.787116][T10851] kobject: 'nr0' (0000000012a4248b): kobject_uevent_env [ 223.796906][ T3920] kobject: 'loop5' (000000007d37d61a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 223.814850][T10851] kobject: 'nr0' (0000000012a4248b): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 223.863416][T10851] kobject: 'queues' (00000000ef562529): kobject_add_internal: parent: 'nr0', set: '' [ 223.898512][ T3920] kobject: 'loop4' (00000000b4748c9a): kobject_uevent_env [ 223.926902][T10851] kobject: 'queues' (00000000ef562529): kobject_uevent_env [ 223.934509][ T3920] kobject: 'loop4' (00000000b4748c9a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 223.960567][T10851] kobject: 'queues' (00000000ef562529): kobject_uevent_env: filter function caused the event to drop! [ 224.043700][T10851] kobject: 'rx-0' (00000000c45aa40d): kobject_add_internal: parent: 'queues', set: 'queues' [ 224.074432][T10851] kobject: 'rx-0' (00000000c45aa40d): kobject_uevent_env 18:45:08 executing program 4: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) [ 224.093818][T10851] kobject: 'rx-0' (00000000c45aa40d): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 224.123463][T10851] kobject: 'tx-0' (000000009bef5a95): kobject_add_internal: parent: 'queues', set: 'queues' [ 224.137563][ T3920] kobject: 'loop4' (00000000b4748c9a): kobject_uevent_env [ 224.153411][ T3920] kobject: 'loop4' (00000000b4748c9a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 224.173531][T10851] kobject: 'tx-0' (000000009bef5a95): kobject_uevent_env [ 224.180675][T10851] kobject: 'tx-0' (000000009bef5a95): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 224.233029][T10851] kobject: 'batman_adv' (000000007f2f8dad): kobject_add_internal: parent: 'nr0', set: '' [ 224.247229][ T395] kobject: 'tunl0' (000000006fcef0c7): kobject_cleanup, parent 00000000e833d8e6 [ 224.259477][ T395] kobject: 'tunl0' (000000006fcef0c7): calling ktype release [ 224.270419][ T395] kobject: 'tunl0': free name 18:45:08 executing program 1: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) [ 224.278254][T10862] kobject: 'nr0' (000000004d28507d): kobject_add_internal: parent: 'net', set: 'devices' [ 224.289052][T10862] kobject: 'nr0' (000000004d28507d): kobject_uevent_env [ 224.296372][T10862] kobject: 'nr0' (000000004d28507d): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 224.306537][T10862] kobject: 'queues' (0000000099135d15): kobject_add_internal: parent: 'nr0', set: '' [ 224.325004][T10862] kobject: 'queues' (0000000099135d15): kobject_uevent_env 18:45:08 executing program 2: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) 18:45:08 executing program 4: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) [ 224.332801][ T3920] kobject: 'loop1' (0000000062d69964): kobject_uevent_env [ 224.346444][ T3920] kobject: 'loop1' (0000000062d69964): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 224.370780][T10862] kobject: 'queues' (0000000099135d15): kobject_uevent_env: filter function caused the event to drop! [ 224.388350][ T3920] kobject: 'loop4' (00000000b4748c9a): kobject_uevent_env [ 224.407729][ T3920] kobject: 'loop4' (00000000b4748c9a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 224.430949][T10862] kobject: 'rx-0' (00000000e3e0452a): kobject_add_internal: parent: 'queues', set: 'queues' [ 224.433588][ T3920] kobject: 'loop2' (0000000013544cc2): kobject_uevent_env [ 224.453521][T10862] kobject: 'rx-0' (00000000e3e0452a): kobject_uevent_env [ 224.468839][T10862] kobject: 'rx-0' (00000000e3e0452a): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 224.493994][ T3920] kobject: 'loop2' (0000000013544cc2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 224.507749][T10862] kobject: 'tx-0' (00000000c88d0812): kobject_add_internal: parent: 'queues', set: 'queues' [ 224.528161][T10862] kobject: 'tx-0' (00000000c88d0812): kobject_uevent_env 18:45:08 executing program 1: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) [ 224.540079][T10862] kobject: 'tx-0' (00000000c88d0812): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 224.568368][T10862] kobject: 'batman_adv' (000000003ce961bf): kobject_add_internal: parent: 'nr0', set: '' 18:45:08 executing program 4: semop(0x0, &(0x7f0000000000)=[{0x0, 0xffff}], 0x1) semop(0x0, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff8}], 0x2) semctl$SETALL(0x0, 0x0, 0xf, 0x0) [ 224.592189][ T3920] kobject: 'loop1' (0000000062d69964): kobject_uevent_env [ 224.601677][ T3920] kobject: 'loop1' (0000000062d69964): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 224.631098][T10849] kobject: 'batman_adv' (000000007f2f8dad): kobject_uevent_env [ 224.668431][ T3920] kobject: 'loop0' (000000000ffa2858): kobject_uevent_env [ 224.677217][T10849] kobject: 'batman_adv' (000000007f2f8dad): kobject_uevent_env: filter function caused the event to drop! [ 224.699002][ T3920] kobject: 'loop0' (000000000ffa2858): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 224.723797][T10849] kobject: 'batman_adv' (000000007f2f8dad): kobject_cleanup, parent 00000000e833d8e6 [ 224.730312][ T3920] kobject: 'loop4' (00000000b4748c9a): kobject_uevent_env [ 224.743084][T10849] kobject: 'batman_adv' (000000007f2f8dad): calling ktype release [ 224.761334][ T3920] kobject: 'loop4' (00000000b4748c9a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 224.763815][T10849] kobject: (000000007f2f8dad): dynamic_kobj_release [ 224.777290][ T3920] kobject: 'loop2' (0000000013544cc2): kobject_uevent_env [ 224.787542][ T3920] kobject: 'loop2' (0000000013544cc2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 224.795338][T10849] kobject: 'batman_adv': free name [ 224.809253][T10849] kobject: 'rx-0' (00000000c45aa40d): kobject_cleanup, parent 00000000ef562529 [ 224.826126][ T3920] kobject: 'loop1' (0000000062d69964): kobject_uevent_env [ 224.830440][T10849] kobject: 'rx-0' (00000000c45aa40d): auto cleanup 'remove' event [ 224.835242][ T3920] kobject: 'loop1' (0000000062d69964): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 224.845726][T10849] kobject: 'rx-0' (00000000c45aa40d): kobject_uevent_env [ 224.859157][T10849] kobject: 'rx-0' (00000000c45aa40d): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 224.870517][T10849] kobject: 'rx-0' (00000000c45aa40d): auto cleanup kobject_del [ 224.878394][T10849] kobject: 'rx-0' (00000000c45aa40d): calling ktype release [ 224.888915][T10849] kobject: 'rx-0': free name [ 224.893971][T10849] kobject: 'tx-0' (000000009bef5a95): kobject_cleanup, parent 00000000ef562529 [ 224.902995][T10849] kobject: 'tx-0' (000000009bef5a95): auto cleanup 'remove' event [ 224.911102][T10849] kobject: 'tx-0' (000000009bef5a95): kobject_uevent_env [ 224.918199][T10849] kobject: 'tx-0' (000000009bef5a95): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 224.929173][T10849] kobject: 'tx-0' (000000009bef5a95): auto cleanup kobject_del [ 224.936793][T10849] kobject: 'tx-0' (000000009bef5a95): calling ktype release [ 224.944153][T10849] kobject: 'tx-0': free name [ 224.948756][T10849] kobject: 'queues' (00000000ef562529): kobject_cleanup, parent 00000000e833d8e6 [ 224.957956][T10849] kobject: 'queues' (00000000ef562529): calling ktype release [ 224.965485][T10849] kobject: 'queues' (00000000ef562529): kset_release [ 224.972156][T10849] kobject: 'queues': free name [ 224.977238][T10849] kobject: 'nr0' (0000000012a4248b): kobject_uevent_env [ 224.984314][T10849] kobject: 'nr0' (0000000012a4248b): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 225.024635][ T395] kobject: 'batman_adv' (000000009ad5401b): kobject_uevent_env [ 225.032216][ T395] kobject: 'batman_adv' (000000009ad5401b): kobject_uevent_env: filter function caused the event to drop! [ 225.043869][ T395] kobject: 'batman_adv' (000000009ad5401b): kobject_cleanup, parent 00000000e833d8e6 [ 225.053392][ T395] kobject: 'batman_adv' (000000009ad5401b): calling ktype release [ 225.061196][ T395] kobject: (000000009ad5401b): dynamic_kobj_release [ 225.067810][ T395] kobject: 'batman_adv': free name [ 225.073451][ T395] kobject: 'rx-0' (000000000466b10b): kobject_cleanup, parent 000000007d1dde13 [ 225.082403][ T395] kobject: 'rx-0' (000000000466b10b): auto cleanup 'remove' event [ 225.090312][ T395] kobject: 'rx-0' (000000000466b10b): kobject_uevent_env [ 225.097876][ T395] kobject: 'rx-0' (000000000466b10b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 225.109342][ T395] kobject: 'rx-0' (000000000466b10b): auto cleanup kobject_del [ 225.116934][ T395] kobject: 'rx-0' (000000000466b10b): calling ktype release [ 225.124227][ T395] kobject: 'rx-0': free name [ 225.128840][ T395] kobject: 'tx-3' (000000008d73b6b0): kobject_cleanup, parent 000000007d1dde13 [ 225.137783][ T395] kobject: 'tx-3' (000000008d73b6b0): auto cleanup 'remove' event [ 225.145609][ T395] kobject: 'tx-3' (000000008d73b6b0): kobject_uevent_env [ 225.152612][ T395] kobject: 'tx-3' (000000008d73b6b0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 225.163423][ T395] kobject: 'tx-3' (000000008d73b6b0): auto cleanup kobject_del [ 225.171001][ T395] kobject: 'tx-3' (000000008d73b6b0): calling ktype release [ 225.178342][ T395] kobject: 'tx-3': free name [ 225.182962][ T395] kobject: 'tx-2' (00000000bfc2468e): kobject_cleanup, parent 000000007d1dde13 [ 225.192276][ T395] kobject: 'tx-2' (00000000bfc2468e): auto cleanup 'remove' event [ 225.200177][ T395] kobject: 'tx-2' (00000000bfc2468e): kobject_uevent_env [ 225.207238][ T395] kobject: 