[info] Using makefile-style concurrent boot in runlevel 2. [ 42.929118][ T26] audit: type=1800 audit(1574739792.240:21): pid=7543 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 42.973852][ T26] audit: type=1800 audit(1574739792.240:22): pid=7543 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.138' (ECDSA) to the list of known hosts. 2019/11/26 03:43:23 fuzzer started 2019/11/26 03:43:24 dialing manager at 10.128.0.105:37257 2019/11/26 03:43:25 syscalls: 2566 2019/11/26 03:43:25 code coverage: enabled 2019/11/26 03:43:25 comparison tracing: enabled 2019/11/26 03:43:25 extra coverage: extra coverage is not supported by the kernel 2019/11/26 03:43:25 setuid sandbox: enabled 2019/11/26 03:43:25 namespace sandbox: enabled 2019/11/26 03:43:25 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/26 03:43:25 fault injection: enabled 2019/11/26 03:43:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/26 03:43:25 net packet injection: enabled 2019/11/26 03:43:25 net device setup: enabled 2019/11/26 03:43:25 concurrency sanitizer: enabled 2019/11/26 03:43:25 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 72.979122][ T7711] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/26 03:43:50 adding functions to KCSAN blacklist: 'hrtimer_wakeup' 'do_task_stat' 'echo_char' 'generic_file_read_iter' 'ext4_writepages' 'ext4_xattr_get' 'blk_mq_sched_dispatch_requests' 'wbc_detach_inode' 'get_signal' 'tomoyo_update_stat' 'taskstats_exit' 'tick_sched_do_timer' 'rcu_gp_fqs_check_wake' 'inode_permission' 'install_new_memslots' '__d_lookup_done' 'pipe_poll' 'page_counter_try_charge' 'inet_sk_diag_fill' 'sctp_association_free' 'blk_mq_run_hw_queue' 'complete_signal' 'relay_switch_subbuf' '__lru_cache_add' 'lruvec_lru_size' 'flush_workqueue' '__snd_rawmidi_transmit_ack' 'xprt_clear_locked' 'timer_clear_idle' 'list_lru_count_one' 'inactive_list_is_low' 'ksys_read' '__dev_queue_xmit' 'snd_seq_timer_get_cur_tick' '__skb_try_recv_from_queue' 'handle_userfault' 'shmem_add_to_page_cache' 'xas_find_marked' '__delete_from_page_cache' '__filemap_fdatawrite_range' 'do_readlinkat' 'ep_poll' 'ext4_free_inodes_count' 'futex_wait_queue_me' '__add_to_page_cache_locked' 'iput' '__writeback_single_inode' 'calc_timer_values' 'run_timer_softirq' 'ext4_free_inode' 'atime_needs_update' 'ktime_get_seconds' 'd_delete' 'blk_mq_free_request' 'exit_signals' 'dd_has_work' 'mem_cgroup_select_victim_node' 'virtqueue_enable_cb_delayed' 'snd_seq_check_queue' 'common_perm_cond' 'other_inode_match' 'd_set_mounted' 'fib6_clean_node' '__release_sock' 'add_timer' 'tick_nohz_idle_stop_tick' 'kauditd_thread' 'bio_endio' '__dentry_kill' 'pcpu_alloc' 'sbitmap_queue_clear' 'rcu_gp_fqs_loop' 'virtqueue_disable_cb' 'generic_fillattr' 'sctp_assoc_migrate' 'page_counter_charge' 'ext4_setattr' 'do_signal_stop' 'ip_tunnel_xmit' 'snd_ctl_notify' 'do_exit' 'shmem_getpage_gfp' 'ext4_mb_good_group' 'percpu_counter_add_batch' 'wbt_done' '__mark_inode_dirty' 'wbt_wait' 'generic_permission' 'n_tty_receive_buf_common' 'bio_chain' '__hrtimer_run_queues' '__splice_from_pipe' 'tick_nohz_next_event' 'commit_echoes' 'writeback_sb_inodes' 'ext4_nonda_switch' 'audit_log_start' 'fasync_remove_entry' 'add_timer_on' 'ext4_mb_find_by_goal' 'cma_comp_exch' 'wbc_attach_and_unlock_inode' 'af_alg_sendmsg' '__skb_wait_for_more_packets' 'blk_mq_get_request' 'blk_mq_dispatch_rq_list' 'do_syslog' 'icmp_global_allow' 'packet_do_bind' 'poll_schedule_timeout' 'pid_update_inode' 'sit_tunnel_xmit' 'ip_finish_output2' 'enqueue_timer' 'yama_ptracer_del' 'unix_release_sock' 'delete_from_page_cache_batch' '__ext4_new_inode' 'evict' 'userfaultfd_ioctl' 'tick_do_update_jiffies64' '__perf_event_overflow' 'file_remove_privs' 'find_next_bit' 'generic_write_end' 'ext4_mark_iloc_dirty' 'p9_poll_workfn' 'ns_capable_common' 'netlink_getname' 'tcp_add_backlog' 'xas_clear_mark' 'shmem_file_read_iter' '__process_echoes' 'd_instantiate_new' 'ext4_da_write_end' 'ondemand_readahead' 'snd_seq_prioq_cell_out' 'batadv_tt_local_add' 'kcm_rcv_strparser' 'blk_stat_add' 'vm_area_dup' 'tomoyo_supervisor' 'copy_process' 'process_srcu' 'watchdog' 'filemap_map_pages' 'lookup_fast' '__rcu_read_unlock' 'ext4_has_free_clusters' 'do_nanosleep' 'ktime_get_real_seconds' 'find_get_pages_range_tag' 'pipe_wait' 'wbt_issue' 'ip6_dst_gc' 'kvm_mmu_notifier_invalidate_range_end' 03:48:10 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001600)={&(0x7f0000000100)=@name={0x1e, 0x2, 0x2, {{0x1, 0x2}, 0x2}}, 0x10, &(0x7f0000001540)=[{&(0x7f00000012c0)="d6ddef50ab6de074345678d47ec17c5b92ceca92d336176a649d51464b825d4313d52427b6f6cbbb43bc615e8beff668fb0af6eba7e80a7966af2b058bc32ac22994dafddaa8371f15aad9ce529c7fd586830b24c4a5c0c9ab76c521e070b2f368d948696c85d8e5363ab36417f8958d8fe32c50624325bc1fff2452604757f158b80ee57afb18b9b2ab4ba5bef4840fb41159e7f55d0d81717f8f46ae31ed3a9aa1ca5e33a78597c51386c8a1623fb6fa4484614f8a0954aec34a8b017d8b662148bc39", 0xc4}, {&(0x7f00000013c0)="c62f33734a2679e9be9562ba628565048221e4bad97e25c6831b959ebad905224c51499ef94638016b5b326cfdc5ca066d246119fd533303d79330cc5540c30714b23f959a343f4ef33084a5c3868468e30d0a087f2acc5e0daeddf61e4a3489df7526c9b9218c0d2cc48a3a62b14c5511758a1f4978d24fc35c6099e9aa0725c5629e09d63a957097ab7123f14a0fc16a0fc436a8c8b9cdca724ded960ae4ac16e1dc34291c17", 0xa7}, {&(0x7f0000001480)="ec327f31eed93773e906cfb82ccbedd1bcd6ed4547482fee4108768d4e381435904d4f34105cb5b6854ab0534c79d5a029c2b368abb2e2694712df9a7c62ff76cd08433a7f375993ccf1e6bc21d8c298e315c971112b7af876809c49727222d9cd09e5bd3b1aa2fdcaad2a31646bf0ba0a112b7d188db4102502dace16b891b714e6fec098839a1c3043280e2c611ab86593eaf5fe7efe228f923a", 0x9b}], 0x3, &(0x7f0000001580), 0x0, 0x8000}, 0x0) 03:48:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') readv(r0, &(0x7f0000001340)=[{&(0x7f0000000080)=""/131, 0x83}, {&(0x7f0000000140)=""/40, 0x28}], 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) [ 341.289529][ T7715] IPVS: ftp: loaded support on port[0] = 21 [ 341.409659][ T7715] chnl_net:caif_netlink_parms(): no params data found [ 341.468000][ T7715] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.493864][ T7715] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.501807][ T7715] device bridge_slave_0 entered promiscuous mode [ 341.509287][ T7715] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.516915][ T7715] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.524807][ T7715] device bridge_slave_1 entered promiscuous mode [ 341.543264][ T7715] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 341.546105][ T7718] IPVS: ftp: loaded support on port[0] = 21 [ 341.553608][ T7715] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:10 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x2) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) pipe2(0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4004700e, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x4000, 0x0) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) r8 = memfd_create(&(0x7f0000000000)='^posix_acl_accessppp1\\\x00', 0x0) splice(r8, 0x0, r7, &(0x7f0000000100), 0x1, 