[ OK ] Started Regular background program processing daemon. [ OK ] Started Daily Cleanup of Temporary Directories. [ OK ] Reached target Timers. Starting Permit User Sessions... Starting getty on tty2-tty6 if dbus and logind are not available... [ OK ] Started System Logging Service. [ OK ] Found device /dev/ttyS0. [ OK ] Started Permit User Sessions. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.155' (ECDSA) to the list of known hosts. 2020/12/02 11:47:19 fuzzer started 2020/12/02 11:47:20 dialing manager at 10.128.0.26:34267 2020/12/02 11:47:20 syscalls: 3453 2020/12/02 11:47:20 code coverage: enabled 2020/12/02 11:47:20 comparison tracing: enabled 2020/12/02 11:47:20 extra coverage: enabled 2020/12/02 11:47:20 setuid sandbox: enabled 2020/12/02 11:47:20 namespace sandbox: enabled 2020/12/02 11:47:20 Android sandbox: enabled 2020/12/02 11:47:20 fault injection: enabled 2020/12/02 11:47:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/12/02 11:47:20 net packet injection: enabled 2020/12/02 11:47:20 net device setup: enabled 2020/12/02 11:47:20 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/12/02 11:47:20 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/12/02 11:47:20 USB emulation: enabled 2020/12/02 11:47:20 hci packet injection: enabled 2020/12/02 11:47:20 wifi device emulation: enabled 11:50:02 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000000c0)={0x0, 0x0, 0xffffffff}) syzkaller login: [ 233.575089][ T34] audit: type=1400 audit(1606909802.470:8): avc: denied { execmem } for pid=8500 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 11:50:02 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f00000006c0)={[{@session={'session', 0x3d, 0x900000000000}}]}) 11:50:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f033c00010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 11:50:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="68020000100013070000000000000000fe28b839df0000000004000000fc0600"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0000000000000000000ffffffffffff0000000032000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000003000000000000000000000000000000000002000000960000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000001c00170000000000000000000000000000290bb1b09b90816e0000001301140073686131"], 0x268}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000db03"], 0x78) sendmmsg(r0, &(0x7f0000000180), 0xf1, 0x0) 11:50:03 executing program 4: io_setup(0x100, &(0x7f0000000080)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) io_getevents(r0, 0x4, 0x4, &(0x7f00000000c0)=[{}, {}, {}, {}], &(0x7f00000001c0)={0x0, r1+60000000}) 11:50:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000005fc0)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) [ 234.925473][ T8501] IPVS: ftp: loaded support on port[0] = 21 [ 235.130473][ T8503] IPVS: ftp: loaded support on port[0] = 21 [ 235.230007][ T8501] chnl_net:caif_netlink_parms(): no params data found [ 235.324924][ T8505] IPVS: ftp: loaded support on port[0] = 21 [ 235.576301][ T8507] IPVS: ftp: loaded support on port[0] = 21 [ 235.654458][ T8501] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.674182][ T8501] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.690099][ T8501] device bridge_slave_0 entered promiscuous mode [ 235.700708][ T8503] chnl_net:caif_netlink_parms(): no params data found [ 235.764660][ T8501] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.773173][ T8501] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.783741][ T8501] device bridge_slave_1 entered promiscuous mode [ 235.836891][ T8509] IPVS: ftp: loaded support on port[0] = 21 [ 235.898993][ T8501] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.914225][ T8501] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 236.041768][ T8519] IPVS: ftp: loaded support on port[0] = 21 [ 236.062480][ T8501] team0: Port device team_slave_0 added [ 236.103297][ T8501] team0: Port device team_slave_1 added [ 236.115649][ T8505] chnl_net:caif_netlink_parms(): no params data found [ 236.195820][ T8501] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 236.203644][ T8501] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 236.230658][ T8501] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 236.245572][ T8501] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 236.253227][ T8501] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 236.279265][ T8501] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 236.342558][ T8503] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.350020][ T8503] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.359477][ T8503] device bridge_slave_0 entered promiscuous mode [ 236.393357][ T8503] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.403155][ T8503] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.418185][ T8503] device bridge_slave_1 entered promiscuous mode [ 236.508240][ T8501] device hsr_slave_0 entered promiscuous mode [ 236.515220][ T8501] device hsr_slave_1 entered promiscuous mode [ 236.524479][ T8507] chnl_net:caif_netlink_parms(): no params data found [ 236.555848][ T8503] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 236.569043][ T8503] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 236.642991][ T8505] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.650708][ T8505] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.658981][ T8505] device bridge_slave_0 entered promiscuous mode [ 236.677208][ T8505] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.684257][ T8505] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.693573][ T8505] device bridge_slave_1 entered promiscuous mode [ 236.762271][ T8503] team0: Port device team_slave_0 added [ 236.803149][ T8505] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 236.831307][ T8503] team0: Port device team_slave_1 added [ 236.844047][ T8505] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 236.859131][ T2993] Bluetooth: hci0: command 0x0409 tx timeout [ 236.902026][ T8509] chnl_net:caif_netlink_parms(): no params data found [ 236.933958][ T8507] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.941904][ T8507] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.950349][ T8507] device bridge_slave_0 entered promiscuous mode [ 237.012427][ T8507] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.020300][ T8507] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.030278][ T8507] device bridge_slave_1 entered promiscuous mode [ 237.040974][ T8503] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 237.048447][ T8503] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 237.076357][ T8503] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 237.087607][ T4170] Bluetooth: hci1: command 0x0409 tx timeout [ 237.096962][ T8505] team0: Port device team_slave_0 added [ 237.156114][ T8503] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 237.163199][ T8503] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 237.190731][ T8503] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 237.205217][ T8505] team0: Port device team_slave_1 added [ 237.249488][ T8507] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.285069][ T8519] chnl_net:caif_netlink_parms(): no params data found [ 237.309980][ T8507] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 237.330876][ T4170] Bluetooth: hci2: command 0x0409 tx timeout [ 237.333931][ T8503] device hsr_slave_0 entered promiscuous mode [ 237.347539][ T8503] device hsr_slave_1 entered promiscuous mode [ 237.354514][ T8503] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 237.362836][ T8503] Cannot create hsr debugfs directory [ 237.412532][ T8505] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 237.419629][ T8505] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 237.447262][ T8505] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 237.487202][ T2993] Bluetooth: hci3: command 0x0409 tx timeout [ 237.527897][ T8505] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 237.534895][ T8505] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 237.561151][ T8505] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 237.596272][ T8507] team0: Port device team_slave_0 added [ 237.608899][ T8507] team0: Port device team_slave_1 added [ 237.614795][ T8509] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.622053][ T8509] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.630556][ T8509] device bridge_slave_0 entered promiscuous mode [ 237.645561][ T8509] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.654425][ T8509] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.663358][ T8509] device bridge_slave_1 entered promiscuous mode [ 237.729631][ T2993] Bluetooth: hci4: command 0x0409 tx timeout [ 237.734851][ T8509] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.752826][ T8509] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 237.762483][ T8507] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 237.773018][ T8507] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 237.799203][ T8507] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 237.866645][ T8507] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 237.873708][ T8507] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 237.900636][ T8507] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 237.917398][ T8505] device hsr_slave_0 entered promiscuous mode [ 237.924235][ T8505] device hsr_slave_1 entered promiscuous mode [ 237.931193][ T8505] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 237.939094][ T8505] Cannot create hsr debugfs directory [ 237.958896][ T8501] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 237.966909][ T4170] Bluetooth: hci5: command 0x0409 tx timeout [ 237.980061][ T8519] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.987337][ T8519] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.995478][ T8519] device bridge_slave_0 entered promiscuous mode [ 238.013217][ T8509] team0: Port device team_slave_0 added [ 238.027125][ T8501] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 238.043183][ T8501] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 238.054879][ T8519] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.066316][ T8519] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.080324][ T8519] device bridge_slave_1 entered promiscuous mode [ 238.096317][ T8509] team0: Port device team_slave_1 added [ 238.127650][ T8501] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 238.170166][ T8507] device hsr_slave_0 entered promiscuous mode [ 238.177492][ T8507] device hsr_slave_1 entered promiscuous mode [ 238.184248][ T8507] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 238.192509][ T8507] Cannot create hsr debugfs directory [ 238.222593][ T8509] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 238.229633][ T8509] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 238.256864][ T8509] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 238.277215][ T8509] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 238.284170][ T8509] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 238.311527][ T8509] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 238.362831][ T8519] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 238.394025][ T8519] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 238.416817][ T8509] device hsr_slave_0 entered promiscuous mode [ 238.424045][ T8509] device hsr_slave_1 entered promiscuous mode [ 238.430861][ T8509] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 238.438666][ T8509] Cannot create hsr debugfs directory [ 238.500510][ T8519] team0: Port device team_slave_0 added [ 238.559081][ T8519] team0: Port device team_slave_1 added [ 238.630808][ T8519] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 238.637874][ T8519] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 238.665833][ T8519] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 238.724952][ T8519] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 238.731981][ T8519] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 238.760442][ T8519] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 238.775940][ T8503] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 238.856568][ T8503] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 238.901039][ T8519] device hsr_slave_0 entered promiscuous mode [ 238.908468][ T8519] device hsr_slave_1 entered promiscuous mode [ 238.915019][ T8519] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 238.923791][ T8519] Cannot create hsr debugfs directory [ 238.936735][ T8177] Bluetooth: hci0: command 0x041b tx timeout [ 238.945652][ T8503] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 238.987459][ T8503] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 239.125271][ T8505] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 239.143180][ T8505] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 239.177121][ T8177] Bluetooth: hci1: command 0x041b tx timeout [ 239.187445][ T8505] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 239.200472][ T8505] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 239.223804][ T8501] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.273194][ T8507] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 239.320454][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.330787][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.343050][ T8507] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 239.361565][ T8501] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.386051][ T8503] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.395229][ T8507] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 239.407099][ T8177] Bluetooth: hci2: command 0x041b tx timeout [ 239.409995][ T8507] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 239.460408][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.469427][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.481053][ T4170] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.488420][ T4170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.510141][ T8503] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.525801][ T8509] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 239.550152][ T8509] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 239.565497][ T8509] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 239.576605][ T8177] Bluetooth: hci3: command 0x041b tx timeout [ 