'tx-2' (00000000bfc2468e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 225.218458][ T395] kobject: 'tx-2' (00000000bfc2468e): auto cleanup kobject_del [ 225.226092][ T395] kobject: 'tx-2' (00000000bfc2468e): calling ktype release [ 225.233435][ T395] kobject: 'tx-2': free name [ 225.238082][ T395] kobject: 'tx-1' (00000000f502e9ec): kobject_cleanup, parent 000000007d1dde13 [ 225.247091][ T395] kobject: 'tx-1' (00000000f502e9ec): auto cleanup 'remove' event [ 225.254929][ T395] kobject: 'tx-1' (00000000f502e9ec): kobject_uevent_env [ 225.261942][ T395] kobject: 'tx-1' (00000000f502e9ec): kobject_uevent_env: uevent_suppress caused the event to drop! [ 225.272896][ T395] kobject: 'tx-1' (00000000f502e9ec): auto cleanup kobject_del [ 225.280545][ T395] kobject: 'tx-1' (00000000f502e9ec): calling ktype release [ 225.287874][ T395] kobject: 'tx-1': free name [ 225.292494][ T395] kobject: 'tx-0' (00000000ff5e84bb): kobject_cleanup, parent 000000007d1dde13 [ 225.301508][ T395] kobject: 'tx-0' (00000000ff5e84bb): auto cleanup 'remove' event [ 225.309462][ T395] kobject: 'tx-0' (00000000ff5e84bb): kobject_uevent_env [ 225.316534][ T395] kobject: 'tx-0' (00000000ff5e84bb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 225.327311][ T395] kobject: 'tx-0' (00000000ff5e84bb): auto cleanup kobject_del [ 225.334916][ T395] kobject: 'tx-0' (00000000ff5e84bb): calling ktype release [ 225.342191][ T395] kobject: 'tx-0': free name [ 225.346852][ T395] kobject: 'queues' (000000007d1dde13): kobject_cleanup, parent 00000000e833d8e6 [ 225.355995][ T395] kobject: 'queues' (000000007d1dde13): calling ktype release [ 225.363502][ T395] kobject: 'queues' (000000007d1dde13): kset_release [ 225.370196][ T395] kobject: 'queues': free name [ 225.375318][ T395] kobject: 'wlan4' (000000001623dce5): kobject_uevent_env [ 225.382426][ T395] kobject: 'wlan4' (000000001623dce5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 225.394187][ T395] kobject: 'net' (0000000021c548a2): kobject_cleanup, parent 00000000e833d8e6 [ 225.403061][ T395] kobject: 'net' (0000000021c548a2): calling ktype release [ 225.410302][ T395] kobject: 'net': free name [ 225.416464][T10857] kobject: 'batman_adv' (000000003ce961bf): kobject_uevent_env [ 225.425192][T10857] kobject: 'batman_adv' (000000003ce961bf): kobject_uevent_env: filter function caused the event to drop! [ 225.436713][T10857] kobject: 'batman_adv' (000000003ce961bf): kobject_cleanup, parent 00000000e833d8e6 [ 225.446201][T10857] kobject: 'batman_adv' (000000003ce961bf): calling ktype release [ 225.454081][T10857] kobject: (000000003ce961bf): dynamic_kobj_release [ 225.460678][T10857] kobject: 'batman_adv': free name [ 225.466191][T10857] kobject: 'rx-0' (00000000e3e0452a): kobject_cleanup, parent 0000000099135d15 [ 225.475203][T10857] kobject: 'rx-0' (00000000e3e0452a): auto cleanup 'remove' event [ 225.483005][T10857] kobject: 'rx-0' (00000000e3e0452a): kobject_uevent_env [ 225.490083][T10857] kobject: 'rx-0' (00000000e3e0452a): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 225.501050][T10857] kobject: 'rx-0' (00000000e3e0452a): auto cleanup kobject_del [ 225.508721][T10857] kobject: 'rx-0' (00000000e3e0452a): calling ktype release [ 225.516031][T10857] kobject: 'rx-0': free name [ 225.520640][T10857] kobject: 'tx-0' (00000000c88d0812): kobject_cleanup, parent 0000000099135d15 [ 225.529606][T10857] kobject: 'tx-0' (00000000c88d0812): auto cleanup 'remove' event [ 225.537442][T10857] kobject: 'tx-0' (00000000c88d0812): kobject_uevent_env [ 225.544560][T10857] kobject: 'tx-0' (00000000c88d0812): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 225.555518][T10857] kobject: 'tx-0' (00000000c88d0812): auto cleanup kobject_del [ 225.563121][T10857] kobject: 'tx-0' (00000000c88d0812): calling ktype release [ 225.570444][T10857] kobject: 'tx-0': free name [ 225.575090][T10857] kobject: 'queues' (0000000099135d15): kobject_cleanup, parent 00000000e833d8e6 [ 225.584241][T10857] kobject: 'queues' (0000000099135d15): calling ktype release [ 225.591690][T10857] kobject: 'queues' (0000000099135d15): kset_release [ 225.598417][T10857] kobject: 'queues': free name [ 225.603594][T10857] kobject: 'nr0' (000000004d28507d): kobject_uevent_env [ 225.610670][T10857] kobject: 'nr0' (000000004d28507d): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 225.620706][T10849] kobject: 'nr0' (0000000012a4248b): kobject_cleanup, parent 00000000e833d8e6 [ 225.630176][T10849] kobject: 'nr0' (0000000012a4248b): calling ktype release [ 225.638219][ T395] kobject: 'wlan4' (000000001623dce5): kobject_cleanup, parent 00000000e833d8e6 [ 225.640614][T10849] kobject: 'nr0': free name [ 225.647329][ T395] kobject: 'wlan4' (000000001623dce5): calling ktype release [ 225.659302][ T395] kobject: 'wlan4': free name [ 225.664283][ T395] kobject: 'rfkill13' (0000000083a6322b): kobject_uevent_env 18:45:09 executing program 2: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) 18:45:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x24020400) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) recvfrom$x25(r2, 0x0, 0x0, 0x0, 0x0, 0x0) [ 225.671690][ T395] kobject: 'rfkill13' (0000000083a6322b): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim10/ieee80211/phy11/rfkill13' [ 225.688008][ T3920] kobject: 'loop3' (000000001be7c62b): kobject_uevent_env [ 225.712322][ T3920] kobject: 'loop3' (000000001be7c62b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 225.723759][ T395] kobject: 'phy11' (00000000c66a4393): kobject_uevent_env [ 225.738907][ T395] kobject: 'phy11' (00000000c66a4393): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim10/ieee80211/phy11' [ 225.758815][ T395] kobject: 'ieee80211' (00000000a8598f19): kobject_cleanup, parent 00000000e833d8e6 [ 225.771696][ T395] kobject: 'ieee80211' (00000000a8598f19): calling ktype release [ 225.779540][ T395] kobject: 'ieee80211': free name [ 225.784944][ T395] kobject: 'hwsim10' (00000000b1fc0b08): kobject_uevent_env [ 225.798929][ T395] kobject: 'hwsim10' (00000000b1fc0b08): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim10' [ 225.801861][ T3920] kobject: 'loop2' (0000000013544cc2): kobject_uevent_env [ 225.817650][T10857] kobject: 'nr0' (000000004d28507d): kobject_cleanup, parent 00000000e833d8e6 [ 225.826877][ T395] kobject: 'hwsim10' (00000000b1fc0b08): kobject_uevent_env [ 225.832045][T10857] kobject: 'nr0' (000000004d28507d): calling ktype release [ 225.835568][ T395] kobject: 'hwsim10' (00000000b1fc0b08): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim10' [ 225.842072][T10857] kobject: 'nr0': free name [ 225.853498][ T395] kobject: 'hwsim10' (00000000b1fc0b08): kobject_cleanup, parent 00000000e833d8e6 [ 225.863414][ T3920] kobject: 'loop2' (0000000013544cc2): fill_kobj_path: path = '/devices/virtual/block/loop2' 18:45:10 executing program 1: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) 18:45:10 executing program 4: semop(0x0, &(0x7f0000000000)=[{0x0, 0xffff}], 0x1) semop(0x0, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff8}], 0x2) semctl$SETALL(0x0, 0x0, 0xf, 0x0) 18:45:10 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0xffff}], 0x1) semop(0x0, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff8}], 0x2) semctl$SETALL(0x0, 0x0, 0xf, 0x0) 18:45:10 executing program 2: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) 18:45:10 executing program 0: r0 = socket$inet(0x10, 0x3, 0x100000000000c) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0xffffffffffffff5b, &(0x7f0000000080)=[{&(0x7f0000000040)="2400000002031f001cfffd946fa2830020200a700900010001e700000000a3a2e92886a8", 0x24}], 0x1}, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000180)={'lo\x00'}) [ 225.870067][ T395] kobject: 'hwsim10' (00000000b1fc0b08): calling ktype release [ 225.885559][ T395] kobject: 'hwsim10': free name [ 225.890535][ T395] kobject: 'phy11' (00000000c66a4393): kobject_cleanup, parent 00000000e833d8e6 [ 225.898530][ T3920] kobject: 'loop0' (000000000ffa2858): kobject_uevent_env [ 225.900209][ T395] kobject: 'phy11' (00000000c66a4393): calling ktype release 18:45:10 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_IPPROTO={0x8}]}, 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x3ded5adb) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") splice(r0, 0x0, r2, 0x0, 0x200000011002, 0x2) [ 225.934070][ T395] kobject: 'rfkill13' (0000000083a6322b): kobject_cleanup, parent 00000000e833d8e6 [ 225.951329][ T3920] kobject: 'loop0' (000000000ffa2858): fill_kobj_path: path = '/devices/virtual/block/loop0' 18:45:10 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0xffff}], 0x1) semop(0x0, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff8}], 0x2) semctl$SETALL(0x0, 0x0, 0xf, 0x0) 18:45:10 executing program 4: semop(0x0, &(0x7f0000000000)=[{0x0, 0xffff}], 0x1) semop(0x0, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff8}], 0x2) semctl$SETALL(0x0, 0x0, 0xf, 0x0) [ 225.977716][T10912] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 225.980715][ T395] kobject: 'rfkill13' (0000000083a6322b): calling ktype release [ 226.010163][ T3920] kobject: 'loop5' (000000007d37d61a): kobject_uevent_env [ 226.031447][T10912] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 226.039769][ T3920] kobject: 'loop5' (000000007d37d61a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 226.055357][ T395] kobject: 'rfkill13': free name [ 226.063385][ T395] kobject: 'phy11': free name [ 