0x0) ioctl$LOOP_SET_FD(r6, 0x4c00, r8) r9 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r9, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r5, 0x0) read(r3, &(0x7f0000000000)=""/250, 0x128b9372) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) [ 341.578455][ T7715] team0: Port device team_slave_0 added [ 341.587860][ T7715] team0: Port device team_slave_1 added [ 341.686583][ T7715] device hsr_slave_0 entered promiscuous mode [ 341.744097][ T7715] device hsr_slave_1 entered promiscuous mode 03:48:11 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x301402, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x1d, 0x80) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) process_vm_writev(r3, 0x0, 0x0, &(0x7f0000001d00), 0x0, 0x0) setpriority(0x0, r3, 0xffffffff) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0xc033, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffff7f, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) r6 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000600), 0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x10, 0x0, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(r6, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r5, 0x0, 0xfff3, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r5, 0x0, r4, 0x0, 0x1000000000000003, 0x0) sendto$packet(r5, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) lremovexattr(&(0x7f0000000180)='./file1\x00', &(0x7f0000000140)=@known='trusted.overlay.origin\x00') [ 341.889338][ T7722] IPVS: ftp: loaded support on port[0] = 21 [ 341.943266][ T7715] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.950460][ T7715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.957815][ T7715] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.965136][ T7715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.161833][ T7718] chnl_net:caif_netlink_parms(): no params data found 03:48:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000480)="390000001300090468fe0700000000000000ff3f04000000450100010000000004002b000a00010014a4ee1ee438d2fd000000000000006e00", 0x39}], 0x1) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) [ 342.270845][ T7715] 8021q: adding VLAN 0 to HW filter on device bond0 [ 342.327949][ T7715] 8021q: adding VLAN 0 to HW filter on device team0 [ 342.328944][ T7748] IPVS: ftp: loaded support on port[0] = 21 [ 342.374462][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 342.382885][ T3515] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.436324][ T3515] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.465175][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 342.498213][ T7718] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.524792][ T7718] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.564571][ T7718] device bridge_slave_0 entered promiscuous mode [ 342.583872][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 342.592808][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 342.644239][ T3515] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.651339][ T3515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.684432][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 342.693353][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 342.746890][ T3515] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.754058][ T3515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.794383][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 342.837520][ T7718] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.845752][ T7718] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.873862][ T7718] device bridge_slave_1 entered promiscuous mode [ 342.910834][ T7754] IPVS: ftp: loaded support on port[0] = 21 [ 342.926348][ T7722] chnl_net:caif_netlink_parms(): no params data found [ 342.936182][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 342.954858][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 342.963443][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 343.014918][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 343.023747][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 343.075119][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 343.083663][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 343.114767][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 03:48:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000100)="25bca26f769e620a2734fa009de0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7086270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@commit={'commit'}}]}) [ 343.136126][ T7715] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 343.176148][ T7715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 343.219005][ T7720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 343.228166][ T7720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 343.266296][ T7718] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 343.345078][ T7718] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 343.460032][ T7722] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.475547][ T7722] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.490196][ T7722] device bridge_slave_0 entered promiscuous mode [ 343.540155][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 343.565254][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 343.575144][ T7715] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 343.583554][ T7722] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.601667][ T7722] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.611534][ T7722] device bridge_slave_1 entered promiscuous mode [ 343.623379][ T7718] team0: Port device team_slave_0 added [ 343.634398][ T7718] team0: Port device team_slave_1 added [ 343.637362][ T7764] IPVS: ftp: loaded support on port[0] = 21 [ 343.736201][ T7718] device hsr_slave_0 entered promiscuous mode [ 343.764060][ T7718] device hsr_slave_1 entered promiscuous mode [ 343.813871][ T7718] debugfs: Directory 'hsr0' with parent '/' already present! [ 343.829445][ T7748] chnl_net:caif_netlink_parms(): no params data found [ 343.856756][ T7722] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 343.868462][ T7754] chnl_net:caif_netlink_parms(): no params data found [ 343.900566][ T7722] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 343.988936][ T7754] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.003857][ T7754] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.011767][ T7754] device bridge_slave_0 entered promiscuous mode [ 344.055199][ T7748] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.062322][ T7748] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.086231][ T7748] device bridge_slave_0 entered promiscuous mode 03:48:13 executing program 0: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0xc4b8, 0x0) socket(0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000100)="d6a044b49d5e86c446272414bf17d22f3bf21017ff071a2ebade354b204b345c5d73623052e4c5c7183e43ee63b0b66587c5a64f0a9ab90e5217290807e14794548af575e585fd200a6934dd2e80cec786656b534b6037bfde4fe026cfcec698b55640679d7c3d0b935455aa93ce1d7c0d6c46fae22ea252b93813897fb587ea9b9348a006ac75a2847ee245da6a719ed355662242d35cdcb2e8d9df9e3ff95319cbc59148a380a1c88f418e919b2ea44b4ba07f80a0fb9238edd095ce9bd580bdb2d19a14a929b489", 