239.599023][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.611384][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.620228][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.633110][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.643496][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.652044][ T2990] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.659185][ T2990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.667629][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.692658][ T8509] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 239.721631][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.730765][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.741845][ T2993] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.748961][ T2993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.757532][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.766066][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.774841][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.783489][ T2993] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.790594][ T2993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.799121][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.808102][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.816622][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.825683][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.833697][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 239.843357][ T2993] Bluetooth: hci4: command 0x041b tx timeout [ 239.882053][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.892475][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.901836][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.915158][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.924059][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.961485][ T8177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.977723][ T8177] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.985998][ T8177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.996913][ T8177] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.018593][ T8501] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 240.030467][ T8501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.046519][ T9806] Bluetooth: hci5: command 0x041b tx timeout [ 240.054533][ T8519] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 240.065163][ T8519] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 240.083250][ T8519] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 240.093470][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.102134][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.110642][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.119096][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.127858][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.138998][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.148667][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.173532][ T8505] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.185566][ T8519] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 240.227168][ T8503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.256727][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.264169][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.279967][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.289961][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.320895][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.328902][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.341486][ T8501] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.351869][ T8505] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.377892][ T8503] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.420430][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.429713][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.438375][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.445417][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.495866][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.504640][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 240.519301][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.529363][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 240.538150][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.547760][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.556750][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.565043][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.572142][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.580300][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.641245][ T8509] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.674872][ T8503] device veth0_vlan entered promiscuous mode [ 240.683242][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.693890][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.710791][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.719289][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 240.733106][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.765087][ T8507] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.786376][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.794342][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.803314][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.811550][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.820919][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.830026][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 240.838762][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.847985][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.856912][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.865270][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.874047][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.883150][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.891289][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.915072][ T8503] device veth1_vlan entered promiscuous mode [ 240.930738][ T8501] device veth0_vlan entered promiscuous mode [ 240.940700][ T8505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.971924][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 240.980635][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.989128][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.997744][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.005342][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.021750][ T8519] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.030109][ T2993] Bluetooth: hci0: command 0x040f tx timeout [ 241.056983][ T8507] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.065297][ T8509] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.098007][ T8501] device veth1_vlan entered promiscuous mode [ 241.114578][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 241.137026][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 241.145174][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.176800][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.185299][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.192444][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.202769][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.213434][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.223027][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.230166][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.238955][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.248249][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.256171][ T2993] Bluetooth: hci1: command 0x040f tx timeout [ 241.257014][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.269297][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.319403][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.328458][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.336936][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.344384][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.352353][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.361328][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.369744][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.379359][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.388487][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.397312][ T4170] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.404354][ T4170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.412448][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.422133][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 241.431903][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 241.443961][ T8505] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 241.471753][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 241.486597][ T2993] Bluetooth: hci2: command 0x040f tx timeout [ 241.491461][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.501996][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.511870][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.521208][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.530367][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.539779][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.548703][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.557887][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.569040][ T8519] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.587835][ T8503] device veth0_macvtap entered promiscuous mode [ 241.616599][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 241.626803][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 241.634819][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 241.643153][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.652554][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.656222][ T2993] Bluetooth: hci3: command 0x040f tx timeout [ 241.661314][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 241.675190][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.683792][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.692754][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.706256][ T8509] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 241.738816][ T8503] device veth1_macvtap entered promiscuous mode [ 241.804982][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 241.820961][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.831757][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.840925][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.849533][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 241.858900][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.867613][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.876713][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.885039][ T4170] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.892238][ T4170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.895788][ T5] Bluetooth: hci4: command 0x040f tx timeout [ 241.901045][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.915335][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.923805][ T4170] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.930989][ T4170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.939233][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.948513][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 241.956905][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.969360][ T8503] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 241.984007][ T8507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 241.993234][ T8505] device veth0_vlan entered promiscuous mode [ 242.006558][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 242.014536][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.029485][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.040426][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 242.053366][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 242.064713][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 242.084632][ T8503] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 242.114244][ T8505] device veth1_vlan entered promiscuous mode [ 242.132399][ T2993] Bluetooth: hci5: command 0x040f tx timeout [ 242.143102][ T8509] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 242.150381][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 242.150978][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 242.151630][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 242.152107][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 242.153064][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 242.153557][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 242.153652][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 242.153728][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 242.154208][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 242.179210][ T8503] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 242.244303][ T8503] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 242.254070][ T8503] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 242.263232][ T8503] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 242.283408][ T8501] device veth0_macvtap entered promiscuous mode [ 242.303920][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 242.312824][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 242.321651][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 242.330929][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 242.341120][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 242.348978][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 242.375629][ T8507] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 242.388321][ T8501] device veth1_macvtap entered promiscuous mode [ 242.402344][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 242.410682][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 242.425872][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 242.434132][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.459038][ T8519] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 242.475108][ T8519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 242.491549][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.509689][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.570728][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 242.580252][ T4170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 242.664113][ T8501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 