226.076389][T10920] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 18:45:10 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0xffff}], 0x1) semop(0x0, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff8}], 0x2) semctl$SETALL(0x0, 0x0, 0xf, 0x0) 18:45:10 executing program 4: semop(0x0, &(0x7f0000000000)=[{0x0, 0xffff}], 0x1) semop(0x0, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff8}], 0x2) semctl$SETALL(0x0, 0x0, 0xf, 0x0) [ 226.086087][ T3920] kobject: 'loop3' (000000001be7c62b): kobject_uevent_env [ 226.116885][ T3920] kobject: 'loop3' (000000001be7c62b): fill_kobj_path: path = '/devices/virtual/block/loop3' 18:45:10 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001400)}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) connect$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, "0e4631be1698a09d3b2a1b1eef585df502761464882d9100a7e4b9f3ecb61cb847c33fa01a7bac07f7a36fea940e9eb180b1bb2fc1dfa6e25d2887d95531ea", 0x2e}, 0xfffffffffffffcaf) r3 = accept(0xffffffffffffffff, &(0x7f0000001440)=@isdn, &(0x7f00000001c0)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001600)=ANY=[@ANYBLOB="5113e80a6077512a2c000000", @ANYRES16=r5, @ANYBLOB="01000000000000000000010000000800050000"], 0x3}, 0x1, 0x6c}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) r8 = openat$cgroup_ro(r6, &(0x7f00000016c0)='memory.swap.current\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0xa) ioctl$UI_END_FF_ERASE(r8, 0x400c55cb, &(0x7f00000015c0)={0x10, 0x0, 0xae20}) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000001500)={0x38, r5, 0x29703433d2c06a3c, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @rand_addr="9ff07ea6b795a5665c3739a197a49ac3"}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x10008000}, 0x40000) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r9 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfffffffffffffff8, 0x200) getpeername$tipc(r9, &(0x7f0000000100)=@id, &(0x7f0000000140)=0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r10 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r10, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(r11, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0xffffffffffffff94, 0x0) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r13 = openat$cgroup_int(r12, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) r14 = openat$cgroup_ro(r12, 0x0, 0x0, 0x0) sendfile(r13, r14, 0x0, 0xa) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f00000003c0)) 18:45:10 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) semget(0x3, 0x4, 0x104) semctl$SEM_STAT(0x0, 0x758d788dc069ea1d, 0x12, &(0x7f0000000200)=""/44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x0, @rand_addr=0x8}}) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x9) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000540)="ce03100001000100ff901efc9fb35c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d04587", 0x42, 0xffffffffffffffff, 0x0, 0x0) [ 226.153117][ T3920] kobject: 'loop4' (00000000b4748c9a): kobject_uevent_env 18:45:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010800000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x11}, 0x98) sendmmsg$inet6(r0, &(0x7f0000002980)=[{{&(0x7f0000000380)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c, &(0x7f0000000480)=[{&(0x7f00000003c0)="c2", 0x34000}], 0x1}}], 0x1, 0x20000040) [ 226.203570][ T3920] kobject: 'loop4' (00000000b4748c9a): fill_kobj_path: path = '/devices/virtual/block/loop4' 18:45:10 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stat\x00') exit(0x0) lseek(r0, 0x4, 0x0) [ 226.244926][ T3920] kobject: 'loop3' (000000001be7c62b): kobject_uevent_env [ 226.252130][ T3920] kobject: 'loop3' (000000001be7c62b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 226.271590][T10916] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 226.315965][T10930] kobject: 'integrity' (000000005ee526bb): kobject_uevent_env [ 226.335434][T10912] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 226.351793][T10930] kobject: 'integrity' (000000005ee526bb): kobject_uevent_env: filter function caused the event to drop! [ 226.358505][ T3920] kobject: 'loop4' (00000000b4748c9a): kobject_uevent_env 18:45:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010800000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x11}, 0x98) sendmmsg$inet6(r0, &(0x7f0000002980)=[{{&(0x7f0000000380)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c, &(0x7f0000000480)=[{&(0x7f00000003c0)="c2", 0x34000}], 0x1}}], 0x1, 0x20000040) [ 226.387613][ T395] kobject: 'batman_adv' (0000000046d401ef): kobject_uevent_env [ 226.391094][T10930] kobject: 'integrity' (000000005ee526bb): kobject_cleanup, parent 00000000e833d8e6 [ 226.416866][ T395] kobject: 'batman_adv' (0000000046d401ef): kobject_uevent_env: filter function caused the event to drop! [ 226.420886][T10930] kobject: 'integrity' (000000005ee526bb): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. [ 226.448176][ T3920] kobject: 'loop4' (00000000b4748c9a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 226.471934][ T3920] kobject: 'loop1' (0000000062d69964): kobject_uevent_env [ 226.477938][ T395] kobject: 'batman_adv' (0000000046d401ef): kobject_cleanup, parent 00000000e833d8e6 [ 226.488194][ T3920] kobject: 'loop1' (0000000062d69964): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 226.507166][T10930] kobject: 'integrity': free name [ 226.518400][ T395] kobject: 'batman_adv' (0000000046d401ef): calling ktype release [ 226.519009][T10930] kobject: '7:0' (0000000088e3fccc): kobject_uevent_env [ 226.538907][ T3920] kobject: 'loop3' (000000001be7c62b): kobject_uevent_env [ 226.546469][ T3920] kobject: 'loop3' (000000001be7c62b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 226.553916][ T395] kobject: (0000000046d401ef): dynamic_kobj_release [ 226.560363][T10930] kobject: '7:0' (0000000088e3fccc): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 226.563268][ T395] kobject: 'batman_adv': free name [ 226.563825][ T395] kobject: 'rx-0' (000000008f7e1b4d): kobject_cleanup, parent 000000002d83d1a6 [ 226.604357][T10930] kobject: '7:0' (0000000088e3fccc): kobject_cleanup, parent 00000000e833d8e6 [ 226.623536][T10930] kobject: '7:0' (0000000088e3fccc): calling ktype release [ 226.638078][T10930] kobject: '7:0': free name [ 226.648788][T10930] kobject: 'mq' (00000000c8ae4608): kobject_uevent_env [ 226.656306][T10930] kobject: 'mq' (00000000c8ae4608): kobject_uevent_env: filter function caused the event to drop! [ 226.670983][T10930] kobject: 'queue' (000000006088f85a): kobject_uevent_env [ 226.678695][T10930] kobject: 'queue' (000000006088f85a): kobject_uevent_env: filter function caused the event to drop! [ 226.691753][T10930] kobject: 'iosched' (0000000028f2701c): kobject_uevent_env [ 226.699863][T10930] kobject: 'iosched' (0000000028f2701c): kobject_uevent_env: attempted to send uevent without kset! [ 226.711180][ T395] kobject: 'rx-0' (000000008f7e1b4d): auto cleanup 'remove' event [ 226.719357][ T395] kobject: 'rx-0' (000000008f7e1b4d): kobject_uevent_env [ 226.727022][T10930] kobject: 'holders' (00000000aef6037a): kobject_cleanup, parent 000000000ffa2858 [ 226.736860][ T395] kobject: 'rx-0' (000000008f7e1b4d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 226.748077][T10930] kobject: 'holders' (00000000aef6037a): auto cleanup kobject_del [ 226.756610][ T395] kobject: 'rx-0' (000000008f7e1b4d): auto cleanup kobject_del [ 226.764785][T10930] kobject: 'holders' (00000000aef6037a): calling ktype release [ 226.772562][ T395] kobject: 'rx-0' (000000008f7e1b4d): calling ktype release [ 226.780746][T10930] kobject: (00000000aef6037a): dynamic_kobj_release [ 226.787859][T10930] kobject: 'holders': free name [ 226.793141][ T395] kobject: 'rx-0': free name 18:45:11 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_IPPROTO={0x8}]}, 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x3ded5adb) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") splice(r0, 0x0, r2, 0x0, 0x200000011002, 0x2) [ 226.798142][ T395] kobject: 'tx-3' (00000000bef07018): kobject_cleanup, parent 000000002d83d1a6 [ 226.815376][T10930] kobject: 'slaves' (00000000354e77c3): kobject_cleanup, parent 000000000ffa2858 [ 226.829883][ T395] kobject: 'tx-3' (00000000bef07018): auto cleanup 'remove' event [ 226.842382][T10930] kobject: 'slaves' (00000000354e77c3): auto cleanup kobject_del [ 226.851708][ T395] kobject: 'tx-3' (00000000bef07018): kobject_uevent_env [ 226.859280][T10930] kobject: 'slaves' (00000000354e77c3): calling ktype release [ 226.867627][ T395] kobject: 'tx-3' (00000000bef07018): kobject_uevent_env: uevent_suppress caused the event to drop! [ 226.878799][T10930] kobject: (00000000354e77c3): dynamic_kobj_release [ 226.886358][T10930] kobject: 'slaves': free name [ 226.891268][ T395] kobject: 'tx-3' (00000000bef07018): auto cleanup kobject_del [ 226.900025][ T395] kobject: 'tx-3' (00000000bef07018): calling ktype release [ 226.908611][T10930] kobject: 'loop0' (000000000ffa2858): kobject_uevent_env [ 226.916617][T10930] kobject: 'loop0' (000000000ffa2858): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 226.927627][ T395] kobject: 'tx-3': free name [ 226.932318][ T395] kobject: 'tx-2' (0000000051ffcc5a): kobject_cleanup, parent 000000002d83d1a6 [ 226.943111][ T395] kobject: 'tx-2' (0000000051ffcc5a): auto cleanup 'remove' event [ 226.951640][ T395] kobject: 'tx-2' (0000000051ffcc5a): kobject_uevent_env [ 