0xffffffffffffffb0, 0x57, 0x0, 0x0) [ 344.120395][ T7754] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.131008][ T7754] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.179716][ T7754] device bridge_slave_1 entered promiscuous mode [ 344.260974][ T7748] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.283950][ T7748] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.291761][ T7748] device bridge_slave_1 entered promiscuous mode [ 344.334954][ T7722] team0: Port device team_slave_0 added [ 344.390421][ T7754] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 344.426877][ T7722] team0: Port device team_slave_1 added [ 344.468596][ T7754] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:13 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000040)={[], 0x0, 0x8040, 0x7, 0x870}) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r1, 0x0, 0x0) close(r1) r2 = socket(0x10, 0x80002, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, r3, 0xeb9}, 0x14}}, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x44, r3, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}]}, 0x44}}, 0xc086) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 344.538227][ T7748] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 344.626271][ T7722] device hsr_slave_0 entered promiscuous mode [ 344.646952][ T7722] device hsr_slave_1 entered promiscuous mode [ 344.683853][ T7722] debugfs: Directory 'hsr0' with parent '/' already present! [ 344.691430][ T7764] chnl_net:caif_netlink_parms(): no params data found [ 344.724322][ T7754] team0: Port device team_slave_0 added [ 344.731364][ T7748] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 344.768635][ T7754] team0: Port device team_slave_1 added [ 344.848950][ T7718] 8021q: adding VLAN 0 to HW filter on device bond0 03:48:14 executing program 0: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0xc4b8, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000100)="d6a044b49d5e86c446272414bf17d22f3bf21017ff071a2ebade354b204b345c5d73623052e4c5c7183e43ee63b0b66587c5a64f0a9ab90e5217290807e14794548af575e585fd200a6934dd2e80cec786656b534b6037bfde4fe026cfcec698b55640679d7c3d0b935455aa93ce1d7c0d6c46fae22ea252b93813897fb587ea9b9348a006ac75a2847ee245da6a719ed355662242d35cdcb2e8d9df9e3ff95319cbc59148a380a1c88f418e919b2ea44b4ba07f80a0fb9238edd095ce9bd580bdb2d19a14a929b489", 0xffffffffffffffb0, 0x57, 0x0, 0x0) [ 344.923177][ T7748] team0: Port device team_slave_0 added [ 344.941033][ T7764] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.972058][ T7764] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.995943][ T7764] device bridge_slave_0 entered promiscuous mode [ 345.011797][ T7718] 8021q: adding VLAN 0 to HW filter on device team0 [ 345.076335][ T7754] device hsr_slave_0 entered promiscuous mode [ 345.106302][ T7754] device hsr_slave_1 entered promiscuous mode [ 345.183929][ T7754] debugfs: Directory 'hsr0' with parent '/' already present! [ 345.204492][ T7748] team0: Port device team_slave_1 added [ 345.214763][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 345.222855][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 345.267565][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.279792][ T7764] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.334955][ T7764] device bridge_slave_1 entered promiscuous mode [ 345.498210][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 345.547586][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 345.622519][ T7719] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.629808][ T7719] bridge0: port 1(bridge_slave_0) entered forwarding state 03:48:15 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x80802, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000009c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\fg\x85\xfb\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4\xee2\xc2$Wx\x15^\xdaM\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{d\a\x00\x00\x00\x00\x00\x00\x00\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\xd5\x90\x1c\xb4Dy\x04C\xb2\'3j\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1S\xfb\xaa', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000300)) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r1, 0x28, &(0x7f0000000600)}, 0xfffffffffffffffb) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) setsockopt$sock_attach_bpf(r2, 0x29, 0x7, &(0x7f0000000200)=r3, 0x9ebe5b9d47df9f2d) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000180)=@nl, 0x80, 0x0}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0xb1}, {0x6}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 345.794306][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 345.802917][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.924148][ T7719] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.931366][ T7719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.044597][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 346.113790][ C0] hrtimer: interrupt took 39024 ns [ 346.146422][ T7748] device hsr_slave_0 entered promiscuous mode [ 346.184165][ T7748] device hsr_slave_1 entered promiscuous mode [ 346.213829][ T7748] debugfs: Directory 'hsr0' with parent '/' already present! [ 346.268849][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 346.314886][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 346.402968][ T7722] 8021q: adding VLAN 0 to HW filter on device bond0 [ 346.456532][ T7764] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 346.530572][ T7722] 8021q: adding VLAN 0 to HW filter on device team0 [ 346.584816][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 346.608724][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 346.668933][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 346.731342][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 346.787055][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 346.841549][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 346.890646][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 346.942012][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 347.044797][ T7718] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 347.104484][ T7718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 347.135414][ T7764] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 347.217597][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 347.242109][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 347.321044][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 347.382986][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 347.445883][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 347.511141][ T3515] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.518383][ T3515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.619626][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 