242.684218][ T8501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.701071][ T8501] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 242.710679][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 242.724484][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 242.733532][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 242.743332][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 242.752069][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 242.761145][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 242.773509][ T8505] device veth0_macvtap entered promiscuous mode [ 242.788448][ T8505] device veth1_macvtap entered promiscuous mode [ 242.799110][ T8501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 242.813852][ T8501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.827016][ T8501] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 242.839246][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 242.861274][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 242.886057][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.894492][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 242.905099][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 242.915020][ T8507] device veth0_vlan entered promiscuous mode [ 242.947588][ T8501] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 242.971117][ T8501] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.000348][ T8501] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.027524][ T8501] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.063060][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.073422][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.082551][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 243.091285][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 243.099538][ T5] Bluetooth: hci0: command 0x0419 tx timeout [ 243.109806][ T8519] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 243.123361][ T8505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 243.135343][ T8505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 243.145153][ T8505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 243.158570][ T8505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 243.172817][ T8505] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 243.209585][ T8507] device veth1_vlan entered promiscuous mode [ 243.220884][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 243.229509][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 243.239236][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 243.278297][ T8509] device veth0_vlan entered promiscuous mode [ 243.286745][ T21] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 243.294780][ T21] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 243.318395][ T8505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 243.330625][ T2993] Bluetooth: hci1: command 0x0419 tx timeout [ 243.342383][ T8505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 243.352775][ T8505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 243.363245][ T8505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 243.376837][ T8505] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 243.393324][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 243.401452][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 243.410512][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 243.419999][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.429047][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 243.438106][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 243.447448][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.455983][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.497962][ T8507] device veth0_macvtap entered promiscuous mode [ 243.531663][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 243.554634][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 243.566649][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 243.574749][ T2993] Bluetooth: hci2: command 0x0419 tx timeout [ 243.580568][ T8509] device veth1_vlan entered promiscuous mode [ 243.606460][ T8505] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.615346][ T8505] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.624022][ T8505] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.635682][ T8505] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.698455][ T8507] device veth1_macvtap entered promiscuous mode [ 243.727288][ T9806] Bluetooth: hci3: command 0x0419 tx timeout [ 243.733800][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 243.766216][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 243.774379][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 243.799135][ T195] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 243.839626][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 243.849966][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 243.861091][ T195] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 243.867602][ T8509] device veth0_macvtap entered promiscuous mode [ 243.898439][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 243.908840][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 243.918033][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 243.926930][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 243.939968][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 243.962949][ T8509] device veth1_macvtap entered promiscuous mode [ 243.979859][ T9806] Bluetooth: hci4: command 0x0419 tx timeout [ 244.007913][ T8507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 244.023913][ T8507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.034695][ T8507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 244.054982][ T8507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.066329][ T8507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 244.083972][ T8507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.102930][ T8507] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 244.114715][ T9866] hfsplus: session requires an argument [ 244.124538][ T9866] hfsplus: unable to parse mount options [ 244.151686][ T8519] device veth0_vlan entered promiscuous mode 11:50:13 executing program 1: [ 244.193519][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 244.203185][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 244.219107][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 244.227516][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 244.236574][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 11:50:13 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d0099adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b5755563698c7e24ab61f0866f15da7f", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xee00}}}, 0x78) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 244.265954][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 244.277899][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.313406][ T8177] Bluetooth: hci5: command 0x0419 tx timeout [ 244.332197][ T8507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 244.372010][ T8507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.391583][ T8507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 244.425025][ T8507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.435820][ T8507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 244.447356][ T9877] ptrace attach of "/root/syz-executor.1"[9875] was attempted by "/root/syz-executor.1"[9877] [ 244.462137][ T8507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 11:50:13 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x1, &(0x7f0000000780)={[{@uid={'uid'}}, {@nr_blocks={'nr_blocks', 0x3d, [0x31]}}], [{@smackfsdef={'smackfsdef', 0x3d, ','}}, {@smackfshat={'smackfshat', 0x3d, 'gre0\x00'}}]}) [ 244.477977][ T8507] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 244.500394][ T8519] device veth1_vlan entered promiscuous mode [ 244.513979][ T101] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 244.515646][ T8509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 244.536866][ T101] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 244.564877][ T8509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.581077][ T8509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 244.591601][ T8509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.601620][ T8509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 244.613761][ T8509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.623713][ T8509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 244.634239][ T8509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.649247][ T8509] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 244.664652][ T8177] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 244.674641][ T8177] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.683236][ T8177] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 244.692623][ T8177] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 244.701944][ T8177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 244.710889][ T8177] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 244.718996][ T8177] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 244.728174][ T8177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 244.751657][ T8507] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 244.761104][ T8507] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 11:50:13 executing program 1: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000780)='./file0\x00', 0x14000000) [ 244.779057][ T8507] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 244.792851][ T8507] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 244.835242][ T8509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 244.856706][ T8509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.874433][ T8509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 244.896499][ T8509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.906656][ T8509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 244.917443][ T8509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.937446][ T8509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 244.947958][ T8509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.959777][ T8509] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 245.015141][ T45] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 245.023154][ T45] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 11:50:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @multicast1}, 0x10) syz_emit_ethernet(0xfed6, &(0x7f00000000c0)={@link_local, @local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @broadcast=0xe0000001}, {0x0, 0x4e22, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000140)={@local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty=0x8, @broadcast=0xe0000001}, {0x0, 0x4e22, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) [ 245.081262][ T8519] device veth0_macvtap entered promiscuous mode [ 245.107839][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 245.118038][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 245.160104][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 245.175529][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 245.190502][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 245.237202][ T8509] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 245.254662][ T8509] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 245.263371][ T8509] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 11:50:14 executing program 1: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, 0x0) [ 245.283774][ T8509] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 245.353513][ T8519] device veth1_macvtap entered promiscuous mode [ 245.379469][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 245.389088][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 245.527159][ T101] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 245.560428][ T101] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 11:50:14 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d0099adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b5755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bca008388e730000006bce15fccb2fd912e7", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:50:14 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d0099adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b5755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bca00838", 0xd8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xee00}}}, 0x78) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 245.571164][ T8519] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 245.592580][ T8519] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.620821][ T8519] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 245.638859][ T9922] ptrace attach of "/root/syz-executor.1"[9920] was attempted by "/root/syz-executor.1"[9922] [ 245.642849][ T9925] ptrace attach of "/root/syz-executor.0"[9924] was attempted by "/root/syz-executor.0"[9925] [ 245.659637][ T8519] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.659652][ T8519] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 245.659659][ T8519] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.659671][ T8519] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 245.659677][ T8519] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.659689][ T8519] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 245.659697][ T8519] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.689435][ T8519] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 245.752912][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 245.765508][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 245.785511][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 245.801265][ T8519] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 245.842907][ T8519] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.853225][ T8519] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 245.874539][ T8519] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.903109][ T8519] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 245.909484][ T9932] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 245.915249][ T8519] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.941573][ T9932] EXT4-fs (loop2): group descriptors corrupted! [ 245.944542][ T8519] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 245.985396][ T8519] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 246.004220][ T8519] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 246.024337][ T8519] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 246.036709][ T8519] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 246.051669][ T8519] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 246.061194][ T8519] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 246.071625][ T8519] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 246.080832][ T8519] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 246.130884][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 246.139968][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 246.167392][ T101] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 246.177972][ T9932] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 246.246576][ T101] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 246.256291][ T9932] EXT4-fs (loop2): group descriptors corrupted! 