226.959150][ T395] kobject: 'tx-2' (0000000051ffcc5a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 226.970419][ T395] kobject: 'tx-2' (0000000051ffcc5a): auto cleanup kobject_del [ 226.991865][T10936] kobject: 'loop0' (000000000ffa2858): kobject_cleanup, parent 00000000e833d8e6 [ 227.041239][ T395] kobject: 'tx-2' (0000000051ffcc5a): calling ktype release [ 227.065974][T10936] kobject: 'loop0' (000000000ffa2858): calling ktype release [ 227.109510][T10936] kobject: 'queue' (000000006088f85a): kobject_cleanup, parent 00000000e833d8e6 [ 227.110967][ T395] kobject: 'tx-2': free name [ 227.135282][ T395] kobject: 'tx-1' (0000000078c70744): kobject_cleanup, parent 000000002d83d1a6 [ 227.147663][ T395] kobject: 'tx-1' (0000000078c70744): auto cleanup 'remove' event [ 227.157241][ T395] kobject: 'tx-1' (0000000078c70744): kobject_uevent_env [ 227.164758][T10955] kobject: '7:0' (00000000e86758ac): kobject_add_internal: parent: 'bdi', set: 'devices' [ 227.178111][ T395] kobject: 'tx-1' (0000000078c70744): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.189887][T10936] kobject: 'queue' (000000006088f85a): calling ktype release [ 227.202884][T10958] netlink: 'syz-executor.5': attribute type 3 has an invalid length. [ 227.204221][T10955] kobject: '7:0' (00000000e86758ac): kobject_uevent_env [ 227.216645][T10936] kobject: 'queue': free name [ 227.222865][ T2867] kobject: 'iosched' (0000000028f2701c): kobject_cleanup, parent 00000000e833d8e6 [ 227.240147][T10936] kobject: 'loop0': free name [ 227.247334][ T395] kobject: 'tx-1' (0000000078c70744): auto cleanup kobject_del [ 227.272759][ T2867] kobject: 'iosched' (0000000028f2701c): calling ktype release [ 227.285640][ T395] kobject: 'tx-1' (0000000078c70744): calling ktype release [ 227.297265][ T2867] kobject: 'iosched': free name [ 227.302268][ T395] kobject: 'tx-1': free name [ 227.308848][ T2867] kobject: '0' (00000000d99ea6b9): kobject_cleanup, parent 00000000e833d8e6 [ 227.309313][T10955] kobject: '7:0' (00000000e86758ac): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 227.320725][ T395] kobject: 'tx-0' (00000000a1aef120): kobject_cleanup, parent 000000002d83d1a6 [ 227.337047][T10955] kobject: 'loop0' (00000000493ace6a): kobject_add_internal: parent: 'block', set: 'devices' [ 227.356302][ T2867] kobject: '0' (00000000d99ea6b9): calling ktype release [ 227.368703][ T2867] kobject: '0': free name [ 227.373702][ T395] kobject: 'tx-0' (00000000a1aef120): auto cleanup 'remove' event [ 227.381686][ T2867] kobject: 'cpu0' (00000000bf9fb38c): kobject_cleanup, parent 00000000e833d8e6 [ 227.394428][ T395] kobject: 'tx-0' (00000000a1aef120): kobject_uevent_env [ 227.401630][ T2867] kobject: 'cpu0' (00000000bf9fb38c): calling ktype release [ 227.409157][T10955] kobject: 'loop0' (00000000493ace6a): kobject_uevent_env [ 227.419997][ T395] kobject: 'tx-0' (00000000a1aef120): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.431221][T10955] kobject: 'loop0' (00000000493ace6a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.445822][ T2867] kobject: 'cpu0': free name [ 227.450566][ T2867] kobject: 'cpu1' (000000000799b671): kobject_cleanup, parent 00000000e833d8e6 [ 227.460598][ T395] kobject: 'tx-0' (00000000a1aef120): auto cleanup kobject_del [ 227.470915][T10955] kobject: 'holders' (00000000cc54ed05): kobject_add_internal: parent: 'loop0', set: '' [ 227.481703][ T395] kobject: 'tx-0' (00000000a1aef120): calling ktype release [ 227.482315][ T2867] kobject: 'cpu1' (000000000799b671): calling ktype release [ 227.489737][ T395] kobject: 'tx-0': free name [ 227.499707][T10955] kobject: 'slaves' (00000000b77c6401): kobject_add_internal: parent: 'loop0', set: '' [ 227.501284][ T395] kobject: 'queues' (000000002d83d1a6): kobject_cleanup, parent 00000000e833d8e6 [ 227.511618][ T2867] kobject: 'cpu1': free name [ 227.520648][ T395] kobject: 'queues' (000000002d83d1a6): calling ktype release [ 227.528611][T10955] kobject: 'loop0' (00000000493ace6a): kobject_uevent_env [ 227.532779][ T395] kobject: 'queues' (000000002d83d1a6): kset_release [ 227.540027][T10955] kobject: 'loop0' (00000000493ace6a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 227.546757][ T395] kobject: 'queues': free name [ 227.562026][ T2867] kobject: 'mq' (00000000c8ae4608): kobject_cleanup, parent 00000000e833d8e6 [ 227.562229][ T395] kobject: 'wlan3' (00000000e42d2bf1): kobject_uevent_env [ 227.570975][ T2867] kobject: 'mq' (00000000c8ae4608): calling ktype release [ 227.578234][ T395] kobject: 'wlan3' (00000000e42d2bf1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.593775][T10955] kobject: 'queue' (00000000213aaac3): kobject_add_internal: parent: 'loop0', set: '' [ 227.596489][ T395] kobject: 'net' (00000000d4570240): kobject_cleanup, parent 00000000e833d8e6 [ 227.615578][ T2867] kobject: 'mq': free name [ 227.615740][ T395] kobject: 'net' (00000000d4570240): calling ktype release [ 227.620666][T10955] kobject: 'mq' (00000000967dc8a1): kobject_add_internal: parent: 'loop0', set: '' [ 227.627601][ T395] kobject: 'net': free name [ 227.640842][T10955] kobject: 'mq' (00000000967dc8a1): kobject_uevent_env [ 227.648946][T10955] kobject: 'mq' (00000000967dc8a1): kobject_uevent_env: filter function caused the event to drop! [ 227.670008][T10955] kobject: '0' (0000000042977ff4): kobject_add_internal: parent: 'mq', set: '' [ 227.703067][T10955] kobject: 'cpu0' (00000000bf0e3598): kobject_add_internal: parent: '0', set: '' [ 227.737698][ T3920] kobject: 'nullb0' (00000000ca60c8dc): kobject_uevent_env 18:45:12 executing program 0: r0 = socket$inet(0x10, 0x3, 0x100000000000c) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0xffffffffffffff5b, &(0x7f0000000080)=[{&(0x7f0000000040)="2400000002031f001cfffd946fa2830020200a700900010001e700000000a3a2e92886a8", 0x24}], 0x1}, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000180)={'lo\x00'}) 18:45:12 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010800000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x11}, 0x98) sendmmsg$inet6(r0, &(0x7f0000002980)=[{{&(0x7f0000000380)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c, &(0x7f0000000480)=[{&(0x7f00000003c0)="c2", 0x34000}], 0x1}}], 0x1, 0x20000040) [ 227.746220][T10955] kobject: 'cpu1' (00000000d25ca747): kobject_add_internal: parent: '0', set: '' [ 227.769932][ T3920] kobject: 'nullb0' (00000000ca60c8dc): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 227.833458][ T395] kobject: 'wlan3' (00000000e42d2bf1): kobject_cleanup, parent 00000000e833d8e6 [ 227.845029][T10955] kobject: 'iosched' (00000000397c1544): kobject_add_internal: parent: 'queue', set: '' [ 227.845563][ T395] kobject: 'wlan3' (00000000e42d2bf1): calling ktype release [ 227.863190][ T395] kobject: 'wlan3': free name [ 227.868553][ T395] kobject: 'rfkill11' (00000000f7c60f17): kobject_uevent_env [ 227.876738][ T395] kobject: 'rfkill11' (00000000f7c60f17): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim8/ieee80211/phy9/rfkill11' [ 227.890728][T10955] kobject: 'queue' (00000000213aaac3): kobject_uevent_env 18:45:12 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_IPPROTO={0x8}]}, 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x3ded5adb) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") splice(r0, 0x0, r2, 0x0, 0x200000011002, 0x2) 18:45:12 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stat\x00') exit(0x0) lseek(r0, 0x4, 0x0) [ 227.928560][T10955] kobject: 'queue' (00000000213aaac3): kobject_uevent_env: filter function caused the event to drop! [ 227.938528][ T3920] kobject: 'nullb0' (00000000ca60c8dc): kobject_uevent_env [ 227.944852][T10955] kobject: 'iosched' (00000000397c1544): kobject_uevent_env [ 227.963390][ T3920] kobject: 'nullb0' (00000000ca60c8dc): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 227.967110][T10955] kobject: 'iosched' (00000000397c1544): kobject_uevent_env: filter function caused the event to drop! [ 227.986097][T10955] kobject: 'integrity' (000000005cfd9ab5): kobject_add_internal: parent: 'loop0', set: '' [ 228.003409][T10955] kobject: 'integrity' (000000005cfd9ab5): kobject_uevent_env [ 228.007249][ T395] kobject: 'phy9' (00000000c6c71241): kobject_uevent_env [ 228.011025][T10955] kobject: 'integrity' (000000005cfd9ab5): kobject_uevent_env: filter function caused the event to drop! [ 228.018608][ T395] kobject: 'phy9' (00000000c6c71241): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim8/ieee80211/phy9' [ 228.042364][ T395] kobject: 'ieee80211' (00000000322ddd7b): kobject_cleanup, parent 00000000e833d8e6 [ 228.052251][ T395] kobject: 'ieee80211' (00000000322ddd7b): calling ktype release 18:45:12 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001400)}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) connect$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, "0e4631be1698a09d3b2a1b1eef585df502761464882d9100a7e4b9f3ecb61cb847c33fa01a7bac07f7a36fea940e9eb180b1bb2fc1dfa6e25d2887d95531ea", 0x2e}, 0xfffffffffffffcaf) r3 = accept(0xffffffffffffffff, &(0x7f0000001440)=@isdn, &(0x7f00000001c0)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001600)=ANY=[@ANYBLOB="5113e80a6077512a2c000000", @ANYRES16=r5, @ANYBLOB="01000000000000000000010000000800050000"], 0x3}, 0x1, 0x6c}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) r8 = openat$cgroup_ro(r6, &(0x7f00000016c0)='memory.swap.current\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0xa) ioctl$UI_END_FF_ERASE(r8, 0x400c55cb, &(0x7f00000015c0)={0x10, 