347.692518][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 347.753317][ T3515] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.760510][ T3515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.862384][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 347.929114][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 348.012388][ T7754] 8021q: adding VLAN 0 to HW filter on device bond0 [ 348.058632][ T7720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 348.087518][ T7720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 348.165351][ T7720] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 348.243030][ T7720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 348.311256][ T7720] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 348.388351][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 348.421078][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 348.476238][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 348.540151][ T7754] 8021q: adding VLAN 0 to HW filter on device team0 [ 348.598300][ T7764] team0: Port device team_slave_0 added [ 348.605678][ T7764] team0: Port device team_slave_1 added [ 348.614732][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 348.632140][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 348.695348][ T7722] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 348.744309][ T7722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 348.791728][ T7718] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 348.861897][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 348.874471][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 348.883070][ T7719] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.890144][ T7719] bridge0: port 1(bridge_slave_0) entered forwarding state 03:48:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "a900", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 349.007374][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 349.064595][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 349.094346][ T7719] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.101436][ T7719] bridge0: port 2(bridge_slave_1) entered forwarding state 03:48:18 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000008440)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/227, 0xe3}], 0x1, &(0x7f0000000280)=""/194, 0xc2}, 0x6}, {{&(0x7f0000000380)=@l2, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000140)=""/7, 0x7}, {&(0x7f0000000400)=""/179, 0xb3}, {&(0x7f00000004c0)=""/136, 0x88}, {&(0x7f0000000580)=""/143, 0x8f}, {&(0x7f0000000640)=""/196, 0xc4}, {&(0x7f0000000740)=""/237, 0xed}, {&(0x7f0000000840)=""/124, 0x7c}, {&(0x7f00000008c0)=""/209, 0xd1}], 0x8, &(0x7f0000000a40)=""/213, 0xd5}, 0xffffffff}, {{&(0x7f0000000b40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000bc0)=""/246, 0xf6}], 0x1, &(0x7f0000000d00)=""/213, 0xd5}, 0x7f}, {{&(0x7f0000000e00)=@alg, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000e80)=""/205, 0xcd}], 0x1, &(0x7f0000000fc0)}, 0x5}, {{&(0x7f0000001000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x80, &(0x7f00000031c0)=[{&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f0000002080)=""/29, 0x1d}, {&(0x7f00000020c0)=""/173, 0xad}, {&(0x7f0000002180)=""/12, 0xc}, {&(0x7f00000021c0)=""/4096, 0x1000}], 0x5, &(0x7f0000003240)=""/64, 0x40}, 0x1}, {{0x0, 0x0, &(0x7f0000003600)=[{&(0x7f0000003280)=""/50, 0x32}, {&(0x7f00000032c0)=""/119, 0x77}, {&(0x7f0000003340)=""/221, 0xdd}, {&(0x7f0000003440)=""/93, 0x5d}, {&(0x7f00000034c0)=""/71, 0x47}, {&(0x7f0000003540)}, {&(0x7f0000003580)=""/96, 0x60}], 0x7, &(0x7f0000003680)=""/4096, 0x1000}, 0x800000}, {{&(0x7f0000004680)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000004a80)=[{&(0x7f0000004700)=""/218, 0xda}, {&(0x7f0000004800)=""/63, 0x3f}, {&(0x7f0000004840)=""/96, 0x60}, {&(0x7f00000048c0)=""/153, 0x99}, {&(0x7f0000004980)=""/244, 0xf4}], 0x5, &(0x7f0000004b00)=""/54, 0x36}, 0xa417}, {{&(0x7f0000004b40)=@alg, 0x80, &(0x7f0000006e40)=[{&(0x7f0000004bc0)=""/4096, 0x1000}, {&(0x7f0000005bc0)=""/6, 0x6}, {&(0x7f0000005c00)=""/241, 0xf1}, {&(0x7f0000005d00)=""/119, 0x77}, {&(0x7f0000005d80)=""/115, 0x73}, {&(0x7f0000005e00)=""/4096, 0x1000}, {&(0x7f0000006e00)=""/26, 0x1a}], 0x7, &(0x7f0000006ec0)=""/120, 0x78}, 0xffff}, {{&(0x7f0000008200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000008340)=[{&(0x7f0000008280)=""/142, 0x8e}], 0x1, &(0x7f0000008380)=""/171, 0xab}, 0x8}], 0x9, 0x1, 0x0) tkill(r0, 0x9) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002c40), 0x299, 0x0) [ 349.144686][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 349.153523][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 349.204569][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 349.239540][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 349.267751][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 349.345919][ T7764] device hsr_slave_0 entered promiscuous mode [ 349.374149][ T7764] device hsr_slave_1 entered promiscuous mode 03:48:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000500)=@ipmr_newroute={0x7bc, 0x18, 0x0, 0x0, 0x0, {}, [@RTA_OIF={0x8}, @RTA_IIF={0x8}, @RTA_METRICS={0x790, 0x8, "f41ab2340f69b4585fda5ad60bfadc2f90e87d5f163664f069f3654f98dd91bb4e953630be6fcf45bfba0fdceff47c6ffa6322e6bccecb446537e8abb062025222879c19a1ae86293edbf6d6c34bd9dc0d7e204f385d3b7c8caab486662a5387760582f10c0838c9be048a297fb99c1b2bf2a750c9d8a90376c5a2e076cf65d3672283b0e49c36c02e6c3e3052f01062f6d1fafba728c659be85c307d296e71207c35a3b887f36d92d11b42d36ec5f2bc5bc890bd88d994367c1a8171e5291e0e7a27eafe123927756626301aeade512beb55b949d95d2adbea76fceeee52693bcb7a68f1fb2728455be6d9ab89e0d15193bb1bfa9bc186dbd60d452c1f25a9235eaebdf573fc4474d550bc0583335e3c64cb85cdb4e4ded0206d9e0bc17b68d99050cb3954a4ea4c862522413a7b8c22b97294f3be71adb3c003c011f3af1a1ccecbcd838643abd7b9dd13db296edb5cdfa4bc7f4f4f7c1745473dc3b57a233d16abbb0462059cf6d81b82b9c6b02ca93c9ef0d867e6c493c4b310dde5e35d8857fad38a206d4b6aa36b10d03e0b7a70e33f0bb2228405d765e788189dd65960792b00e499e4aa35d4995388e4f81816f08b8d39e308bb2aa1197f8849dce56119ec4ff294bbfadb1ae513ad0c7e4cf8d43a62a49abba7a82f6392871ce8eea166b24bddbd09bd3b48e0acad39adcb988f4dc5eeee5c30cdbcd7ea61a510b8aebb19ed4110795dd01b5293c6bf4a20bc8a0b7995d0141da72b2033d7d073f6c66dcf760fe3fd284ca6db219179ee855fc31f1b4838add41598458d001e154541f1e8e49d2ed2d843143910fa8e05b8602e4f365e5190df3f26b4d00efee7be2d07f2f5b31a84d579bcf2b7fd71887321b4ecad2e7aa11c3c3d3d151092d275160cafaae7d55c32c044b2820025bce303ba8656a076e4b39ee92e1616f0533d92eab4d9269a9517f386d353ccd62ba721427e1e96c841ad74e11d0fc62e2d6f886f2f9c5dcd7fa4ab7353a16b221b9fa48b8ef8ed8d34f3572538fc809369b4cf210f38ac7806be8e7c1268c18813185bb1066cbe6a22a59597795dd61baace47ce22f65dd24bff11d90fab492797dd04774bc7761ab4afc9fa9cd478ffdd589ae465099bcef79973dd5b3b2eb631afe21c27095f6d1ec912b393ca1ff3e32a50ca2c11167f60e3200c71f106f0ff76d90d1de3806eb5aebe40696530102739170eec44aa4a9605b48fd2ca63324d1422e88dc0ba97e964f5d75afe7968ea6203827015f1c364fd92515f7e4f8c2ef52e88a1a35959730002c414d475af4