11:50:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x405}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f0000000240)=""/4102, 0x1006}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f00000017c0), 0xf2, 0x0, 0x0) [ 246.287075][ T33] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 246.300059][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 246.324152][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 246.375170][ T33] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 246.478182][ T195] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 246.535055][ T195] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 246.551840][ C0] hrtimer: interrupt took 45795 ns [ 246.562582][ T21] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 246.581276][ T33] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 246.601574][ T21] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 246.642760][ T45] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 246.662008][ T45] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 246.691601][ T8177] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 246.732572][ T33] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 246.798111][ T45] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 246.813491][ T45] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 246.835622][ T9806] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:50:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000001c0)=0xa) 11:50:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000402) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1}) r2 = open(&(0x7f0000000200)='./file0\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) 11:50:16 executing program 1: syz_mount_image$tmpfs(&(0x7f00000001c0)='tmpfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000780)) 11:50:16 executing program 0: syz_mount_image$tmpfs(&(0x7f00000001c0)='tmpfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)) 11:50:16 executing program 2: syz_mount_image$tmpfs(&(0x7f00000001c0)='tmpfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x1, &(0x7f0000000780)={[{@uid={'uid'}}, {@nr_blocks={'nr_blocks', 0x3d, [0x32, 0x74, 0x31]}}], [{@smackfsdef={'smackfsdef', 0x3d, ','}}, {@smackfshat={'smackfshat', 0x3d, 'gre0\x00'}}]}) 11:50:16 executing program 5: r0 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) pwritev(r0, &(0x7f00000004c0)=[{&(0x7f0000000440)="81", 0x1}], 0x1, 0x81805, 0x0) ftruncate(r0, 0x9) 11:50:16 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x9601) [ 247.871077][T10015] tmpfs: Bad value for 'nr_blocks' 11:50:16 executing program 0: syz_mount_image$tmpfs(&(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0, 0x3, &(0x7f0000000600)=[{0x0}, {0x0}, {0x0, 0x0, 0xffffffff80000001}], 0x1, &(0x7f0000000780)={[{@huge_always='huge=always'}], [{@seclabel='seclabel'}, {@smackfshat={'smackfshat', 0x3d, 'gre0\x00'}}]}) 11:50:16 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x43, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) close(r0) [ 248.028868][T10015] tmpfs: Bad value for 'nr_blocks' 11:50:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000100000011, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) io_setup(0x7, &(0x7f0000000280)=0x0) io_submit(r4, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, 0x0}]) 11:50:17 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'veth1_to_bond\x00'}) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={0x0, 0x1c}}, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self\x00', 0x180001, 0x0) close(r0) 11:50:17 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x9601) 11:50:17 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x9601) [ 249.400381][ T34] audit: type=1800 audit(1606909818.294:9): pid=10037 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=15783 res=0 errno=0 11:50:18 executing program 4: syz_mount_image$tmpfs(&(0x7f00000001c0)='tmpfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x1, &(0x7f0000000780)={[{@uid={'uid'}}, {@nr_blocks={'nr_blocks', 0x3d, [0x74, 0x31]}}], [{@smackfsdef={'smackfsdef', 0x3d, ','}}, {@smackfshat={'smackfshat', 0x3d, 'gre0\x00'}}]}) 11:50:18 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000001180)='threaded\x00', 0xa3d4) fallocate(r2, 0x0, 0x0, 0x10003) fallocate(r2, 0x3, 0x5e00, 0x2cbd) sendfile(r0, r1, 0x0, 0x13004) 11:50:18 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x9601) 11:50:18 executing program 0: sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) 11:50:18 executing program 2: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') open(&(0x7f00000000c0)='./bus\x00', 0x10307e, 0x0) utimes(&(0x7f0000000100)='./bus\x00', 0x0) rename(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='./file1\x00') 11:50:18 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x43, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) close(r0) [ 249.679763][ T34] audit: type=1800 audit(1606909818.574:10): pid=10092 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15795 res=0 errno=0 11:50:18 executing program 0: syz_mount_image$tmpfs(&(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)) [ 249.748098][ T34] audit: type=1804 audit(1606909818.624:11): pid=10099 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir993845903/syzkaller.5HKY1B/10/file0" dev="sda1" ino=15795 res=1 errno=0 [ 249.817632][ T34] audit: type=1804 audit(1606909818.624:12): pid=10092 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir993845903/syzkaller.5HKY1B/10/file0" dev="sda1" ino=15795 res=1 errno=0 [ 249.901349][ T34] audit: type=1804 audit(1606909818.794:13): pid=10099 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir993845903/syzkaller.5HKY1B/10/file0" dev="sda1" ino=15795 res=1 errno=0 [ 249.921770][T10108] tmpfs: Bad value for 'nr_blocks' [ 250.002368][T10108] tmpfs: Bad value for 'nr_blocks' 11:50:18 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x2ffff, 0x0) 11:50:18 executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f000000b000)={{}, {0x0, 0x989680}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000440}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x1c, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) r1 = memfd_create(&(0x7f00000002c0)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x2) write(r1, &(0x7f0000002000)='/', 0x1) sendfile(r1, r1, &(0x7f0000000200), 0x87) sendfile(r1, r1, &(0x7f00000007c0), 0xfec) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x0, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace(0x10, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000240)=[{{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000380)="00127402b5bdc1c69d74cf99d2aea67d593fdf339ef9d791ee0529efedfd5873e8479b3182805f3c584d899f721c361e568b08b40ca6711fe2d903cb7b03c8953bdd0410917b68b7d95cbb547fc0f8167ea52bb80157725874fe3b2b9dc10487a6638937c6c0052a5cfcd0a0b8b9e6434a262384569bf9ca231c5cf5b37b60741e3a084fe3098e1d61849124c1eca4be200e6e", 0x93}, {&(0x7f0000000b00)="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", 0x1000}, {&(0x7f00000004c0)="f9ba517434922798c4915d4a751bf5794e2beda62456ce53401f642b85c4f3392c83235eb54caec0ef904fa3ff83e99c0b71ba4bc8bb4769899bef239972a6fd5c7d1d2e866809", 0x47}, {&(0x7f0000000540)="96ac7fc589c52b899b765624d0dac6f7f351656f19de0f1effaa9befd0f88556ba21ade7d4ff52189ec82b66ed71a51d1419aad37456c07dbaa9b19bef6f6e9c52d7a04358b60138e899e4cdadcbcfdb11b86055ccae5a5a2407217bb0baa443e2cc3b1be3b69298d2cef151dfdd4f20348a054c76b83b136ee37b6baad170ebffa3214babd1f5d6d85ddc97f8074eb3029e9563abcd4ad0221070d0437961bdcd8255b382ad1d89a45e70a4ffe8ef05e2886476efd7f94dcb639062e46ff2bf38157c56f99420ef4927dc87869eeeec9fb13fb8924b7443bf30eddd5ce37b600600343208ce80e9", 0xe8}, {&(0x7f0000000100)="cf47c55f1045581ac7b76457e037475c356bcbfd292fa9c9a59efc0da6b3e1cfe33eea5c6e4aa2ec5ddf6429a885508e15d8d501525041ca0b89", 0x3a}, {&(0x7f0000000640)="8ddf7171b835f7cad3e9aff148e2ed76d43f70a15d2459ba9e97a46bd0990393d33ef88462b26391a2c01c4fc15c7566a52206c0e32d4aa05409b6a65f9366e2c41b11ca2ef94e2605ba56a1723352502f91ce4b499238019085", 0x5a}], 0x6, &(0x7f0000001b00)=ANY=[@ANYBLOB="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"], 0x1a8}}], 0x1, 0x0) setresuid(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r1, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x50, 0x2, 0x9, 0xfffffffffffff7fd, 0x3, 0x0, 0x5}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) r3 = open(&(0x7f0000000480)='./file1\x00', 0x4b023f, 0x16a) flock(0xffffffffffffffff, 0x9) sendmsg$IPSET_CMD_DEL(r3, &(0x7f00000009c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYRESOCT=r2, @ANYRES64, @ANYRESHEX, @ANYRES16], 0x64}, 0x1, 0x0, 0x0, 0x4048085}, 0x404c041) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000a80)={&(0x7f0000000500)=ANY=[], 0x64}}, 0x0) mount(&(0x7f0000000080), &(0x7f0000000080)='.', 0x0, 0x5010, 0x0) socket$inet(0x2, 0x1, 0x0) 11:50:18 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 11:50:18 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d0099adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b5755563698c7e24ab61f0866f15da7f480800b100000000050000be", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xee00}}}, 0x78) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:50:19 executing program 0: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x200}], 0x0, 0x0) 11:50:19 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x200802, 0x0) write$P9_RGETLOCK(r0, &(0x7f0000000040)={0x1f, 0x37, 0x2, {0x2, 0x18000, 0x1000, 0xffffffffffffffff, 0x1, '-'}}, 0x1f) setpgid(0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) write$P9_RGETLOCK(r0, &(0x7f0000000080)={0x20, 0x37, 0x2, {0x1, 0x1, 0x800, r1, 0x2, '\x17@'}}, 0x20) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet(0x2, 0x80f, 0x7fff) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x40, 0x0, 0x7fffffff, 0x7fffffff, {{0x8, 0x4, 0x1, 0x6, 0x20, 0x67, 0x0, 0x8, 0x29, 0x0, @broadcast, @private=0xa010102, {[@noop, @end, @lsrr={0x83, 0x7, 0x0, [@remote]}]}}}}}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000180)={r4, 0x1, 0x6, @broadcast}, 0x10) syz_mount_image$tmpfs(&(0x7f00000001c0)='tmpfs\x00', &(0x7f0000000200)='./file0\x00', 0x1, 0x7, &(0x7f0000000600)=[{&(0x7f0000000240)="3fb986a895fde9a86bfd18a1fb07cba96043b784e60e2449ddf817b5548df311e0ff932a8cd81c817ab79bbc850b9e278a4a436fb6c69889ba82e37e142632f7cf71f072e9", 0x45, 0x200}, {&(0x7f00000002c0)="35821890ef7e5a0c61fa2c7178a22f805ded0bf70ee9050e7fa61936de373476b0d37990f5c1b08d397d3fcbd10bb2ee06cf59ae1c7d3fee0c2317f086dc58749e51e1d6be02301ed3c0757b3a6588a2972f002deaf40c86390f3daf6eb72722825fb2072f6d81126d2226314585bb87a8045b7e46822dfb8aeaec0ffd1d13c22aab9abc56c2f39f7b87b5b25a108b817c96f7ab", 0x94, 0x100000000}, {&(0x7f0000000380)="3dfed37a5113c10307907bd6bcd076dfde110a96a7cb8d5816da50337135e497dcb2e78038548b7d8535e138c2b3074ce690131b519e3b06d738b2f5855a4aa1b45d0512762e38c533d9c39a04e761052f4e0eb43733106f7e26dad4f875afc7dd8a2ab49f52d3a93e1fa025165a4abf17b248684294a8a4b88d55c6eca355235df4abe7af18fb96a7d2606f2a16612c3b02a08cb6028af5bcdad5492f5ff8428a2c29371d9f67", 0xa7, 0x1000}, {&(0x7f0000000440)="32b276f5f30e25f1918e608000d8b5104ba1437a2971a214b326d22a6ab048446308118470c508ea0911f6268437662f61ee60b51c9da132448e82861b4456c4a91ce27b08056b9f8b362cdd1c8bfbf67c477db9755a11ee5e6475dd2183ee145d4013309ab3827050420064f85ff70d3c6972b926693e10f593087a845697ba60c3d7032faa25cb11d4", 0x8a, 0xc05}, {&(0x7f0000000500)="d5", 0x1, 0xffffffff80000001}, {&(0x7f0000000540)="b9536929b151bf16e57eae650b4c7e4748e42cb12ac370edadb8865977b7e91bf7d16d3770f359d97c3f3c0949901472ebbb1e7df2c8864c2d8bc6b19fa3e4bb0b78ebe8bdc8aeab25227fefe2e9e1b21db147a1c8160145faab83725f03b1427657b05e21078e8fd9536101adac721df180c7e7f90d83fda44c9def5aac71", 0x7f, 0x222d}, {&(0x7f00000005c0)="c1a67843a18f7f79dab8e4fd01bbca9b964b7365500971e150", 0x19, 0x4e2}], 0x1, &(0x7f0000000780)={[{@uid={'uid'}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x32, 0x74, 0x31, 0x6d, 0x39, 0x34]}}, {@huge_advise='huge=advise'}, {@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x30]}}, {@huge_always='huge=always'}, {@huge_never='huge=never'}], [{@seclabel='seclabel'}, {@smackfsdef={'smackfsdef', 0x3d, ','}}, {@smackfshat={'smackfshat', 0x3d, 'gre0\x00'}}, {@permit_directio='permit_directio'}]}) connect(0xffffffffffffffff, &(0x7f0000000a00)=@isdn={0x22, 0x3f, 0xff, 0x7f, 0x7f}, 0x80) 11:50:19 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000001180)='threaded\x00', 0xfc9a) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8) fallocate(r1, 0x3, 0x0, 0x2cbd) [ 250.225539][T10132] ptrace attach of "/root/syz-executor.1"[10129] was attempted by "/root/syz-executor.1"[10132] [ 250.356702][T10136] tmpfs: Bad value for 'nr_blocks' 11:50:19 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bca008388e736e518b98d91c22def1125d7b1e", 0xea}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xee00, 0x0, 0x4}}}, 0x78) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:50:19 executing program 0: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x200802, 0x0) [ 250.556744][T10147] tmpfs: Bad value for 'nr_blocks' 11:50:19 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x200802, 0x0) write$P9_RGETLOCK(r0, &(0x7f0000000040)={0x1f, 0x37, 0x0, {0x2, 0x0, 0x1000, 0xffffffffffffffff, 0x1, '-'}}, 0x1f) setpgid(0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000080)={0x20, 0x37, 0x0, {0x0, 0x0, 0x800, r1, 0x2, '\x17@'}}, 