0x0, 0xae20}) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000001500)={0x38, r5, 0x29703433d2c06a3c, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @rand_addr="9ff07ea6b795a5665c3739a197a49ac3"}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x10008000}, 0x40000) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r9 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfffffffffffffff8, 0x200) getpeername$tipc(r9, &(0x7f0000000100)=@id, &(0x7f0000000140)=0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r10 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r10, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(r11, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0xffffffffffffff94, 0x0) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r13 = openat$cgroup_int(r12, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) r14 = openat$cgroup_ro(r12, 0x0, 0x0, 0x0) sendfile(r13, r14, 0x0, 0xa) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f00000003c0)) 18:45:12 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) semget(0x3, 0x4, 0x104) semctl$SEM_STAT(0x0, 0x758d788dc069ea1d, 0x12, &(0x7f0000000200)=""/44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x0, @rand_addr=0x8}}) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x9) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000540)="ce03100001000100ff901efc9fb35c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d04587", 0x42, 0xffffffffffffffff, 0x0, 0x0) [ 228.081340][ T3920] kobject: 'loop4' (00000000b4748c9a): kobject_uevent_env [ 228.093376][ T395] kobject: 'ieee80211': free name [ 228.104177][ T3920] kobject: 'loop4' (00000000b4748c9a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 228.108855][T10967] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 228.123588][ T395] kobject: 'hwsim8' (00000000ff089aee): kobject_uevent_env [ 228.159344][T10973] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 228.175991][ T395] kobject: 'hwsim8' (00000000ff089aee): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim8' [ 228.190045][ T3920] kobject: 'loop5' (000000007d37d61a): kobject_uevent_env 18:45:12 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010800000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x11}, 0x98) sendmmsg$inet6(r0, &(0x7f0000002980)=[{{&(0x7f0000000380)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c, &(0x7f0000000480)=[{&(0x7f00000003c0)="c2", 0x34000}], 0x1}}], 0x1, 0x20000040) [ 228.205582][ T3920] kobject: 'loop5' (000000007d37d61a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 228.222510][ T395] kobject: 'hwsim8' (00000000ff089aee): kobject_uevent_env [ 228.246330][ T395] kobject: 'hwsim8' (00000000ff089aee): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim8' [ 228.266851][T10980] netlink: 'syz-executor.5': attribute type 3 has an invalid length. [ 228.280483][T10979] kobject: 'integrity' (000000005cfd9ab5): kobject_uevent_env [ 228.291108][ T3920] kobject: 'loop1' (0000000062d69964): kobject_uevent_env [ 228.294132][ T395] kobject: 'hwsim8' (00000000ff089aee): kobject_cleanup, parent 00000000e833d8e6 [ 228.309525][T10979] kobject: 'integrity' (000000005cfd9ab5): kobject_uevent_env: filter function caused the event to drop! [ 228.321298][ T395] kobject: 'hwsim8' (00000000ff089aee): calling ktype release [ 228.331445][T10979] kobject: 'integrity' (000000005cfd9ab5): kobject_cleanup, parent 00000000e833d8e6 [ 228.340399][ T3920] kobject: 'loop1' (0000000062d69964): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 228.345828][ T395] kobject: 'hwsim8': free name [ 228.360385][T10979] kobject: 'integrity' (000000005cfd9ab5): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. [ 228.370094][ T3920] kobject: 'loop2' (0000000013544cc2): kobject_uevent_env [ 228.380571][ T395] kobject: 'phy9' (00000000c6c71241): kobject_cleanup, parent 00000000e833d8e6 [ 228.398244][T10979] kobject: 'integrity': free name [ 228.399735][ T3920] kobject: 'loop2' (0000000013544cc2): fill_kobj_path: path = '/devices/virtual/block/loop2' 18:45:12 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) semget(0x3, 0x4, 0x104) semctl$SEM_STAT(0x0, 0x758d788dc069ea1d, 0x12, &(0x7f0000000200)=""/44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x0, @rand_addr=0x8}}) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x9) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000540)="ce03100001000100ff901efc9fb35c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d04587", 0x42, 0xffffffffffffffff, 0x0, 0x0) [ 228.405813][ T395] kobject: 'phy9' (00000000c6c71241): calling ktype release [ 228.434922][ T395] kobject: 'rfkill11' (00000000f7c60f17): kobject_cleanup, parent 00000000e833d8e6 [ 228.452734][T10979] kobject: '7:0' (00000000e86758ac): kobject_uevent_env 18:45:12 executing program 0: r0 = socket$inet(0x10, 0x3, 0x100000000000c) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0xffffffffffffff5b, &(0x7f0000000080)=[{&(0x7f0000000040)="2400000002031f001cfffd946fa2830020200a700900010001e700000000a3a2e92886a8", 0x24}], 0x1}, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000180)={'lo\x00'}) [ 228.463391][ T395] kobject: 'rfkill11' (00000000f7c60f17): calling ktype release [ 228.464964][ T3920] kobject: 'loop3' (000000001be7c62b): kobject_uevent_env [ 228.471489][T10979] kobject: '7:0' (00000000e86758ac): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 228.492842][ T395] kobject: 'rfkill11': free name [ 228.494308][T10979] kobject: '7:0' (00000000e86758ac): kobject_cleanup, parent 00000000e833d8e6 [ 228.498182][ T395] kobject: 'phy9': free name [ 228.524615][ T3920] kobject: 'loop3' (000000001be7c62b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 228.535671][T10987] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 228.550674][T10987] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 228.596966][T10979] kobject: '7:0' (00000000e86758ac): calling ktype release [ 228.608358][T10979] kobject: '7:0': free name [ 228.613920][T10979] kobject: 'mq' (00000000967dc8a1): kobject_uevent_env [ 228.615383][ T395] kobject: 'batman_adv' (00000000852d6156): kobject_uevent_env [ 228.620836][T10979] kobject: 'mq' (00000000967dc8a1): kobject_uevent_env: filter function caused the event to drop! [ 228.642611][T10979] kobject: 'queue' (00000000213aaac3): kobject_uevent_env [ 228.649937][T10979] kobject: 'queue' (00000000213aaac3): kobject_uevent_env: filter function caused the event to drop! [ 228.655045][ T395] kobject: 'batman_adv' (00000000852d6156): kobject_uevent_env: filter function caused the event to drop! [ 228.666225][T10979] kobject: 'iosched' (00000000397c1544): kobject_uevent_env [ 228.682538][T10979] kobject: 'iosched' (00000000397c1544): kobject_uevent_env: attempted to send uevent without kset! [ 228.697317][T10979] kobject: 'holders' (00000000cc54ed05): kobject_cleanup, parent 00000000493ace6a [ 228.706937][T10979] kobject: 'holders' (00000000cc54ed05): auto cleanup kobject_del [ 228.715450][ T395] kobject: 'batman_adv' (00000000852d6156): kobject_cleanup, parent 00000000e833d8e6 [ 228.718505][T10979] kobject: 'holders' (00000000cc54ed05): calling ktype release [ 228.725600][ T395] kobject: 'batman_adv' (00000000852d6156): calling ktype release [ 228.732805][T10979] kobject: (00000000cc54ed05): dynamic_kobj_release [ 228.740741][ T395] kobject: (00000000852d6156): dynamic_kobj_release [ 228.740753][ T395] kobject: 'batman_adv': free name [ 228.741269][ T395] kobject: 'rx-0' (00000000b908e0aa): kobject_cleanup, parent 000000000b0b7f4c [ 228.758624][T10979] kobject: 'holders': free name [ 228.777257][T10979] kobject: 'slaves' (00000000b77c6401): kobject_cleanup, parent 00000000493ace6a [ 228.786792][T10979] kobject: 'slaves' (00000000b77c6401): auto cleanup kobject_del [ 228.794253][ T395] kobject: 'rx-0' (00000000b908e0aa): auto cleanup 'remove' event [ 228.798115][T10979] kobject: 'slaves' (00000000b77c6401): calling ktype release [ 228.811470][T10979] kobject: (00000000b77c6401): dynamic_kobj_release [ 228.822039][T10979] kobject: 'slaves': free name [ 228.830382][ T395] kobject: 'rx-0' (00000000b908e0aa): kobject_uevent_env [ 228.844337][T10979] kobject: 'loop0' (00000000493ace6a): kobject_uevent_env [ 228.859304][T10979] kobject: 'loop0' (00000000493ace6a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 228.869935][ T395] kobject: 'rx-0' (00000000b908e0aa): kobject_uevent_env: uevent_suppress caused the event to drop! [ 228.887518][ T395] kobject: 'rx-0' (00000000b908e0aa): auto cleanup kobject_del [ 228.895847][ T395] kobject: 'rx-0' (00000000b908e0aa): calling ktype release [ 228.906340][ T395] kobject: 'rx-0': free name [ 228.911211][ T395] kobject: 'tx-3' (00000000825ee41b): kobject_cleanup, parent 000000000b0b7f4c 18:45:13 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_IPPROTO={0x8}]}, 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x3ded5adb) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") splice(r0, 0x0, r2, 0x0, 0x200000011002, 0x2) 18:45:13 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stat\x00') exit(0x0) lseek(r0, 0x4, 0x0) [ 228.941238][T10979] kobject: 'loop0' (00000000493ace6a): kobject_cleanup, parent 00000000e833d8e6 [ 228.965412][ T395] kobject: 'tx-3' (00000000825ee41b): auto cleanup 'remove' event [ 228.980211][T10979] kobject: 'loop0' (00000000493ace6a): calling ktype release [ 228.993163][ T395] kobject: 'tx-3' (00000000825ee41b): kobject_uevent_env [ 