fc9a1cf8819dcf412cc6d7bfd094f85dbb00d479724187616ac5d4ab4971936f968bdcd0d82809c5548859063d6c6765ad69c276ff804349203696e8421975e8f93f79f6f19294ac89f96b246192a8c0ddaa7fe3cc16b208dde2465f43af6a7d1838176c1eb06a304587a2efaf242ce23b1cec35b6ce9569d76902b5897f5261cf8e6f0c74e6c22059fbaaf0e39e0f73cd62cc54719a44766afc8d76fe2580794d3069457f4c6691a4a01f36040f3bdcf8ba99e800aff62a02ea007e6d39617a99e31f2ea5f0409cc95ba10e430247a30e3b312887214ce583d30e4b3baaad7390381f26e9db4a7c0260bd108ec7867fe3a25229dc85e9fa77a95e7de6f9c64d170f7176d4ec23c31c6243be50f528b67aff7f0f5d66b6dd351e3225bfbf82743f8b7f03d5a3e9d4b80694ff2b21891ba2b1d9a7a2bfd31a88175b2a5847998fb60e34bc247dd507762581be094574431834e8df61f800e0e6778c4d86d097db9a0b55cc7535bf0487164f7c9b101224ef2d5ff9568b348408939972eb120702dbc20ee6fa93a590b48e9e3ccc3ba00c5c18475e9a4cb91156cc4f39b9edd4aabfbf73c0df381bb05f51bdb40316a7b2fe0941d01065ee90eafd17b51365cae7c0749dc94eded4b61b1f7afb3300b2df4be158dba6079b8a9868046f56d2ff1d2dbd8282c14411c67dc1a9c2fd260dc871b2fa90bbdfac360d2e9afab18e05b824ef44133b437bf82c77707d8d5608bebba7e04fafdad87daf0069da1151f79b47ebee435a020f17397d1b5fcbf3e454b66e145c0e7e218024157b44e7c1af2f3cdad9db06bff622f4ae2d530f500988e29e984ef2ba140607a366cf06633971de342d697c303a2ca6bd375de17e2d53db6f85c70efd972aca5cc299ed2f80a9b0ccfd37216050890d629ad7de5377b46c9d390e663edcc6c64a77e1564224994bd60e38f02ff8430bc1f0b1cc61aeb1553fa23fd79241f993a6b000646d93c0ea167660807b9634188dedc7d940480603adaa5497e447ab201ed5037a8662826ebaedccc16927f5864359e80d6546cc7ff912f41c06ba7bc20b37a7e87ea05bf8dbf779dc217150d72d659e0aed6afd73bed845c3326d7de32df6deb7efd0a2a1dad68640ef76a1d9500facdc59f406d779147564a7e893eb47c856097966758cd594fd3758fb24e0e1260a0b6d4092d18e04b660f0b96dcc532b134cd69d209853156c3b157d30694b61b7c42e19b4705d448acf330d6f4ad9e2f71d64f26dde5b735a6bf7d14f305e5cedbb764a225b8a73a0f7f47bd9a0688cf21e78e22ec2a0595d8b3c4552ec48088026ca863cce33b56f30f00fdebb980e7681633d49bcaa0c18759697c80fe3224b11779183ed4a0fcdebb5009fc8b2ffd8dae04223c81294a5e73d74fc3abe5b"}]}, 0x7bc}}, 0x80) setgroups(0x676, &(0x7f0000000180)=[0x0, 0x0]) [ 349.413834][ T7764] debugfs: Directory 'hsr0' with parent '/' already present! [ 349.428972][ T7822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 349.442578][ T7822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 349.497305][ T7822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 349.546014][ T7822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 349.575191][ T7822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 349.593538][ T7822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 349.625323][ T7822] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 349.633444][ T7822] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 349.681597][ T7722] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 349.702047][ T7754] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 349.749015][ T7754] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 349.796261][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 349.806775][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 349.850396][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 349.872728][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 349.881810][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 349.902286][ T7754] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 349.937274][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 349.946753][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 349.957498][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 349.971821][ T7748] 8021q: adding VLAN 0 to HW filter on device bond0 [ 350.079848][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 350.104943][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 350.164931][ T7748] 8021q: adding VLAN 0 to HW filter on device team0 [ 350.209556][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 350.226753][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 03:48:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200407ed, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") writev(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d9008f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba079190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e", 0x74}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d88107b89a1516610f2003d59c73b5c7e008a287d2a1d473414b1adeb4ca87742298b064ae974e919c80525175804799682d67fca4f9defe5754c03f", 0x55}], 0x2) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="23ff1f0a8117fb62d5eb1b3c750c75c5533f01"], 0x13) sendmmsg$inet(r0, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000004c0)="8c93b369b4485a9c10410940b32f0e27d945c8c14b33d632252983591bb93b689d6e39110602c2742c532b470d9fa7322ac1690e5df60e8062db873b9560fc588ed49aba2b2527da322e73b77d95bb0444859638ca691f4b3a357aed45", 0x5d}], 0x1}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000007c0)="6704848d55e654ad6f06f85d5c8caed968361a080c9a53252ca10c8e9f2257b4300eccf6f7e8f49e10382d24c8e304851ba9f674097b80c63dc396090a3762753a1400aba6fc2b7dcec89c4c03bb4f4a995e7f0d", 0x54}], 0x1}}], 0x2, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x14c) [ 350.285649][ T7751] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.292726][ T7751] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.375097][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 350.413993][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 350.422978][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 350.494250][ T3515] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.501443][ T3515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.545115][ T7720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 350.572245][ T7748] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 350.634094][ T7748] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 350.694851][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 350.709137][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 350.737744][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 350.782408][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 350.817993][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 350.847795][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 350.881916][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 350.916961][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 350.945247][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 03:48:20 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000100)=""/50, 0x32}, {&(0x7f0000000140)=""/164, 0xa4}, {0x0}], 0x3) [ 350.979680][ T8000] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 351.006410][ T8000] device gretap0 entered promiscuous mode [ 351.051782][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 351.066878][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 351.105048][ T7748] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 351.125520][ T8000] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 351.184252][ T7822] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 