0x20) socket$inet(0x2, 0x0, 0x7fff) syz_mount_image$tmpfs(&(0x7f00000001c0)='tmpfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x5, &(0x7f0000000600)=[{&(0x7f0000000240)="3fb986a895fde9a86bfd18a1fb07cba96043b7", 0x13, 0x200}, {&(0x7f00000002c0)="35821890ef7e5a0c61fa2c7178a22f805ded0bf70ee9050e7fa61936de373476b0", 0x21, 0x100000000}, {&(0x7f0000000380)="3dfed37a5113c10307907bd6bcd076dfde110a96a7cb8d5816da50337135e497dcb2e78038548b7d8535e138c2b3074ce690131b519e3b06d738b2f5855a4aa1b45d0512762e38c533d9c39a04e761052f4e0eb43733106f7e26dad4f875afc7dd8a2ab49f52d3a93e1fa025165a4abf17b248684294a8a4b88d55c6eca355235df4abe7af18fb96a7", 0x89, 0x1000}, {&(0x7f0000000440)="32b276f5f30e25f1918e608000d8b5104ba1437a2971a214b326d22a6ab04844", 0x20}, {&(0x7f0000000500), 0x0, 0xffffffff80000001}], 0x1, &(0x7f0000000780)={[{@uid={'uid'}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x74, 0x31, 0x6d, 0x39, 0x34]}}, {@huge_advise='huge=advise'}, {@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x30]}}, {@huge_never='huge=never'}], [{@seclabel='seclabel'}, {@smackfsdef={'smackfsdef', 0x3d, ','}}, {@smackfshat={'smackfshat', 0x3d, 'gre0\x00'}}, {@permit_directio='permit_directio'}]}) 11:50:19 executing program 4: ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) socket$can_raw(0x1d, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) close(r0) [ 250.766880][T10158] ptrace attach of "/root/syz-executor.5"[10156] was attempted by "/root/syz-executor.5"[10158] 11:50:19 executing program 5: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x0, 0x0) socketpair(0x0, 0x80000, 0x0, &(0x7f00000000c0)) [ 250.910608][T10163] tmpfs: Bad value for 'nr_blocks' [ 251.037362][T10172] tmpfs: Bad value for 'nr_blocks' 11:50:20 executing program 2: 11:50:20 executing program 0: 11:50:20 executing program 5: 11:50:20 executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f000000b000)={{}, {0x0, 0x989680}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000440}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x1c, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) r1 = memfd_create(&(0x7f00000002c0)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x2) write(r1, &(0x7f0000002000)='/', 0x1) sendfile(r1, r1, &(0x7f0000000200), 0x87) sendfile(r1, r1, &(0x7f00000007c0), 0xfec) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x0, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ptrace(0x10, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000240)=[{{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000380)="00127402b5bdc1c69d74cf99d2aea67d593fdf339ef9d791ee0529efedfd5873e8479b3182805f3c584d899f721c361e568b08b40ca6711fe2d903cb7b03c8953bdd0410917b68b7d95cbb547fc0f8167ea52bb80157725874fe3b2b9dc10487a6638937c6c0052a5cfcd0a0b8b9e6434a262384569bf9ca231c5cf5b37b60741e3a084fe3098e1d61849124c1eca4be200e6e", 0x93}, {&(0x7f0000000b00)="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", 0x1000}, {&(0x7f00000004c0)="f9ba517434922798c4915d4a751bf5794e2beda62456ce53401f642b85c4f3392c83235eb54caec0ef904fa3ff83e99c0b71ba4bc8bb4769899bef239972a6fd5c7d1d2e866809", 0x47}, {&(0x7f0000000540)="96ac7fc589c52b899b765624d0dac6f7f351656f19de0f1effaa9befd0f88556ba21ade7d4ff52189ec82b66ed71a51d1419aad37456c07dbaa9b19bef6f6e9c52d7a04358b60138e899e4cdadcbcfdb11b86055ccae5a5a2407217bb0baa443e2cc3b1be3b69298d2cef151dfdd4f20348a054c76b83b136ee37b6baad170ebffa3214babd1f5d6d85ddc97f8074eb3029e9563abcd4ad0221070d0437961bdcd8255b382ad1d89a45e70a4ffe8ef05e2886476efd7f94dcb639062e46ff2bf38157c56f99420ef4927dc87869eeeec9fb13fb8924b7443bf30eddd5ce37b600600343208ce80e9", 0xe8}, {&(0x7f0000000100)="cf47c55f1045581ac7b76457e037475c356bcbfd292fa9c9a59efc0da6b3e1cfe33eea5c6e4aa2ec5ddf6429a885508e15d8d501525041ca0b89", 0x3a}, {&(0x7f0000000640)="8ddf7171b835f7cad3e9aff148e2ed76d43f70a15d2459ba9e97a46bd0990393d33ef88462b26391a2c01c4fc15c7566a52206c0e32d4aa05409b6a65f9366e2c41b11ca2ef94e2605ba56a1723352502f91ce4b499238019085", 0x5a}], 0x6, &(0x7f0000001b00)=ANY=[@ANYBLOB="11000000000000000000000001000000090000000000000014000000000000000000000001000000ffffffff00000000140000000000000000000000010000000600000000000000110000000000000000000000010000003300000000000000140000000000000000000000010000000200000000000000cc0000000000000000000000070000008616000000020010c0ccf100617430dc7e2c40becdfa443cd8730a01010100000800e000000280000000ac1414aa00000fffac1e000100000020ffffffffffffff017f00000100000004e00000010000000744148a236401010100000000ac14141a00000008832bffffffffffe000000100000000ac1e0001e0000001ac1414bbe0000002e000000164010102ffffffff831334e0057c02ffffffffe00000017f000001440cd9e3e000000100010001440ccd41e000000200000dc800000000110000000000000000000000010000000700000000000000140000000000000000000000020000000600000000000000140000000000000000000000020000000200000000000000110000000000000000000000010000000800000000000000"], 0x1a8}}], 0x1, 0x0) setresuid(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r1, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x50, 0x2, 0x9, 0xfffffffffffff7fd, 0x3, 0x0, 0x5}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) r3 = open(&(0x7f0000000480)='./file1\x00', 0x4b023f, 0x16a) flock(0xffffffffffffffff, 0x9) sendmsg$IPSET_CMD_DEL(r3, &(0x7f00000009c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYRESOCT=r2, @ANYRES64, @ANYRESHEX, @ANYRES16], 0x64}, 0x1, 0x0, 0x0, 0x4048085}, 0x404c041) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000a80)={&(0x7f0000000500)=ANY=[], 0x64}}, 0x0) mount(&(0x7f0000000080), &(0x7f0000000080)='.', 0x0, 0x5010, 0x0) socket$inet(0x2, 0x1, 0x0) 11:50:20 executing program 1: 11:50:20 executing program 5: open$dir(&(0x7f0000000180)='./file0\x00', 0x106842, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2080}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012f00)=ANY=[]) 11:50:20 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffad36b24d, 0x4) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000000), 0x4) sendmsg$key(r0, &(0x7f0000007000)={0x0, 0x0, &(0x7f000001b000)={&(0x7f0000001140)={0x2, 0x5, 0x0, 0x0, 0x2}, 0x10}}, 0x0) read(r0, &(0x7f0000000040)=""/69, 0x45) 11:50:20 executing program 4: ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) socket$can_raw(0x1d, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) close(r0) 11:50:20 executing program 2: 11:50:20 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffad36b24d, 0x4) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000000), 0x4) sendmsg$key(r0, &(0x7f0000007000)={0x0, 0x0, &(0x7f000001b000)={&(0x7f0000001140)={0x2, 0x5, 0x0, 0x0, 0x2}, 0x10}}, 0x0) read(r0, &(0x7f0000000040)=""/69, 0x45) 11:50:20 executing program 1: [ 251.457527][ T34] audit: type=1800 audit(1606909820.355:14): pid=10201 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=15822 res=0 errno=0 11:50:20 executing program 2: 11:50:20 executing program 1: [ 251.680432][T10201] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:50:20 executing program 2: [ 251.777208][T10201] ext4 filesystem being mounted at /root/syzkaller-testdir780382796/syzkaller.S5pTQy/8/file0 supports timestamps until 2038 (0x7fffffff) 11:50:20 executing program 3: 11:50:20 executing program 0: 11:50:20 executing program 3: [ 251.989815][ T34] audit: type=1800 audit(1606909820.885:15): pid=10201 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=15822 res=0 errno=0 11:50:20 executing program 5: open$dir(&(0x7f0000000180)='./file0\x00', 0x106842, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2080}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012f00)=ANY=[]) 11:50:20 executing program 1: 11:50:21 executing program 4: ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) socket$can_raw(0x1d, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) close(r0) 11:50:21 executing program 2: 11:50:21 executing program 0: 11:50:21 executing program 3: 11:50:21 executing program 1: 11:50:21 executing program 0: [ 252.239441][ T34] audit: type=1800 audit(1606909821.135:16): pid=10240 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=15838 res=0 errno=0 11:50:21 executing program 2: 11:50:21 executing program 0: [ 252.414217][T10240] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 252.449455][T10240] ext4 filesystem being mounted at /root/syzkaller-testdir780382796/syzkaller.S5pTQy/9/file0 supports timestamps until 2038 (0x7fffffff) 11:50:21 executing program 0: 11:50:21 executing program 3: 11:50:21 executing program 5: 11:50:21 executing program 1: 11:50:21 executing program 4: 11:50:21 executing program 2: 11:50:21 executing program 0: 11:50:21 executing program 4: 11:50:21 executing program 3: 11:50:21 executing program 1: 11:50:21 executing program 3: 11:50:21 executing program 0: 11:50:21 executing program 5: 11:50:21 executing program 4: 11:50:21 executing program 1: 11:50:21 executing program 2: 11:50:21 executing program 3: 11:50:21 executing program 5: 11:50:21 executing program 1: 11:50:21 executing program 0: 11:50:21 executing program 4: 11:50:21 executing program 2: 11:50:22 executing program 4: 11:50:22 executing program 1: 11:50:22 executing program 3: 11:50:22 executing program 0: 11:50:22 executing program 2: 11:50:22 executing program 5: 11:50:22 executing program 3: 11:50:22 executing program 2: 11:50:22 executing program 4: 11:50:22 executing program 1: 11:50:22 executing program 5: 11:50:22 executing program 0: 11:50:22 executing program 2: 11:50:22 executing program 3: 11:50:22 executing program 4: 11:50:22 executing program 1: 11:50:22 executing program 5: 11:50:22 executing program 0: 11:50:22 executing program 2: 11:50:22 executing program 4: 11:50:22 executing program 3: 11:50:22 executing program 1: 11:50:22 executing program 5: 11:50:22 executing program 2: 11:50:22 executing program 0: 11:50:22 executing program 4: 11:50:22 executing program 3: 11:50:22 executing program 1: 11:50:22 executing program 5: 11:50:22 executing program 2: 11:50:22 executing program 4: 11:50:22 executing program 0: 11:50:22 executing program 3: 11:50:22 executing program 1: 11:50:23 executing program 4: 11:50:23 executing program 5: 11:50:23 executing program 0: 11:50:23 executing program 2: 11:50:23 executing program 3: 11:50:23 executing program 1: 11:50:23 executing program 5: 11:50:23 executing program 4: 11:50:23 executing program 2: 11:50:23 executing program 3: 11:50:23 executing program 0: 11:50:23 executing program 1: 11:50:23 executing program 4: 11:50:23 executing program 5: 11:50:23 executing program 2: 11:50:23 executing program 3: 11:50:23 executing program 1: 11:50:23 executing program 4: 11:50:23 executing program 0: 11:50:23 executing program 5: 11:50:23 executing program 2: 11:50:23 executing program 3: 11:50:23 executing program 4: 11:50:23 executing program 5: 11:50:23 executing program 1: 11:50:23 executing program 0: 11:50:23 executing program 2: 11:50:23 executing program 5: 11:50:23 executing program 4: 11:50:23 executing program 3: 11:50:23 executing program 1: 11:50:23 executing program 2: 11:50:24 executing program 0: 11:50:24 executing program 5: 11:50:24 executing program 4: 11:50:24 executing program 3: 11:50:24 executing program 1: 11:50:24 executing program 0: 11:50:24 executing program 2: 11:50:24 executing program 5: 11:50:24 executing program 4: 11:50:24 executing program 1: 11:50:24 executing program 3: 11:50:24 executing program 0: 11:50:24 executing program 2: 11:50:24 executing program 4: 11:50:24 executing program 5: 11:50:24 executing program 1: 11:50:24 executing program 3: 11:50:24 executing program 0: 11:50:24 executing program 2: 11:50:24 executing program 1: 11:50:24 executing program 5: 11:50:24 executing program 4: 11:50:24 executing program 3: 11:50:24 executing program 0: 11:50:24 executing program 2: 11:50:24 executing program 4: 11:50:24 executing program 1: 11:50:24 executing program 5: 11:50:24 executing program 0: 11:50:24 executing program 3: 11:50:24 executing program 2: 11:50:24 executing program 4: 11:50:25 executing program 1: 11:50:25 executing program 3: 11:50:25 executing program 5: 11:50:25 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x1b, 0x800, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5, 0x2}, 0x40) 11:50:25 executing program 0: 11:50:25 executing program 4: 11:50:25 executing program 5: 11:50:25 executing program 1: 11:50:25 executing program 3: socketpair(0x2b, 0x0, 0x0, &(0x7f0000000480)) 11:50:25 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x89b0, &(0x7f0000000340)={'batadv0\x00'}) 11:50:25 executing program 2: pipe(&(0x7f000000ef80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NLBL_MGMT_C_VERSION(r0, 0x0, 0x0) 11:50:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x1804, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) 11:50:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0x0) 11:50:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, &(0x7f0000000100)=""/208, 0x0, 0xd0}, 0x20) 11:50:25 executing program 0: clock_gettime(0x6, &(0x7f0000000340)) 11:50:25 executing program 3: r0 = socket(0x18, 0x0, 0x1) accept$alg(r0, 0x0, 0x0) 11:50:25 executing program 2: socketpair(0x18, 0x0, 0x15, &(0x7f0000000040)) 11:50:25 executing program 5: socket$inet6_sctp(0xa, 0xf, 0x84) 11:50:25 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8946, &(0x7f0000000340)={'batadv0\x00'}) 11:50:25 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='rxrpc_conn\x00', r0}, 0x3b) unshare(0x60000200) socket$inet6_sctp(0xa, 0x1, 0x84) 11:50:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000400)={'wg2\x00'}) 11:50:25 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/uts\x00') 11:50:25 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}, 0x0, 0x0, 0x1}}, 0x80) 11:50:25 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000040)=0x9, 0x4) 11:50:25 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000200), 0x4) 11:50:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:26 executing program 2: syz_genetlink_get_family_id$ethtool(&(0x7f0000002fc0)='ethtool\x00') 11:50:26 executing program 3: r0 = socket(0x18, 0x0, 0x0) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000004, 0x12, r0, 0x0) 11:50:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x5, 0x3, 0x0, 0x0, {}, [@nested={0x4}, @generic="e0"]}, 0x1c}}, 0x0) 11:50:26 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000200), 0x4) [ 257.166477][T10431] IPVS: ftp: loaded support on port[0] = 21 11:50:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) [ 