229.005881][T10979] kobject: 'queue' (00000000213aaac3): kobject_cleanup, parent 00000000e833d8e6 [ 229.017769][ T395] kobject: 'tx-3' (00000000825ee41b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 229.032972][T10979] kobject: 'queue' (00000000213aaac3): calling ktype release [ 229.044993][ T395] kobject: 'tx-3' (00000000825ee41b): auto cleanup kobject_del [ 229.051815][ T2867] kobject: 'iosched' (00000000397c1544): kobject_cleanup, parent 00000000e833d8e6 [ 229.065377][T10979] kobject: 'queue': free name [ 229.070348][ T2867] kobject: 'iosched' (00000000397c1544): calling ktype release [ 229.080367][ T395] kobject: 'tx-3' (00000000825ee41b): calling ktype release [ 229.086606][T10979] kobject: 'loop0': free name [ 229.092463][ T2867] kobject: 'iosched': free name [ 229.134797][ T395] kobject: 'tx-3': free name [ 229.143717][ T395] kobject: 'tx-2' (00000000422cf040): kobject_cleanup, parent 000000000b0b7f4c [ 229.169513][ T395] kobject: 'tx-2' (00000000422cf040): auto cleanup 'remove' event [ 229.172445][ T2867] kobject: '0' (0000000042977ff4): kobject_cleanup, parent 00000000e833d8e6 [ 229.202919][ T395] kobject: 'tx-2' (00000000422cf040): kobject_uevent_env [ 229.240366][ T2867] kobject: '0' (0000000042977ff4): calling ktype release [ 229.261126][ T395] kobject: 'tx-2' (00000000422cf040): kobject_uevent_env: uevent_suppress caused the event to drop! [ 229.263192][ T2867] kobject: '0': free name [ 229.274514][T11002] netlink: 'syz-executor.5': attribute type 3 has an invalid length. [ 229.281441][ T2867] kobject: 'cpu0' (00000000bf0e3598): kobject_cleanup, parent 00000000e833d8e6 [ 229.293397][ T395] kobject: 'tx-2' (00000000422cf040): auto cleanup kobject_del [ 229.305607][ T395] kobject: 'tx-2' (00000000422cf040): calling ktype release [ 229.313015][ T395] kobject: 'tx-2': free name [ 229.318043][ T395] kobject: 'tx-1' (0000000037b3ee21): kobject_cleanup, parent 000000000b0b7f4c [ 229.327788][ T395] kobject: 'tx-1' (0000000037b3ee21): auto cleanup 'remove' event [ 229.336024][ T395] kobject: 'tx-1' (0000000037b3ee21): kobject_uevent_env [ 229.343268][ T395] kobject: 'tx-1' (0000000037b3ee21): kobject_uevent_env: uevent_suppress caused the event to drop! [ 229.354425][ T395] kobject: 'tx-1' (0000000037b3ee21): auto cleanup kobject_del [ 229.362314][ T395] kobject: 'tx-1' (0000000037b3ee21): calling ktype release [ 229.362457][ T2867] kobject: 'cpu0' (00000000bf0e3598): calling ktype release [ 229.370237][ T395] kobject: 'tx-1': free name [ 229.380379][ T2867] kobject: 'cpu0': free name 18:45:13 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) semget(0x3, 0x4, 0x104) semctl$SEM_STAT(0x0, 0x758d788dc069ea1d, 0x12, &(0x7f0000000200)=""/44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x0, @rand_addr=0x8}}) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x9) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000540)="ce03100001000100ff901efc9fb35c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d04587", 0x42, 0xffffffffffffffff, 0x0, 0x0) [ 229.386846][ T2867] kobject: 'cpu1' (00000000d25ca747): kobject_cleanup, parent 00000000e833d8e6 [ 229.399114][ T2867] kobject: 'cpu1' (00000000d25ca747): calling ktype release [ 229.406679][ T2867] kobject: 'cpu1': free name [ 229.411428][ T2867] kobject: 'mq' (00000000967dc8a1): kobject_cleanup, parent 00000000e833d8e6 [ 229.420627][ T395] kobject: 'tx-0' (00000000e6310a3e): kobject_cleanup, parent 000000000b0b7f4c [ 229.424330][ T2867] kobject: 'mq' (00000000967dc8a1): calling ktype release [ 229.439355][ T2867] kobject: 'mq': free name [ 229.440725][ T3920] kobject: 'loop1' (0000000062d69964): kobject_uevent_env [ 229.455419][ T395] kobject: 'tx-0' (00000000e6310a3e): auto cleanup 'remove' event [ 229.457234][ T3920] kobject: 'loop1' (0000000062d69964): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 229.464946][ T395] kobject: 'tx-0' (00000000e6310a3e): kobject_uevent_env [ 229.482885][ T395] kobject: 'tx-0' (00000000e6310a3e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 229.497402][ T395] kobject: 'tx-0' (00000000e6310a3e): auto cleanup kobject_del [ 229.505439][ T395] kobject: 'tx-0' (00000000e6310a3e): calling ktype release [ 229.512993][ T395] kobject: 'tx-0': free name [ 229.520339][ T3920] kobject: 'nullb0' (00000000ca60c8dc): kobject_uevent_env [ 229.531169][ T395] kobject: 'queues' (000000000b0b7f4c): kobject_cleanup, parent 00000000e833d8e6 [ 229.537801][ T3920] kobject: 'nullb0' (00000000ca60c8dc): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 229.568886][ T395] kobject: 'queues' (000000000b0b7f4c): calling ktype release [ 229.582196][ T395] kobject: 'queues' (000000000b0b7f4c): kset_release 18:45:13 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001400)}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) connect$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, "0e4631be1698a09d3b2a1b1eef585df502761464882d9100a7e4b9f3ecb61cb847c33fa01a7bac07f7a36fea940e9eb180b1bb2fc1dfa6e25d2887d95531ea", 0x2e}, 0xfffffffffffffcaf) r3 = accept(0xffffffffffffffff, &(0x7f0000001440)=@isdn, &(0x7f00000001c0)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001600)=ANY=[@ANYBLOB="5113e80a6077512a2c000000", @ANYRES16=r5, @ANYBLOB="01000000000000000000010000000800050000"], 0x3}, 0x1, 0x6c}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) r8 = openat$cgroup_ro(r6, &(0x7f00000016c0)='memory.swap.current\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0xa) ioctl$UI_END_FF_ERASE(r8, 0x400c55cb, &(0x7f00000015c0)={0x10, 0x0, 0xae20}) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000001500)={0x38, r5, 0x29703433d2c06a3c, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @rand_addr="9ff07ea6b795a5665c3739a197a49ac3"}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x10008000}, 0x40000) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r9 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfffffffffffffff8, 0x200) getpeername$tipc(r9, &(0x7f0000000100)=@id, &(0x7f0000000140)=0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r10 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r10, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(r11, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0xffffffffffffff94, 0x0) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r13 = openat$cgroup_int(r12, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) r14 = openat$cgroup_ro(r12, 0x0, 0x0, 0x0) sendfile(r13, r14, 0x0, 0xa) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f00000003c0)) [ 229.592767][ T395] kobject: 'queues': free name [ 229.606690][ T3920] kobject: 'loop2' (0000000013544cc2): kobject_uevent_env [ 229.609781][ T395] kobject: 'wlan2' (000000004f6bf6bf): kobject_uevent_env [ 229.617292][ T3920] kobject: 'loop2' (0000000013544cc2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 229.621202][ T395] kobject: 'wlan2' (000000004f6bf6bf): kobject_uevent_env: uevent_suppress caused the event to drop! [ 229.647792][ T395] kobject: 'net' (00000000059fce0b): kobject_cleanup, parent 00000000e833d8e6 [ 229.657058][ T395] kobject: 'net' (00000000059fce0b): calling ktype release [ 229.667646][ T395] kobject: 'net': free name 18:45:14 executing program 0: r0 = socket$inet(0x10, 0x3, 0x100000000000c) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0xffffffffffffff5b, &(0x7f0000000080)=[{&(0x7f0000000040)="2400000002031f001cfffd946fa2830020200a700900010001e700000000a3a2e92886a8", 0x24}], 0x1}, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000180)={'lo\x00'}) 18:45:14 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) semget(0x3, 0x4, 0x104) semctl$SEM_STAT(0x0, 0x758d788dc069ea1d, 0x12, &(0x7f0000000200)=""/44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x0, @rand_addr=0x8}}) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x9) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000540)="ce03100001000100ff901efc9fb35c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d04587", 0x42, 0xffffffffffffffff, 0x0, 0x0) 18:45:14 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) semget(0x3, 0x4, 0x104) semctl$SEM_STAT(0x0, 0x758d788dc069ea1d, 0x12, &(0x7f0000000200)=""/44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x0, @rand_addr=0x8}}) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x9) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000540)="ce03100001000100ff901efc9fb35c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d04587", 0x42, 0xffffffffffffffff, 0x0, 0x0) [ 229.857056][ T9583] kobject: '7:0' (00000000b37ada23): kobject_add_internal: parent: 'bdi', set: 'devices' [ 229.870271][ T9583] kobject: '7:0' (00000000b37ada23): kobject_uevent_env [ 229.881204][ T395] kobject: 'wlan2' (000000004f6bf6bf): kobject_cleanup, parent 00000000e833d8e6 [ 229.881427][ T9583] kobject: '7:0' (00000000b37ada23): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 229.903383][ T395] kobject: 'wlan2' (000000004f6bf6bf): calling ktype release [ 229.903547][ T9583] kobject: 'loop0' (000000002af78467): kobject_add_internal: parent: 'block', set: 'devices' [ 229.921391][ T9583] kobject: 'loop0' (000000002af78467): kobject_uevent_env [ 229.922253][ T395] kobject: 'wlan2': free name [ 229.933864][ T395] kobject: 'rfkill9' (00000000bf9d6dea): kobject_uevent_env [ 229.936361][ T9583] kobject: 'loop0' (000000002af78467): kobject_uevent_env: uevent_suppress caused the event to drop! 18:45:14 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stat\x00') exit(0x0) lseek(r0, 