351.199072][ T7822] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 351.259105][ T7764] 8021q: adding VLAN 0 to HW filter on device bond0 [ 351.332116][ T7822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 351.345967][ T7822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 351.374459][ T7764] 8021q: adding VLAN 0 to HW filter on device team0 [ 351.420137][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 351.437332][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 351.471538][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.478729][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 351.546938][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 351.559286][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 351.606402][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 351.639045][ T7719] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.646191][ T7719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 351.667677][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 351.688951][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 351.717352][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 351.752305][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 351.792108][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 351.820655][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 351.860004][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 351.891963][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 351.915620][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 351.940872][ T7764] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 351.972687][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 352.000761][ T7720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 352.013016][ T7720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 352.066896][ T7764] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 352.081551][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 352.092888][ T7751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 03:48:21 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x301402, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x1d, 0x80) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) process_vm_writev(r3, 0x0, 0x0, &(0x7f0000001d00), 0x0, 0x0) setpriority(0x0, r3, 0xffffffff) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0xc033, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffff7f, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) r6 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000600), 0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x10, 0x0, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(r6, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r5, 0x0, 0xfff3, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r5, 0x0, r4, 0x0, 0x1000000000000003, 0x0) sendto$packet(r5, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) lremovexattr(&(0x7f0000000180)='./file1\x00', &(0x7f0000000140)=@known='trusted.overlay.origin\x00') 03:48:21 executing program 1: syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x404c534a, &(0x7f0000000080)={0x0, 0x0, {0xffffffffffffffff}}) [ 352.298739][ T8037] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 352.307495][ T8037] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 03:48:21 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='configfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) 03:48:21 executing program 0: clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffc, 0x2, 0xfb}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:48:21 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234f73e9c36279b39ad432479aed75d492b41fd983f79e65199615607670d59957ab35f4ad614fd33cebbc150bb2b03b5b2461179f5f90bba001b5080da6218a8106df2858ec973328e5a2c078a3fe3b52020203517e25ee74e82ba80a0fa881e689f7615baf78f08ea33bcb860d6a0b61193d4a1cb622431d42fee5e915313fdfe5cb19ff15d6d891a92efa823a3c231ea82fdf0e7fcf567bf50600a243422daa960", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:48:21 executing program 2: socket$unix(0x1, 0x0, 0x0) eventfd2(0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8001, 0x0) eventfd2(0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000140)=0x71, 0xdd27358059215c39) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0401273, &(0x7f0000000040)={[], 0x0, 0x8040, 0x1000}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xfd64, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f0000000040)={[], 0x0, 0x4, 0x0, 0x0, 0x40}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 03:48:21 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@loopback, 0x76}) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/65, 0x15}], 0x2, 0x0, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 352.486671][ T8053] ptrace attach of "/root/syz-executor.0"[8052] was attempted by "/root/syz-executor.0"[8053] 03:48:21 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffffff0c) fallocate(r0, 0x3, 0x0, 0x8020001) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000200)="e5", 0x1}], 0x1) lseek(r0, 0x0, 0x3) [ 352.599882][ T8072] ptrace attach of "/root/syz-executor.1"[8066] was attempted by "/root/syz-executor.1"[8072] 03:48:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5279e62506cda287b857aac", 0xfffffffffffffe41, 0x40, 0x0, 0x0) 03:48:22 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0xc4b8, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000100)="d6a044b49d5e86c446272414bf17d22f3bf21017ff071a2ebade354b204b345c5d73623052e4c5c7183e43ee63b0b66587c5a64f0a9ab90e5217290807e14794548af575e585fd200a6934dd2e80cec786656b534b6037bfde4fe026cfcec698b55640679d7c3d0b935455aa93ce1d7c0d6c46fae22ea252b93813897fb587ea9b9348a006ac75a2847ee245da6a719ed355662242d35cdcb2e8d9df9e3ff95319cbc59148a380a1c88f418e919b2ea44b4ba07f80a0fb9238edd095ce9bd580bdb2d19a14a929b489", 0xffffffffffffffb0, 0x57, 0x0, 0x0) 03:48:22 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xe) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x23d, &(0x7f0000000000)=[{}]}, 0x10) 03:48:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x14e24, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x2ab, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x1000}) 03:48:22 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) io_setup(0x0, &(0x7f0000000040)) sendfile(r0, r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 03:48:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000740)=0x100, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000300)=0x200) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 03:48:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_int(r2, 0x1, 0x22, 0x0, &(0x7f0000000040)=0x187) 03:48:22 executing program 1: r0 = memfd_create(&(0x7f0000000280)='\x00', 0x0) fcntl$setlease(r0, 0x400, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$getflags(r0, 0x401) 03:48:22 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={0xa}, 0x0, 