257.260153][T10455] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 257.460345][T10446] IPVS: ftp: loaded support on port[0] = 21 11:50:29 executing program 1: syz_genetlink_get_family_id$gtp(0x0) 11:50:29 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) connect(r0, 0x0, 0x0) 11:50:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001380)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000013c0)={0x1c, r1, 0x1}, 0x1c}}, 0x0) 11:50:29 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) syz_genetlink_get_family_id$ethtool(0x0) 11:50:29 executing program 5: pipe(&(0x7f0000001680)) 11:50:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000007380)={&(0x7f00000071c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000072c0)=""/143, 0x26, 0x8f, 0x1}, 0x20) 11:50:29 executing program 3: sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, 0x0, 0xc5b12ef5ef93b23a) 11:50:29 executing program 2: epoll_create(0x3) 11:50:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x1000}, 0x40) 11:50:29 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:29 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80) 11:50:29 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) 11:50:29 executing program 3: setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 11:50:29 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, &(0x7f0000000380), 0x18) 11:50:29 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8903, &(0x7f0000000340)={'batadv0\x00'}) 11:50:29 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r0, &(0x7f0000006840)=[{{0x0, 0x0, &(0x7f0000002480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0, 0x0) 11:50:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={0x0}}, 0x0) 11:50:29 executing program 0: socketpair(0xa, 0x3, 0x0, &(0x7f0000000040)) 11:50:29 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:29 executing program 3: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') 11:50:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f000000a580)={0x0, 0x0, &(0x7f000000a540)={&(0x7f000000a500)={0x14, 0x0, 0x9, 0x801}, 0x14}}, 0x0) 11:50:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, 0x1, 0x7, 0x301, 0x0, 0x0, {}, [@NFACCT_FILTER={0x4}]}, 0x18}}, 0x0) 11:50:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 11:50:30 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x28, 0xa, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARKMASK={0x8}]}, @IPSET_ATTR_LINENO={0x8}]}, 0x28}}, 0x0) 11:50:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00') sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x18, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 11:50:30 executing program 3: r0 = syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000200)=ANY=[@ANYRES16=r0, @ANYBLOB="00012dbd7000fddbdf250e0000000500330002000000080032000100000008003c00080000000500300001000000080031000100010008003a0009000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4040000}, 0x40008a0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008800)={&(0x7f0000006380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000007780)=[{&(0x7f0000006400)=""/148, 0x94}, {0x0}, {&(0x7f00000074c0)=""/242, 0xf2}, {&(0x7f00000075c0)=""/231, 0xe7}], 0x4, &(0x7f0000007800)=""/4096, 0x1000}, 0x100) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000008940)={0x0, 0x0, 0x0}, 0x0) sendmsg$can_j1939(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x1d, 0x0, 0x2, {0x3, 0x0, 0x4}, 0x2}, 0x18, &(0x7f0000000180)={&(0x7f00000000c0)="f3ef7395ae9d519b2f45d09f36a5ae716eacbe61a97803968227ae74ed5f125ef10226c3e7d2ece9c5893c804991f5c4a08e99ffd72e001753c9125b3386aa4cf898f7e0d129b36fdf9b8a949cfa", 0x4e}}, 0x20000000) unshare(0x40000000) [ 261.518539][T10582] IPVS: ftp: loaded support on port[0] = 21 11:50:30 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:50:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8946, &(0x7f0000001d80)={'sit0\x00', &(0x7f0000001d00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @ipv4={[], [], @multicast1}}}) 11:50:30 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:30 executing program 5: pipe(&(0x7f0000001840)) 11:50:30 executing program 2: r0 = socket(0x18, 0x0, 0x1) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x28, &(0x7f0000000000)="60c81260ba3bb15fb847f9740bc7415c47d7fda2cb75d371867c7f40e114d47bf1eb412bd106cfd1"}) [ 261.693048][T10599] device bond0 entered promiscuous mode [ 261.703298][T10599] device bond_slave_0 entered promiscuous mode [ 261.724437][T10599] device bond_slave_1 entered promiscuous mode 11:50:30 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/time_for_children\x00') 11:50:30 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x20) [ 261.789807][T10593] device bond0 left promiscuous mode [ 261.796709][T10593] device bond_slave_0 left promiscuous mode [ 261.825618][T10593] device bond_slave_1 left promiscuous mode 11:50:30 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) [ 261.870931][T10599] device bond0 entered promiscuous mode [ 261.876614][T10599] device bond_slave_0 entered promiscuous mode 11:50:30 executing program 2: pipe(&(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) [ 261.915231][T10599] device bond_slave_1 entered promiscuous mode [ 261.961981][T10599] device bond0 left promiscuous mode 11:50:30 executing program 4: socket(0x22, 0x0, 0x7ff) 11:50:30 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8914, &(0x7f0000000340)={'batadv0\x00'}) [ 261.994118][T10599] device bond_slave_0 left promiscuous mode [ 262.031931][T10599] device bond_slave_1 left promiscuous mode 11:50:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000001580)=[@in6={0xa, 0x0, 0x0, @remote, 0x7fffffff}, @in={0x2, 0x0, @loopback}], 0x2c) 11:50:31 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:50:31 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x20) 11:50:31 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:31 executing program 4: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 11:50:31 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8982, &(0x7f0000000340)={'batadv0\x00'}) 11:50:31 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x18}, 0x40) 11:50:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 11:50:31 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) [ 262.614815][T10645] device bond0 entered promiscuous mode [ 262.620810][T10645] device bond_slave_0 entered promiscuous mode [ 262.649696][T10645] device bond_slave_1 entered promiscuous mode 11:50:31 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x80108906, 0x0) 11:50:31 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, 0x0) [ 262.694946][T10642] device bond0 left promiscuous mode [ 262.716240][T10642] device bond_slave_0 left promiscuous mode [ 262.757122][T10642] device bond_slave_1 left promiscuous mode 11:50:31 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:50:31 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000006c0)={0x0, @can, @qipcrtr, @tipc=@id}) 11:50:31 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8913, &(0x7f0000001d80)={'sit0\x00', 0x0}) 11:50:31 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:31 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) sendmmsg$nfc_llcp(r0, &(0x7f00000049c0)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 11:50:32 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, &(0x7f0000000000)="82", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x20) 11:50:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 11:50:32 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) accept4$phonet_pipe(r0, 0x0, 0x0, 0x0) 11:50:32 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) [ 263.183142][T10676] device bond0 entered promiscuous mode [ 263.204641][T10676] device bond_slave_0 entered promiscuous mode [ 263.232264][T10676] device bond_slave_1 entered promiscuous mode 11:50:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8931, &(0x7f0000001d80)={'sit0\x00', 0x0}) [ 263.264817][T10675] device bond0 left promiscuous mode [ 263.270137][T10675] device bond_slave_0 left promiscuous mode [ 263.315582][T10675] device bond_slave_1 left promiscuous mode 11:50:32 executing program 3: unshare(0x48020200) 11:50:33 executing program 4: r0 = socket(0x22, 0x802, 0x1) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, 0x0, 0x0) 11:50:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 11:50:33 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:33 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:50:33 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5451, 0x0) 11:50:33 executing program 3: pipe(&(0x7f0000001840)) bpf$ITER_CREATE(0x21, 0x0, 0x0) [ 265.113117][T10705] device bond0 entered promiscuous mode [ 265.133375][T10705] device bond_slave_0 entered promiscuous mode [ 265.165676][T10705] device bond_slave_1 entered promiscuous mode [ 265.200199][T10700] device bond0 left promiscuous mode 11:50:34 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:34 executing program 3: r0 = socket(0x18, 0x0, 0x1) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0) 11:50:34 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 11:50:34 executing program 5: [ 265.212365][T10700] device bond_slave_0 left promiscuous mode 11:50:34 executing program 4: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000001500)={'ip_vti0\x00', &(0x7f0000001480)={'gre0\x00', 0x0, 0x0, 0x7800, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @private=0xa010102}}}}) [ 265.255485][T10700] device bond_slave_1 left promiscuous mode 11:50:34 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={0x0, 0x1, 0x6}, 0x10) 11:50:34 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:34 executing program 5: syz_genetlink_get_family_id$gtp(0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) 11:50:34 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000280)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) 11:50:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0xf, 0x6, 0x101}, 0x14}}, 0x0) 11:50:34 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:34 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={0x0, 0x1, 0x6}, 0x10) 11:50:34 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x8}, 0x20) 11:50:34 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x4020940d, 0x0) 11:50:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="40000000070a0103"], 0x40}}, 0x0) 11:50:35 executing program 4: socketpair(0x0, 0x1, 0x3, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0)='l2tp\x00') 11:50:35 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:35 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={0x0, 0x1, 0x6}, 0x10) 11:50:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:35 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 11:50:35 executing program 4: pipe(0x0) syz_genetlink_get_family_id$ethtool(0x0) 11:50:35 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@private0}}, 0xe8) 11:50:35 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r1, 0x1, 0x6}, 0x10) 11:50:35 executing program 1: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) [ 266.315089][T10769] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 11:50:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:35 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) bind(r0, 0x0, 0x0) 11:50:35 executing program 4: socketpair(0x2, 0x1, 0x0, &(0x7f0000000040)) 11:50:35 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r1, 0x1, 0x6}, 0x10) 11:50:35 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x0) pipe(&(0x7f0000000440)) unshare(0x48020200) 11:50:35 executing program 1: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$sock(r0, &(0x7f0000001100)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x80, 0x0}}], 0x1, 0x44010) 11:50:35 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, 0x0) [ 266.734619][T10789] IPVS: ftp: loaded support on port[0] = 21 11:50:35 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r1, 0x1, 0x6}, 0x10) 11:50:35 executing program 1: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:35 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5421, &(0x7f0000000340)={'batadv0\x00'}) 11:50:35 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000280)={r1, 0x1, 0x6}, 0x10) 11:50:35 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:35 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000440)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @private2}}) 11:50:36 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8937, &(0x7f0000001d80)={'sit0\x00', 0x0}) 11:50:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:36 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0xa0, 0x4) 11:50:36 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:36 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000280)={r1, 0x1, 0x6}, 0x10) 11:50:36 executing program 4: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000380)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @multicast2, {[@lsrr={0x83, 0x3}]}}}}}) 11:50:36 executing program 3: syz_genetlink_get_family_id$gtp(0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001380), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) 11:50:36 executing program 2: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x1ff) 11:50:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:36 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:36 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000280)={r1, 0x1, 0x6}, 0x10) 11:50:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x800000000080002, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008000400", @ANYRES32=r2, @ANYBLOB="08001b"], 0x30}}, 0x0) 11:50:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:36 executing program 2: r0 = socket(0x2, 0x2, 0x0) connect$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="bf34756e595c"}, 0x14) 11:50:36 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) [ 267.743349][T10861] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 11:50:36 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:50:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x13, 0x5, 0x3}, 0x14}}, 0x0) 11:50:38 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='rxrpc_conn\x00', r0}, 0x3b) unshare(0x60000200) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x9}, 0x8) 11:50:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:38 executing program 4: r0 = socket(0x18, 0x0, 