0x4, 0x0) 18:45:14 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) semget(0x3, 0x4, 0x104) semctl$SEM_STAT(0x0, 0x758d788dc069ea1d, 0x12, &(0x7f0000000200)=""/44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x0, @rand_addr=0x8}}) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x9) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000540)="ce03100001000100ff901efc9fb35c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d04587", 0x42, 0xffffffffffffffff, 0x0, 0x0) [ 229.941344][ T395] kobject: 'rfkill9' (00000000bf9d6dea): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim6/ieee80211/phy7/rfkill9' [ 230.011967][ T9583] kobject: 'holders' (0000000045fba7f7): kobject_add_internal: parent: 'loop0', set: '' [ 230.025921][ T9583] kobject: 'slaves' (0000000074258cb3): kobject_add_internal: parent: 'loop0', set: '' [ 230.036714][ T395] kobject: 'phy7' (00000000127dd6f1): kobject_uevent_env [ 230.036787][ T9583] kobject: 'loop0' (000000002af78467): kobject_uevent_env [ 230.044066][ T395] kobject: 'phy7' (00000000127dd6f1): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim6/ieee80211/phy7' [ 230.063788][ T395] kobject: 'ieee80211' (00000000621fd164): kobject_cleanup, parent 00000000e833d8e6 [ 230.073245][ T395] kobject: 'ieee80211' (00000000621fd164): calling ktype release [ 230.081100][ T395] kobject: 'ieee80211': free name [ 230.081199][ T9583] kobject: 'loop0' (000000002af78467): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 230.086496][ T395] kobject: 'hwsim6' (00000000db9e416f): kobject_uevent_env [ 230.103884][ T395] kobject: 'hwsim6' (00000000db9e416f): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim6' [ 230.117289][ T395] kobject: 'hwsim6' (00000000db9e416f): kobject_uevent_env [ 230.125399][ T395] kobject: 'hwsim6' (00000000db9e416f): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim6' [ 230.137227][ T395] kobject: 'hwsim6' (00000000db9e416f): kobject_cleanup, parent 00000000e833d8e6 [ 230.147465][ T9583] kobject: 'queue' (00000000bc0256c6): kobject_add_internal: parent: 'loop0', set: '' [ 230.158305][ T9583] kobject: 'mq' (00000000c262ff5f): kobject_add_internal: parent: 'loop0', set: '' [ 230.168516][ T395] kobject: 'hwsim6' (00000000db9e416f): calling ktype release [ 230.176208][ T9583] kobject: 'mq' (00000000c262ff5f): kobject_uevent_env [ 230.183515][ T395] kobject: 'hwsim6': free name [ 230.188392][ T395] kobject: 'phy7' (00000000127dd6f1): kobject_cleanup, parent 00000000e833d8e6 [ 230.197783][ T9583] kobject: 'mq' (00000000c262ff5f): kobject_uevent_env: filter function caused the event to drop! [ 230.208659][ T395] kobject: 'phy7' (00000000127dd6f1): calling ktype release [ 230.216431][ T9583] kobject: '0' (000000008aeb54a0): kobject_add_internal: parent: 'mq', set: '' [ 230.226032][ T395] kobject: 'rfkill9' (00000000bf9d6dea): kobject_cleanup, parent 00000000e833d8e6 [ 230.235428][ T9583] kobject: 'cpu0' (00000000bf9fb38c): kobject_add_internal: parent: '0', set: '' [ 230.245469][ T395] kobject: 'rfkill9' (00000000bf9d6dea): calling ktype release [ 230.253156][ T9583] kobject: 'cpu1' (000000000799b671): kobject_add_internal: parent: '0', set: '' [ 230.262892][ T395] kobject: 'rfkill9': free name [ 230.267870][ T395] kobject: 'phy7': free name [ 230.273833][ T9583] kobject: 'iosched' (0000000065b9e8eb): kobject_add_internal: parent: 'queue', set: '' [ 230.284781][ T9583] kobject: 'queue' (00000000bc0256c6): kobject_uevent_env [ 230.291982][ T9583] kobject: 'queue' (00000000bc0256c6): kobject_uevent_env: filter function caused the event to drop! [ 230.302952][ T9583] kobject: 'iosched' (0000000065b9e8eb): kobject_uevent_env [ 230.310414][ T9583] kobject: 'iosched' (0000000065b9e8eb): kobject_uevent_env: filter function caused the event to drop! [ 230.321612][ T9583] kobject: 'integrity' (000000006d812daf): kobject_add_internal: parent: 'loop0', set: '' [ 230.332773][ T9583] kobject: 'integrity' (000000006d812daf): kobject_uevent_env [ 230.343374][ T9583] kobject: 'integrity' (000000006d812daf): kobject_uevent_env: filter function caused the event to drop! [ 230.363467][ T3920] kobject: 'loop3' (000000001be7c62b): kobject_uevent_env [ 230.370620][ T3920] kobject: 'loop3' (000000001be7c62b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 230.390219][ T395] kobject: 'batman_adv' (00000000f48526a7): kobject_uevent_env [ 230.431156][ T395] kobject: 'batman_adv' (00000000f48526a7): kobject_uevent_env: filter function caused the event to drop! [ 230.444290][T11021] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 230.471530][ T3920] kobject: 'loop1' (0000000062d69964): kobject_uevent_env [ 230.480902][T11021] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 230.516093][ T395] kobject: 'batman_adv' (00000000f48526a7): kobject_cleanup, parent 00000000e833d8e6 [ 230.525981][ T3920] kobject: 'loop1' (0000000062d69964): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 230.547032][T11025] kobject: 'integrity' (000000006d812daf): kobject_uevent_env [ 230.559185][T11025] kobject: 'integrity' (000000006d812daf): kobject_uevent_env: filter function caused the event to drop! [ 230.563799][ T395] kobject: 'batman_adv' (00000000f48526a7): calling ktype release [ 230.581757][T11025] kobject: 'integrity' (000000006d812daf): kobject_cleanup, parent 00000000e833d8e6 [ 230.587356][ T3920] kobject: 'loop5' (000000007d37d61a): kobject_uevent_env [ 230.599922][T11025] kobject: 'integrity' (000000006d812daf): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. [ 230.612718][ T3920] kobject: 'loop5' (000000007d37d61a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 230.623243][ T395] kobject: (00000000f48526a7): dynamic_kobj_release [ 230.626343][ T3920] kobject: 'loop4' (00000000b4748c9a): kobject_uevent_env [ 230.638694][ T3920] kobject: 'loop4' (00000000b4748c9a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 230.640119][ T395] kobject: 'batman_adv': free name [ 230.651417][ T3920] kobject: 'loop0' (000000002af78467): kobject_uevent_env [ 230.659592][ T395] kobject: 'rx-0' (00000000b443abcd): kobject_cleanup, parent 0000000040e652b1 [ 230.673512][T11025] kobject: 'integrity': free name [ 230.680963][ T3920] kobject: 'loop0' (000000002af78467): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 230.690048][ T395] kobject: 'rx-0' (00000000b443abcd): auto cleanup 'remove' event [ 230.700758][T11025] kobject: '7:0' (00000000b37ada23): kobject_uevent_env [ 230.708018][ T3920] kobject: 'nullb0' (00000000ca60c8dc): kobject_uevent_env [ 230.717828][T11025] kobject: '7:0' (00000000b37ada23): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 230.730709][ T395] kobject: 'rx-0' (00000000b443abcd): kobject_uevent_env [ 230.738022][ T395] kobject: 'rx-0' (00000000b443abcd): kobject_uevent_env: uevent_suppress caused the event to drop! [ 230.738778][ T3920] kobject: 'nullb0' (00000000ca60c8dc): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 230.753006][ T395] kobject: 'rx-0' (00000000b443abcd): auto cleanup kobject_del 18:45:14 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001400)}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) connect$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, "0e4631be1698a09d3b2a1b1eef585df502761464882d9100a7e4b9f3ecb61cb847c33fa01a7bac07f7a36fea940e9eb180b1bb2fc1dfa6e25d2887d95531ea", 0x2e}, 0xfffffffffffffcaf) r3 = accept(0xffffffffffffffff, &(0x7f0000001440)=@isdn, &(0x7f00000001c0)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001600)=ANY=[@ANYBLOB="5113e80a6077512a2c000000", @ANYRES16=r5, @ANYBLOB="01000000000000000000010000000800050000"], 0x3}, 0x1, 0x6c}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) r8 = openat$cgroup_ro(r6, &(0x7f00000016c0)='memory.swap.current\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0xa) ioctl$UI_END_FF_ERASE(r8, 0x400c55cb, &(0x7f00000015c0)={0x10, 0x0, 0xae20}) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000001500)={0x38, r5, 0x29703433d2c06a3c, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @rand_addr="9ff07ea6b795a5665c3739a197a49ac3"}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x10008000}, 0x40000) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r9 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfffffffffffffff8, 0x200) getpeername$tipc(r9, &(0x7f0000000100)=@id, &(0x7f0000000140)=0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r10 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r10, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(r11, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0xffffffffffffff94, 0x0) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r13 = openat$cgroup_int(r12, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) r14 = openat$cgroup_ro(r12, 0x0, 0x0, 0x0) sendfile(r13, r14, 0x0, 0xa) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f00000003c0)) [ 230.766171][T11025] kobject: '7:0' (00000000b37ada23): kobject_cleanup, parent 00000000e833d8e6 [ 230.771251][ T395] kobject: 'rx-0' (00000000b443abcd): calling ktype release [ 230.785655][T11025] kobject: '7:0' (00000000b37ada23): calling ktype release [ 230.794075][T11025] kobject: '7:0': free name [ 230.799188][T11025] kobject: 'mq' (00000000c262ff5f): kobject_uevent_env [ 230.821212][ T395] kobject: 'rx-0': free name [ 230.830123][T11025] kobject: 'mq' (00000000c262ff5f): kobject_uevent_env: filter function caused the event to drop! [ 230.832398][ T395] kobject: 