0x0, &(0x7f0000000480)={0x2, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) openat$cgroup_ro(r2, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a74a0091ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceafd07ed00b0000002cab154ad029a119ca3c97278087001460"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f065581fffffff00004000631177fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={0x0, r3, 0xf}, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffe}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0xc0045878, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x8, &(0x7f0000000040)='io.stat\x00', r1}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0x5e, &(0x7f00000000c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00', r1}, 0x30) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x52732e78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x10, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socket$kcm(0x29, 0x6, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000340), &(0x7f0000000400)='\a'}, 0x20) 03:48:22 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x301402, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) process_vm_writev(r3, 0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffff7f, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, 0x0, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r5, 0x0, 0xfff3, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r5, 0x0, r4, 0x0, 0x1000000000000003, 0x0) sendto$packet(r5, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) 03:48:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000000140)="1400000013000507ed0064d24ef862450558c653", 0x14}], 0x1, 0x0, 0x0, 0x300}, 0x0) 03:48:23 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4, 0x800}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@multicast2, @in=@multicast1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 03:48:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653f0d89abf4d209bc876003639405cb4aed12f0000000000ae47a825d8", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:48:23 executing program 1: poll(&(0x7f0000000080), 0x200000000000001a, 0x0) 03:48:23 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="e700000089b646569766b99e790cc9358e7ff714aeef84da432c91d918bb8d3a5ea049c455358bbc51d222c2d76aa5fd13dd0f61de24af66653a5fabd83ce11facf654c270a6d6adae4613e5623bc0a7a5a6ec6eb5b6869e66b8f7e1eff41aefe3d8c112ae9c07f17a87fc79c56b30ca3007e6048752d0206ff8e3305396b73b001447d2ec84ba2e185dd7a28f15bead7354c0a1f252e7ca5d320cc36cc2e17c55c5f6fb20e56b0b4bcaa79692a32905bc083f6412e3f3e8236e750756202030cb1ba71441d48cb87ddf520d4f4316a267840410e6b398fe64bcaa500e34675e07b7aca22ff8e2cc8ff1c66429"], &(0x7f0000000600)=0xef) 03:48:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x0, 0x0, &(0x7f0000000000)) 03:48:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000500)={0x0, 0x1000004, &(0x7f0000000000)={&(0x7f0000000300)={0x58, r1, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, '\nip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x58}}, 0x0) 03:48:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x0, 0x0, &(0x7f0000000000)) 03:48:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200407ed, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") writev(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d9008f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba079190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e", 0x74}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d88107b89a1516610f2003d59c73b5c7e008a287d2a1d473414b1adeb4ca87742298b064ae974e919c80525175804799682d67fca4f9defe5754c03f", 0x55}], 0x2) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="23ff1f0a8117fb62d5eb1b3c750c75c5533f018823a16997c30e069cb5b742686128af8baad097514187691d92010000009e3db9e86db57e1d384bfe3042c49ef9134937af481f2b44e023b3884e0efb76d2659a715f3b513e33fd96c9d3c9afed9390b357a4000000000000000a010000000003000000000832ff0769dea9ed32487d2bf1ac37afcf98d817857774004608d609000000701f793b97fdcccc622708000000e69857745a810000be8900009755979c72f645e9898fb9d669af77550098329a0aa58aa5"], 0xc9) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000004c0)="8c93b369b4485a9c10410940b32f0e27d945c8c14b33d632252983591bb93b689d6e39110602c2742c532b470d9fa7322ac1690e5df60e8062db873b9560fc588ed49aba2b2527da322e73b77d95bb0444859638ca691f4b3a357aed45", 0x5d}], 0x1}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000007c0)="6704848d55e654ad6f06f85d5c8caed968361a080c9a53252ca10c8e9f2257b4300eccf6f7e8f49e10382d24c8e304851ba9f674097b80c63dc396090a3762753a1400aba6fc2b7dcec89c4c03bb4f4a995e7f0d", 0x54}], 0x1}}], 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x14c) 03:48:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) socket$inet_udp(0x2, 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000740)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4, 0x0, {0xa, 0x4e23, 0x81, @rand_addr="36c09922a216651f7afa37d18d91c824", 0x80000001}}}, 0x80) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x2000, 0x3, 0x0, 0x0, 0xdf}, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='mountinfo\x00') read(r3, &(0x7f0000000380)=""/233, 0xffbe) ioctl$TIOCLINUX6(r3, 0x541c, &(0x7f00000001c0)={0x6, 0x4e}) [ 354.298226][ T8166] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 354.329060][ T8163] can: request_module (can-proto-0) failed. 03:48:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@multicast2, @in=@multicast1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 03:48:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x2, 0x1, 0x621}, 0x14}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r2, 0x0, r4, 0x0, 0x80000000, 0x0) [ 354.446709][ T8166] IPVS: persistence engine module ip_vs_pe_ [ 354.446709][ T8166] ip not found [ 354.492311][ T8173] can: request_module (can-proto-0) failed. [ 354.513477][ T8180] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 354.544640][ T8173] can: request_module (can-proto-0) failed. [ 354.564696][ T8180] IPVS: persistence engine module ip_vs_pe_ [ 354.564696][ T8180] ip not found 03:48:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000000140)="140000001300052aed0064d24ef862452658c653", 0x14}], 0x1, 0x0, 0x0, 0x300}, 0x0) 03:48:24 executing program 2: socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x4) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) socket$inet6(0xa, 0x801, 0x0) pselect6(0x33, &(0x7f00000000c0)={0x0, 0xa00f}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 03:48:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x106}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 03:48:24 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000200)={'dummy0\x00', &(0x7f0000000080)=@ethtool_drvinfo={0x1e, "2c321ecd9673d40d536ae668dbb74ede23bfbd556afa7427f9ae66e004dedb33", "41d213afd48f3e138187eb79b61f21f0851aa2ad8cafb16a5aacd9957fb50786", "20b269121b86f4e1583ed57648192b1b32591a50ebd32f432cd1f97e9334c1a8", "3416b729c4505748f6e134a08e8646cc0eee4a8d574f0866fa2705c17c2a9264", "a97c7dc328f0fb5fd25809cdb81734eb80ced134a0a9888c021ec9eaf83f39be", "e06ca3dc7ee405f86210d263"}}) 