0x1) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'dummy0\x00', @ifru_ivalue}) 11:50:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) 11:50:38 executing program 2: setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) 11:50:38 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:50:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:38 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x89a1, &(0x7f0000000340)={'batadv0\x00'}) 11:50:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x28, 0x1, 0x7, 0x301, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) 11:50:38 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:50:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) [ 269.874986][T10896] IPVS: ftp: loaded support on port[0] = 21 11:50:38 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) recvfrom$l2tp6(r0, 0x0, 0x0, 0x40022122, 0x0, 0xfffffffffffffeef) [ 270.160461][T10897] IPVS: ftp: loaded support on port[0] = 21 11:50:39 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @private1}}) 11:50:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) 11:50:39 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:39 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "9c3700", 0x10, 0x2b, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, @local, {[@hopopts={0x0, 0x0, [0x2]}], {0x0, 0x0, 0x8}}}}}}, 0x0) 11:50:39 executing program 2: socket(0x10, 0x2, 0x21) 11:50:39 executing program 5: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00'}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) 11:50:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_COOKIE={0xc}, @L2TP_ATTR_PEER_COOKIE={0xc}]}, 0x2c}}, 0x0) 11:50:39 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x10100, 0x0) 11:50:39 executing program 3: socketpair(0x8, 0x0, 0x0, &(0x7f0000000640)) 11:50:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:50:39 executing program 5: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00'}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) 11:50:39 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x40049409, &(0x7f0000000340)={'batadv0\x00'}) 11:50:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x20, 0x1, 0x7, 0x301, 0x0, 0x0, {}, [@NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}]}]}, 0x20}}, 0x0) 11:50:39 executing program 4: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xfffffffa}, 0x8) 11:50:39 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:39 executing program 5: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00'}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) 11:50:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:50:39 executing program 2: socketpair(0x3, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0)='l2tp\x00') 11:50:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x1000, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) 11:50:39 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, 0x0, 0x0) 11:50:39 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:40 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x1ff) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000200)={&(0x7f0000000240)=@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x15}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000000)="b2", 0x1}], 0x1, 0x0, 0x0, 0x9000004}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value, 0x8) socket$nl_generic(0x10, 0x3, 0x10) 11:50:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:40 executing program 2: socket$nl_crypto(0x10, 0x3, 0x15) 11:50:40 executing program 4: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000e00)='NLBL_MGMT\x00') 11:50:40 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r1, 0x1, 0x6}, 0x10) 11:50:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:40 executing program 2: r0 = socket(0x1e, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000080)) 11:50:40 executing program 4: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x1, 0x707, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @private}}}}) 11:50:40 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r1, 0x1, 0x6}, 0x10) [ 271.442353][T11018] sctp: [Deprecated]: syz-executor.3 (pid 11018) Use of struct sctp_assoc_value in delayed_ack socket option. [ 271.442353][T11018] Use struct sctp_sack_info instead 11:50:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) [ 271.531661][T11016] sctp: [Deprecated]: syz-executor.3 (pid 11016) Use of struct sctp_assoc_value in delayed_ack socket option. [ 271.531661][T11016] Use struct sctp_sack_info instead 11:50:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f000000a580)={&(0x7f000000a4c0), 0xc, &(0x7f000000a540)={&(0x7f000000a500)={0x14}, 0x14}}, 0x0) 11:50:40 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind$phonet(r0, &(0x7f0000000000)={0x23, 0x0, 0x9}, 0x10) 11:50:40 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r1, 0x1, 0x6}, 0x10) 11:50:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x12, 0x4) 11:50:40 executing program 3: socket(0x18, 0x0, 0x1) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) 11:50:40 executing program 4: 11:50:40 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={0x0, 0x1, 0x6}, 0x10) 11:50:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, 0x0}, 0x20) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) 11:50:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:41 executing program 3: epoll_pwait(0xffffffffffffffff, &(0x7f0000000140)=[{}], 0x1, 0x0, &(0x7f00000001c0), 0x8) 11:50:41 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={0x0, 0x1, 0x6}, 0x10) 11:50:41 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)={0xffffffffffffffff}, 0x4) 11:50:41 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:41 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000100)=0x7, 0x4) 11:50:41 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:41 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={0x0, 0x1, 0x6}, 0x10) 11:50:41 executing program 3: pipe(&(0x7f0000001840)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001900)='./cgroup/syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000006800)='wireguard\x00') 11:50:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:41 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0xc0189436, &(0x7f0000000340)={'batadv0\x00'}) 11:50:41 executing program 4: r0 = socket(0x18, 0x0, 0x0) connect$can_bcm(r0, 0x0, 0x0) 11:50:41 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)) 11:50:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:41 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:41 executing program 2: socketpair(0x0, 0xe, 0x0, &(0x7f0000000040)) 11:50:41 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000280)={r1, 0x1, 0x6}, 0x10) 11:50:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x28, 0x6, 0x0, @remote, @local, {[], {{0x4e24, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "d4c400000000000000002f90e85f00"}]}}}}}}}}, 0x0) 11:50:41 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000100)=""/68, &(0x7f0000000180)=0x7e) 11:50:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:41 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000280)={r1, 0x1, 0x6}, 0x10) 11:50:41 executing program 4: r0 = socket(0x18, 0x0, 0x1) getsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, 0x0) 11:50:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x3}, 0x14}}, 0x0) 11:50:43 executing program 2: pipe(&(0x7f000000ef80)) 11:50:43 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:43 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000280)={r1, 0x1, 0x6}, 0x10) 11:50:43 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000014ec0)="17", 0x1) 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00'}) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) 11:50:43 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8906, 0x0) 11:50:43 executing program 2: 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:43 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x0, 0x0}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:43 executing program 3: 11:50:43 executing program 4: 11:50:43 executing program 2: 11:50:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00'}) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) 11:50:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xb) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 11:50:43 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x0, 0x0}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:43 executing program 2: 11:50:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00'}) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:43 executing program 2: 11:50:43 executing program 3: 11:50:44 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x0, 0x0}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:44 executing program 4: 11:50:44 executing program 2: 11:50:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00'}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={0x0, 0x1, 0x6}, 0x10) 11:50:44 executing program 3: 11:50:44 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:44 executing program 4: 11:50:44 executing program 2: 11:50:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:44 executing program 3: 11:50:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00'}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={0x0, 0x1, 0x6}, 0x10) 11:50:44 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:44 executing program 4: 11:50:44 executing program 2: 11:50:44 executing program 3: 11:50:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18b"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00'}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={0x0, 0x1, 0x6}, 0x10) 11:50:44 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:44 executing program 2: 11:50:44 executing program 4: 11:50:44 executing program 3: 11:50:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18b"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:44 executing program 0: 11:50:44 executing program 4: 11:50:44 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:44 executing program 2: 11:50:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18b"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:45 executing program 3: 11:50:45 executing program 0: 11:50:45 executing program 2: 11:50:45 executing program 4: 11:50:45 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:45 executing program 3: 11:50:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1c"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:45 executing program 0: 11:50:45 executing program 2: 11:50:45 executing program 4: 11:50:45 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:45 executing program 3: 11:50:45 executing program 0: 11:50:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1c"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:45 executing program 2: 11:50:45 executing program 4: 11:50:45 executing program 3: 11:50:45 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:45 executing program 0: 11:50:45 executing program 2: 11:50:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1c"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:45 executing program 4: 11:50:45 executing program 3: 11:50:45 executing program 0: 11:50:45 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:45 executing program 2: 11:50:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f94535"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:46 executing program 4: 11:50:46 executing program 3: 11:50:46 executing program 0: 11:50:46 executing program 2: 11:50:46 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f94535"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:46 executing program 4: 11:50:46 executing program 3: 11:50:46 executing program 0: 11:50:46 executing program 2: 11:50:46 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:46 executing program 3: 11:50:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f94535"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:46 executing program 4: 11:50:46 executing program 0: 11:50:46 executing program 2: 11:50:46 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:46 executing program 3: 11:50:46 executing program 4: 11:50:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:46 executing program 0: 11:50:46 executing program 2: 11:50:46 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:46 executing program 4: 11:50:46 executing program 3: 11:50:46 executing program 0: 11:50:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:46 executing program 2: 11:50:47 executing program 4: 11:50:47 executing program 3: 11:50:47 executing program 0: 11:50:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:47 executing program 2: 11:50:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:47 executing program 4: 11:50:47 executing program 3: 11:50:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:47 executing program 0: 11:50:47 executing program 2: 11:50:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfe"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:47 executing program 4: 11:50:47 executing program 3: 11:50:47 executing program 0: 11:50:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:47 executing program 2: 11:50:47 executing program 3: 11:50:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfe"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:47 executing program 4: 11:50:47 executing program 0: 11:50:47 executing program 2: 11:50:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:47 executing program 3: 11:50:47 executing program 0: 11:50:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfe"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:47 executing program 4: 11:50:47 executing program 2: 11:50:48 executing program 3: 11:50:48 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:48 executing program 4: 11:50:48 executing program 0: 11:50:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c6"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:48 executing program 2: 11:50:48 executing program 3: 11:50:48 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:48 executing program 4: 11:50:48 executing program 0: 11:50:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c6"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:48 executing program 3: 11:50:48 executing program 2: 11:50:48 executing program 4: 11:50:48 executing program 0: 11:50:48 