'tx-3' (000000002c993c84): kobject_cleanup, parent 0000000040e652b1 [ 230.860998][T11025] kobject: 'queue' (00000000bc0256c6): kobject_uevent_env [ 230.867267][ T395] kobject: 'tx-3' (000000002c993c84): auto cleanup 'remove' event [ 230.871780][T11025] kobject: 'queue' (00000000bc0256c6): kobject_uevent_env: filter function caused the event to drop! [ 230.876243][ T395] kobject: 'tx-3' (000000002c993c84): kobject_uevent_env [ 230.891917][T11025] kobject: 'iosched' (0000000065b9e8eb): kobject_uevent_env [ 230.894210][ T395] kobject: 'tx-3' (000000002c993c84): kobject_uevent_env: uevent_suppress caused the event to drop! [ 230.901853][T11025] kobject: 'iosched' (0000000065b9e8eb): kobject_uevent_env: attempted to send uevent without kset! [ 230.912615][ T395] kobject: 'tx-3' (000000002c993c84): auto cleanup kobject_del [ 230.935278][T11025] kobject: 'holders' (0000000045fba7f7): kobject_cleanup, parent 000000002af78467 [ 230.937797][ T395] kobject: 'tx-3' (000000002c993c84): calling ktype release [ 230.948453][T11025] kobject: 'holders' (0000000045fba7f7): auto cleanup kobject_del [ 230.954075][ T395] kobject: 'tx-3': free name [ 230.965187][T11025] kobject: 'holders' (0000000045fba7f7): calling ktype release [ 230.966709][ T395] kobject: 'tx-2' (00000000815ef664): kobject_cleanup, parent 0000000040e652b1 [ 230.974493][T11025] kobject: (0000000045fba7f7): dynamic_kobj_release [ 230.984401][ T395] kobject: 'tx-2' (00000000815ef664): auto cleanup 'remove' event [ 230.992276][T11025] kobject: 'holders': free name [ 230.998431][ T395] kobject: 'tx-2' (00000000815ef664): kobject_uevent_env [ 231.006365][T11025] kobject: 'slaves' (0000000074258cb3): kobject_cleanup, parent 000000002af78467 [ 231.010325][ T395] kobject: 'tx-2' (00000000815ef664): kobject_uevent_env: uevent_suppress caused the event to drop! [ 231.019721][T11025] kobject: 'slaves' (0000000074258cb3): auto cleanup kobject_del [ 231.030277][ T395] kobject: 'tx-2' (00000000815ef664): auto cleanup kobject_del [ 231.041426][T11025] kobject: 'slaves' (0000000074258cb3): calling ktype release [ 231.045833][ T395] kobject: 'tx-2' (00000000815ef664): calling ktype release [ 231.056720][T11025] kobject: (0000000074258cb3): dynamic_kobj_release [ 231.060826][ T395] kobject: 'tx-2': free name [ 231.067857][T11025] kobject: 'slaves': free name [ 231.072484][ T395] kobject: 'tx-1' (000000004b5c3faf): kobject_cleanup, parent 0000000040e652b1 [ 231.082421][T11025] kobject: 'loop0' (000000002af78467): kobject_uevent_env [ 231.085823][ T395] kobject: 'tx-1' (000000004b5c3faf): auto cleanup 'remove' event [ 231.085830][ T395] kobject: 'tx-1' (000000004b5c3faf): kobject_uevent_env [ 231.085838][ T395] kobject: 'tx-1' (000000004b5c3faf): kobject_uevent_env: uevent_suppress caused the event to drop! [ 231.085844][ T395] kobject: 'tx-1' (000000004b5c3faf): auto cleanup kobject_del [ 231.085888][ T395] kobject: 'tx-1' (000000004b5c3faf): calling ktype release [ 231.085894][ T395] kobject: 'tx-1': free name [ 231.085933][ T395] kobject: 'tx-0' (0000000037140b01): kobject_cleanup, parent 0000000040e652b1 [ 231.085939][ T395] kobject: 'tx-0' (0000000037140b01): auto cleanup 'remove' event [ 231.085945][ T395] kobject: 'tx-0' (0000000037140b01): kobject_uevent_env [ 231.085959][ T395] kobject: 'tx-0' (0000000037140b01): kobject_uevent_env: uevent_suppress caused the event to drop! [ 231.096939][T11025] kobject: 'loop0' (000000002af78467): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 231.100877][ T395] kobject: 'tx-0' (0000000037140b01): auto cleanup kobject_del [ 231.100925][ T395] kobject: 'tx-0' (0000000037140b01): calling ktype release [ 231.198075][ T395] kobject: 'tx-0': free name [ 231.203033][ T395] kobject: 'queues' (0000000040e652b1): kobject_cleanup, parent 00000000e833d8e6 [ 231.217654][T11025] kobject: 'loop0' (000000002af78467): kobject_cleanup, parent 00000000e833d8e6 [ 231.226895][ T395] kobject: 'queues' (0000000040e652b1): calling ktype release [ 231.227476][T11025] kobject: 'loop0' (000000002af78467): calling ktype release [ 231.234379][ T395] kobject: 'queues' (0000000040e652b1): kset_release [ 231.234395][ T395] kobject: 'queues': free name [ 231.234712][ T395] kobject: 'wlan1' (00000000bf822b11): kobject_uevent_env [ 231.245553][T11025] kobject: 'queue' (00000000bc0256c6): kobject_cleanup, parent 00000000e833d8e6 18:45:15 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) semget(0x3, 0x4, 0x104) semctl$SEM_STAT(0x0, 0x758d788dc069ea1d, 0x12, &(0x7f0000000200)=""/44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x0, @rand_addr=0x8}}) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x9) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000540)="ce03100001000100ff901efc9fb35c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d04587", 0x42, 0xffffffffffffffff, 0x0, 0x0) [ 231.248811][ T395] kobject: 'wlan1' (00000000bf822b11): kobject_uevent_env: uevent_suppress caused the event to drop! [ 231.280531][ T395] kobject: 'net' (00000000517958cb): kobject_cleanup, parent 00000000e833d8e6 [ 231.289488][ T395] kobject: 'net' (00000000517958cb): calling ktype release [ 231.297550][ T395] kobject: 'net': free name [ 231.311333][T11025] kobject: 'queue' (00000000bc0256c6): calling ktype release [ 231.319384][ T12] kobject: 'iosched' (0000000065b9e8eb): kobject_cleanup, parent 00000000e833d8e6 [ 231.332106][T11025] kobject: 'queue': free name [ 231.337167][T11025] kobject: 'loop0': free name [ 231.343216][ T12] kobject: 'iosched' (0000000065b9e8eb): calling ktype release [ 231.354298][ T12] kobject: 'iosched': free name [ 231.359247][ T12] kobject: '0' (000000008aeb54a0): kobject_cleanup, parent 00000000e833d8e6 [ 231.373563][ T3920] kobject: 'loop2' (0000000013544cc2): kobject_uevent_env [ 231.380719][ T3920] kobject: 'loop2' (0000000013544cc2): fill_kobj_path: path = '/devices/virtual/block/loop2' 18:45:15 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) semget(0x3, 0x4, 0x104) semctl$SEM_STAT(0x0, 0x758d788dc069ea1d, 0x12, &(0x7f0000000200)=""/44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x0, @rand_addr=0x8}}) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x9) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000540)="ce03100001000100ff901efc9fb35c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d04587", 0x42, 0xffffffffffffffff, 0x0, 0x0) 18:45:15 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) semget(0x3, 0x4, 0x104) semctl$SEM_STAT(0x0, 0x758d788dc069ea1d, 0x12, &(0x7f0000000200)=""/44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x0, @rand_addr=0x8}}) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x9) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000540)="ce03100001000100ff901efc9fb35c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d04587", 0x42, 0xffffffffffffffff, 0x0, 0x0) [ 231.435112][ T3920] kobject: 'loop4' (00000000b4748c9a): kobject_uevent_env [ 231.446594][ T12] kobject: '0' (000000008aeb54a0): calling ktype release [ 231.462969][ T3920] kobject: 'loop4' (00000000b4748c9a): fill_kobj_path: path = '/devices/virtual/block/loop4' 18:45:15 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) semget(0x3, 0x4, 0x104) semctl$SEM_STAT(0x0, 0x758d788dc069ea1d, 0x12, &(0x7f0000000200)=""/44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x0, @rand_addr=0x8}}) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r2, &(0x7f0000004000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x9) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000540)="ce03100001000100ff901efc9fb35c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d04587", 0x42, 0xffffffffffffffff, 0x0, 0x0) [ 231.490725][ T12] kobject: '0': free name [ 231.493465][ T395] kobject: 'wlan1' (00000000bf822b11): kobject_cleanup, parent 00000000e833d8e6 [ 231.504630][ T9583] kobject: '7:0' (000000004436cbe4): kobject_add_internal: parent: 'bdi', set: 'devices' [ 231.505203][ T12] kobject: 'cpu0' (00000000bf9fb38c): kobject_cleanup, parent 00000000e833d8e6 [ 231.534539][ T395] kobject: 'wlan1' (00000000bf822b11): calling ktype release [ 231.540138][ T9583] kobject: '7:0' (000000004436cbe4): kobject_uevent_env [ 231.558363][ T395] kobject: 'wlan1': free name [ 231.567936][ T9583] kobject: '7:0' (000000004436cbe4): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 231.575855][ T395] kobject: 'rfkill7' (00000000355c9452): kobject_uevent_env [ 231.579494][ T9583] kobject: 'loop0' (00000000f8ae46ef): kobject_add_internal: parent: 'block', set: 'devices' [ 231.595272][ T12] kobject: 'cpu0' (00000000bf9fb38c): calling ktype release [ 231.595278][ T12] kobject: 'cpu0': free name [ 231.595294][ T12] kobject: 'cpu1' (000000000799b671): kobject_cleanup, parent 00000000e833d8e6 [ 231.595309][ T12] kobject: 'cpu1' (000000000799b671): calling ktype release [ 231.603594][ T9583] kobject: 'loop0' (00000000f8ae46ef): kobject_uevent_env [ 231.624992][ T395] kobject: 'rfkill7' (00000000355c9452): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim4/ieee80211/phy5/rfkill7' [ 231.631651][ T9583] kobject: 'loop0' (00000000f8ae46ef): kobject_uevent_env: uevent_suppress caused the event to drop! [ 231.644384][ T12] kobject: 'cpu1': free name [ 231.659905][ T12] kobject: 'mq' (00000000c262ff5f): kobject_cleanup, parent 00000000e833d8e6 [ 231.662617][ T9583] kobject: 'holders' (00000000ee965060): kobject_add_internal: parent: 'loop0', set: '' [ 231.682448][ T9583] kobject: 'slaves' (000000009aff4b85): kobject