03:48:24 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000040)={0x8}, 0x400) 03:48:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab35f4ad614fd33cebbc150bb2b03b5b2461179f5f90bba001b5080da6218a8106df2858ec973328e5a2c078a3fe3b52020203517e25ee74e82ba80a0fa881e689f7615baf78f08ea33bcb860d6a0b61193d4a1", 0x9c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 354.863096][ T8203] ptrace attach of "/root/syz-executor.0"[8202] was attempted by "/root/syz-executor.0"[8203] 03:48:24 executing program 5: sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x1, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x8060000) syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, 0x0) 03:48:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) 03:48:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') read$eventfd(r0, 0x0, 0x0) 03:48:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') setgroups(0x676, &(0x7f0000000180)=[0x0, 0x0]) pread64(r2, 0x0, 0x0, 0x0) 03:48:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 03:48:24 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000340)="74261af9038ff0d9200a8ed18abf30134e6e1fea0fb2f4111fe2e14c366de8bba4a2372c8cf9175bdf651be83d2e4e8242248013fe6b55bdae163f2cb2001791dea754e71e60161a92b7c82dc0e10060d819", 0x52}], 0x1}, 0x0) r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={&(0x7f0000000000)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000740)='-', 0x1}], 0x1}, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x0, '\n'}], 0x18}, 0x0) 03:48:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$nl_netfilter(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001740)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT, @ANYPTR64, @ANYRESDEC, @ANYRESOCT, @ANYRESOCT, @ANYBLOB="40b8127c9e3447502400003119183c2a1f6c2f67ef14e0bc9f34f0e0f563f132b9d81030d92ace5da0401b18739ca7e4958895cc42a228c9b0307ff5d313c13e9df769e47129ff0fb660e658b760248c915e38dfebc469e3127b0c7f"], 0xc9}}, 0x0) sendto$inet(r0, &(0x7f0000000000)="471aa6f6fe47f7d9700fd53bda31b4ed27a2570073a5958060350aef263f37f23475c3aa9c6d91c3f81044869ed4ff0142c400e7ed6547262070ff2e1b2b4415ba049e244a4d66e12cf44e55c40cb8e08dbf1ecca1ffa740454b0a52468b6c906996e6d504054162ba008b05e29c2c5a6bbabdce122f656c4b2a099340dc4e60c40de2be1b3c1ff404ac6de2c8ad094eb7f0da7ceaed1fe1eff8aec619d43defa0bbf80246cd55fa874fb4ec3f740e05f2aa94e64b8513da0755c703acb7978c08645d5f4c8bcc0bbf", 0xc9, 0x500000c2, 0x0, 0x0) recvmmsg(r0, &(0x7f00000015c0)=[{{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000004c0)=""/236, 0xec}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="03", 0x1, 0x11, 0x0, 0x0) [ 355.446651][ T8242] FAT-fs (loop4): bogus number of reserved sectors [ 355.470072][ T8242] FAT-fs (loop4): This doesn't look like a DOS 1.x volume; no bootstrapping code 03:48:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{}, "0006e3ff00", "9686cb7391ba41ce44626e01282ccf6e", "9749b9af", "058f61ae2fe510f0"}, 0x28) sendto$inet(r0, 0x0, 0x0, 0x200407ed, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000004c0)="8c", 0x1}], 0x1}}], 0x1, 0x0) [ 355.513629][ T8242] FAT-fs (loop4): Can't find a valid FAT filesystem 03:48:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x6}}, 0xe8) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) 03:48:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x14e24, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x2ab, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:48:24 executing program 4: socket$inet(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) socket$inet(0x10, 0x3, 0xc) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) dup2(0xffffffffffffffff, 0xffffffffffffffff) pselect6(0x33, &(0x7f00000000c0)={0x0, 0xa00f}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) [ 356.115891][ T8264] ================================================================== [ 356.124043][ T8264] BUG: KCSAN: data-race in do_recvmmsg / sock_alloc_send_pskb [ 356.131489][ T8264] [ 356.133839][ T8264] read to 0xffff88809c416770 of 4 bytes by task 8270 on cpu 0: [ 356.141389][ T8264] sock_alloc_send_pskb+0xc2/0x530 [ 356.146518][ T8264] sock_alloc_send_skb+0x3b/0x50 [ 356.151466][ T8264] __ip6_append_data.isra.0+0x13f2/0x2070 [ 356.157413][ T8264] ip6_make_skb+0x1df/0x300 [ 356.161923][ T8264] udpv6_sendmsg+0x18b8/0x1c20 [ 356.166670][ T8264] inet6_sendmsg+0x6d/0x90 [ 356.171067][ T8264] sock_sendmsg+0x9f/0xc0 [ 356.175378][ T8264] ___sys_sendmsg+0x2b7/0x5d0 [ 356.180471][ T8264] __sys_sendmmsg+0x123/0x350 [ 356.185143][ T8264] __x64_sys_sendmmsg+0x64/0x80 [ 356.189978][ T8264] do_syscall_64+0xcc/0x370 [ 356.194476][ T8264] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 356.200353][ T8264] [ 356.202665][ T8264] write to 0xffff88809c416770 of 4 bytes by task 8264 on cpu 1: [ 356.210380][ T8264] do_recvmmsg+0x4de/0x5c0 [ 356.214779][ T8264] __sys_recvmmsg+0x1ef/0x200 [ 356.219465][ T8264] __x64_sys_recvmmsg+0x89/0xb0 [ 356.224739][ T8264] do_syscall_64+0xcc/0x370 [ 356.229236][ T8264] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 356.235130][ T8264] [ 356.237445][ T8264] Reported by Kernel Concurrency Sanitizer on: [ 356.243610][ T8264] CPU: 1 PID: 8264 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 356.251406][ T8264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.261459][ T8264] ================================================================== [ 356.269506][ T8264] Kernel panic - not syncing: panic_on_warn set ... [ 356.276082][ T8264] CPU: 1 PID: 8264 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 356.283863][ T8264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.293908][ T8264] Call Trace: [ 356.297657][ T8264] dump_stack+0x11d/0x181 [ 356.301976][ T8264] panic+0x210/0x640 [ 356.305886][ T8264] ? vprintk_func+0x8d/0x140 [ 356.310559][ T8264] kcsan_report.cold+0xc/0xd [ 356.315141][ T8264] kcsan_setup_watchpoint+0x3fe/0x460 [ 356.320567][ T8264] __tsan_unaligned_write4+0xc4/0x100 [ 356.325939][ T8264] do_recvmmsg+0x4de/0x5c0 [ 356.330374][ T8264] ? apic_timer_interrupt+0xa/0x20 [ 356.335495][ T8264] __sys_recvmmsg+0x1ef/0x200 [ 356.340158][ T8264] ? put_timespec64+0x94/0xc0 [ 356.344825][ T8264] __x64_sys_recvmmsg+0x89/0xb0 [ 356.349681][ T8264] do_syscall_64+0xcc/0x370 [ 356.354176][ T8264] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 356.360586][ T8264] RIP: 0033:0x45a639 [ 356.364469][ T8264] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 356.384069][ T8264] RSP: 002b:00007f48b96bec78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 356.392464][ T8264] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045a639 [ 356.400431][ T8264] RDX: 00000000000002ab RSI: 0000000020000200 RDI: 0000000000000004 [ 356.408395][ T8264] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 356.416362][ T8264] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f48b96bf6d4 [ 356.424328][ T8264] R13: 00000000004c82f0 R14: 00000000004de6e0 R15: 00000000ffffffff [ 356.433599][ T8264] Kernel Offset: disabled [ 356.437927][ T8264] Rebooting in 86400 seconds..