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c6"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:48 executing program 3: 11:50:48 executing program 2: 11:50:48 executing program 4: 11:50:48 executing program 0: 11:50:48 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:48 executing program 2: 11:50:48 executing program 3: 11:50:48 executing program 4: 11:50:48 executing program 0: 11:50:48 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:49 executing program 2: 11:50:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:49 executing program 3: 11:50:49 executing program 4: 11:50:49 executing program 0: 11:50:49 executing program 2: 11:50:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x0) 11:50:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:49 executing program 3: 11:50:49 executing program 4: 11:50:49 executing program 0: 11:50:49 executing program 2: 11:50:49 executing program 4: 11:50:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:49 executing program 3: 11:50:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x0) 11:50:49 executing program 0: 11:50:49 executing program 2: 11:50:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:49 executing program 3: 11:50:49 executing program 4: 11:50:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x0) 11:50:49 executing program 0: 11:50:49 executing program 2: 11:50:49 executing program 3: 11:50:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:49 executing program 4: 11:50:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x0, 0x0}, 0x10) 11:50:50 executing program 0: 11:50:50 executing program 2: 11:50:50 executing program 3: 11:50:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:50 executing program 4: 11:50:50 executing program 0: 11:50:50 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x0, 0x0}, 0x10) 11:50:50 executing program 2: 11:50:50 executing program 3: 11:50:50 executing program 4: 11:50:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:50 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x0, 0x0}, 0x10) 11:50:50 executing program 0: 11:50:50 executing program 3: 11:50:50 executing program 2: 11:50:50 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmmsg$sock(r0, &(0x7f00000009c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)="0f000000cb836198bc9a71f995aa642b", 0x10}], 0x1}}], 0x1, 0x0) 11:50:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:50 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x0, &(0x7f0000000040)}, 0x10) 11:50:50 executing program 0: 11:50:50 executing program 3: 11:50:50 executing program 2: 11:50:50 executing program 4: 11:50:50 executing program 0: 11:50:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:50 executing program 3: 11:50:50 executing program 2: 11:50:50 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x0, &(0x7f0000000040)}, 0x10) 11:50:50 executing program 4: 11:50:51 executing program 3: 11:50:51 executing program 0: 11:50:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:51 executing program 2: 11:50:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x0, &(0x7f0000000040)}, 0x10) 11:50:51 executing program 4: 11:50:51 executing program 3: 11:50:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:51 executing program 0: 11:50:51 executing program 2: 11:50:51 executing program 3: 11:50:51 executing program 4: 11:50:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}, 0x10) 11:50:51 executing program 0: 11:50:51 executing program 3: 11:50:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) 11:50:51 executing program 2: 11:50:51 executing program 4: 11:50:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}, 0x10) 11:50:51 executing program 0: 11:50:51 executing program 3: 11:50:51 executing program 4: 11:50:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) 11:50:51 executing program 2: 11:50:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}, 0x10) 11:50:51 executing program 3: 11:50:51 executing program 4: 11:50:51 executing program 0: 11:50:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) 11:50:52 executing program 2: 11:50:52 executing program 3: 11:50:52 executing program 1: 11:50:52 executing program 4: 11:50:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:52 executing program 0: 11:50:52 executing program 2: 11:50:52 executing program 1: 11:50:52 executing program 4: 11:50:52 executing program 3: 11:50:52 executing program 0: 11:50:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:52 executing program 2: 11:50:52 executing program 1: 11:50:52 executing program 4: 11:50:52 executing program 3: 11:50:52 executing program 0: 11:50:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:52 executing program 2: 11:50:52 executing program 1: 11:50:52 executing program 4: 11:50:52 executing program 3: 11:50:52 executing program 0: 11:50:52 executing program 2: 11:50:52 executing program 1: 11:50:52 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00'}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) 11:50:52 executing program 4: 11:50:52 executing program 0: 11:50:53 executing program 3: 11:50:53 executing program 2: 11:50:53 executing program 1: 11:50:53 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00'}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) 11:50:53 executing program 4: 11:50:53 executing program 0: 11:50:53 executing program 3: 11:50:53 executing program 2: 11:50:53 executing program 4: 11:50:53 executing program 1: 11:50:53 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00'}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) 11:50:53 executing program 0: 11:50:53 executing program 3: 11:50:53 executing program 4: 11:50:53 executing program 2: 11:50:53 executing program 1: 11:50:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:53 executing program 0: 11:50:53 executing program 3: 11:50:53 executing program 4: 11:50:53 executing program 2: 11:50:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:53 executing program 1: 11:50:53 executing program 4: 11:50:53 executing program 0: 11:50:53 executing program 2: 11:50:53 executing program 3: 11:50:53 executing program 1: 11:50:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:53 executing program 0: 11:50:53 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x8910, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 11:50:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x31, 0x0, 0x0) 11:50:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) recvfrom$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 11:50:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$nbd(r0, 0x0, 0x1) 11:50:54 executing program 0: r0 = timerfd_create(0x0, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)) 11:50:54 executing program 4: r0 = epoll_create(0x6) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8904, &(0x7f0000000040)) 11:50:54 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) sync_file_range(r0, 0x0, 0x0, 0x0) 11:50:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 11:50:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x5421, &(0x7f0000000180)={'ipvlan1\x00'}) 11:50:54 executing program 1: 11:50:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], &(0x7f00000000c0)=""/170, 0x93, 0xaa, 0x1}, 0x20) 11:50:54 executing program 0: 11:50:54 executing program 3: 11:50:54 executing program 2: 11:50:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:54 executing program 4 (fault-call:5 fault-nth:0): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) [ 285.714209][T11598] FAULT_INJECTION: forcing a failure. [ 285.714209][T11598] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 285.787099][T11598] CPU: 0 PID: 11598 Comm: syz-executor.4 Not tainted 5.10.0-rc6-syzkaller #0 [ 285.795891][T11598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.805952][T11598] Call Trace: [ 285.809268][T11598] dump_stack+0x107/0x163 [ 285.813615][T11598] should_fail.cold+0x5/0xa [ 285.818140][T11598] _copy_from_user+0x2c/0x180 [ 285.822928][T11598] copy_bpf_fprog_from_user+0x34a/0x410 [ 285.828478][T11598] ? __lock_acquire+0xbd6/0x5500 [ 285.833425][T11598] ? bpf_sk_ancestor_cgroup_id+0x2f0/0x2f0 [ 285.839242][T11598] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 285.845243][T11598] packet_setsockopt+0x1a07/0x3950 [ 285.850361][T11598] ? find_held_lock+0x2d/0x110 [ 285.855146][T11598] ? packet_bind+0x1b0/0x1b0 [ 285.859746][T11598] ? find_held_lock+0x2d/0x110 [ 285.864527][T11598] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 285.870866][T11598] ? selinux_netlbl_sock_rcv_skb+0x530/0x530 [ 285.876857][T11598] ? __fget_files+0x294/0x400 [ 285.881557][T11598] ? selinux_socket_setsockopt+0x6a/0x80 [ 285.887197][T11598] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 285.892756][T11598] __sys_setsockopt+0x2db/0x610 [ 285.897618][T11598] ? packet_bind+0x1b0/0x1b0 [ 285.902215][T11598] ? __ia32_sys_recv+0x100/0x100 [ 285.907160][T11598] ? vfs_write+0x18e/0xa30 [ 285.911587][T11598] ? fput_many+0x2f/0x1a0 [ 285.915936][T11598] __x64_sys_setsockopt+0xba/0x150 [ 285.921055][T11598] ? syscall_enter_from_user_mode+0x1d/0x50 [ 285.926956][T11598] do_syscall_64+0x2d/0x70 [ 285.931384][T11598] entry_SYSCALL_64_after_hwframe+0x44/0xa9 11:50:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_rose_SIOCRSCLRRT(r3, 0x89e4) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1, {0x7, 0x1f}}, 0x50) mknod(&(0x7f0000000000)='./file0/file1\x00', 0x1100, 0x0) syz_fuse_handle_req(r0, &(0x7f00000042c0)="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", 0x2000, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000066c0)={0x90}, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f000000aa80)="e0874da458fcbb3a5b97e3bb48a7d7a5869be8406d0cd6b56649aa1d30b04552e301f90c975e11bfa6dcf9b646bf3c9f4ba06a4a7ae3c6aebcbdc8f951a3fef41365c515769b27041ad1e226205e155e230f48b1fa1c4f7ff58233cea5c58f71ed46ed4d7accdfabb9c544922a1b18caa542db552b1c7fe16c10d0ce9b3358fef5ff6c0e6f9475458a32e1a6c8d5be5e78b15f1a1937d8bc2fdf1528d9625bd18e5b83c9f6ee0f71552a2b34e136b074e78befee467caad619a83b2ac63270183200ded0caa14aa4864e37faa22f85a8ce6a3b819f80b3076d1db1dc6a266c9a654595461daac5f127f5504814439213b5dceac412a66bc96ecc6f5b9aa261c73cf73f5595fb980b7c843541f531283f52bf6ba25a7390727a7d6c270719e2627ec9bbd351c70e7d6e076d06a6bf55f6e9a181ae6d3af4e4c1e3c972b9e10ac62437dce4fcb8e6c01d256982a106934ec3d6801efef2c9db4e7968abe8116270a182b0fb443fa0d4feadbd65067f63ec96a367277a3d5b358fd63f7c43182d5e14159ac6a88fd0ee80aea2f7bc62e901390e39d4efc668065725959ef49f304dd9f470576d9247c63e1d0c247eaa32c22864b9ca762825bfe07cfc0a9481c3cf4b1131e1e103532a43903865359f207b0385a2045e59a45f8452e8eb0e3058e4c529114d94d506836fd60c9f555be64e337bf5e179a3e3849e342e95c21e2604fb176a037db1f69dafab82d7474669ec315297d44e9d1167cca681e513c63f97a769a67154970f4ce7d145f3a3822b12f4635e5a16a800018a078245c68fce937a963bdb3f924270545d6c78df072a41c137870164c26af94b0ea36bb1d02173d6107bd81aba2d24733234b053c0b6e90b89c21d071bf4071da9caee164bd246ee90b0fe858bfc0111898d863b80b879fe7e6015aa6f3d8dab49a7f39abb57fc67fe24b07016ca82d73a4bb5fd09fe535c21a66b73bc113d4972ebb1ea0d1b1f0816b2349656d4df85250e2625ac4c681226665dfd60e5bf3b135fd3988e9e157b70941299d49f2e9265f9b0c0cc8fd09524432a846c92366385fee501b12c74a9b644eccf881438afca680fcb73930d90eb06b08027880f46ead64909b75f9cec10226176994298b504a12314986e0d02e2ea46f1089f7c6a98aeb01a101d905889aa7c05dc9a28f7da4f978859a3846f655a4e81ab5cb03dc3b9071b40cf6739008d1cfdfccde77e814f989dd910743241b3d54caa2ca8a2e0593cca352334b3c75d14e51699630f8baf71ad6b42bce86f3e1d397a70bde5dbfb46684646ddb0db635ccd902f5ab315cb48f92e0a1ad3e81c23a239f219fc40e533c660799fd60c1ceaaa149010ea06d7f1314dfab1c36f3d2c71f18b63b5c5a1523f530a607daced0fecce4f656ddd0a1b368190d724b54483d801daf7532804ed50f11968c4057cb0bdcb33d0536fa97d90347355d96381bb14f548f5b4acd4fc918f42de1ec1cce7b4d352cba07f4f0be9293362228f1480bb1af9c6eb9df0af546d7c3336142f7e1bf88b0f527638030b005e500c4d6a231fe861395c256f12b5ae5e9f9cda69d7ff77480b5cc09b004e852c01b9d0d4dcba0f639a8d0066635edc71b7ddd9b2076d5bf7147ae7d4fdbff5481798112273bde518236a92d076007cfebd52234a7db07beac41b5154da4e9388071438ddc71e378a7b6956817c181ba1e02a4ec036ddd05e654c30f138f37d4a8529992a24059e1badb9b5f5ee3d0394e841736ec3b86df39dec424bddd2f8cc09dfdec1977e2a5bfbaf14d1a5d78d7ef7d54965b49aa384b2319edd02f74e4576896a71ef6dce087c433e20948aab547c6b8b971711e8d4cd1bc3d2faa8ddf75505851fca4899928ddeff53e899873faed2b6a1ad555b498b2ce54eb07ce33d12587a3eb3ebad2eee94515c3ab53875080751393aab34211003c4353b8548bcee8aa28ae9ff87878ff63209a4b8ad221811dc324b75fca8199f2e247bfccdea749ac81fa40f0cd762ad2897ee0edc86a0a1428d2850570e0ffeba2959cfa3016e22ac71cc280c2b2888d4596f1a1dfac108a255dbc4ec1f08fcb8ef1e562990d322dd240ce10a780045a66cbb6d17b2fd4c86ad0f3a9e022b396826a3597fc07c578091a73d282bd879e889b42319d57ce5423a8f27ae840e107a5dcad3e2a751dff16d08ee8cbd80f216d2a46370ed1b82a6551b04fddef3831a3051e2845d17eca9b809099d4c8a92bc15124db33e7502f2940c9898fe006ae91b896a2a5e6463173a79af2f529cb330d29ea2964c0218d42bfc7f1e7d815d3dceec6e288e4e6b880c4e2ff42ad6bcd8c1c6cac827dab056893ebc5152270f463ef2ceeb1044a7265dee656ec293b78fde79e979012188ca463a9c9b1b2ad8e52ca3ee6d2d92ed0b66ad10b1916a356dcdde072e429d488b847043711887e823d5a7f5471eb492dd7e0fea2786ac09631c4efbc7e16dadd4e49168d81ef3e81aa32bb0b52e4a0e6efa6bf552c26cbd0adf2720583d12a0a2fd422327ed462acdc3d747ac21eab5c20958c6b12aed6591f775e675c2d19fa0274ad84cf209b0e34fc621adf516b4adcb5aba1fab97a879096d55766c9f8b5b6c7076fc3a39cdde99e70b19bc1d53c3891336f393ae153b8ff216e82133aec8ccd51c33e1833b9133c9ece70cd66d89c498ca879bc0c07ed25998c2a5f9da03a01e3604c145998fd269a3c21e2c60cf20d2d74fde3126622ed8790e9ae3fb48d4b249aefaee7805405a5c278c599cc77e31e7cb89af7c341fe1db637534e3274612e232c2952f6aa95327c31ccd3fd37583f7ca010ebaf1c88e54175f2f91c528f40c924126db2edf181be53b7b35cc78f49d3f3acb1b8008b2083656d08d9c964ac20362c027e663afca21c760bf116e264e4e50751b833ddef4426e298d0a9dce45e6ba27a654af4d9f7649e4afc3ad0855514d38b01d9ebdddd3aa429d62bc06f9bc4ae500cf1c62ed15f3c41f1c02a999a2d5b4215692bd00e096a2608e52b0c2bb02a328720663d4be3901241bd0ba61d9b3d49a0e35963ad9028f7cc2a5c896a97b1fdbf0cfb4ddf5d991a2920ca9bb838e5402afa2201de137201ef4dbb96ad650491a41eb9802d872fefa35c283e29b4bae1f4ba3e2f0a929a42ec7c3fd50654ce7ed4a218d0a69b2e0bdef7576060c097f6df030741c4e9ecc23c91131d44af21054f8e49679655c0755eeb38e62ce26f8b5baa7c8921c07c4467c07158fb86a13b14723f61f35c944dcf449a7fc546d972df4c56bdd0dbe0fec4382b29866d63899f12b322512f600060b1988f5cc92c38ac3a3ab1580e4f6b9945515e17444355254494f720c1eb9b197cdb159bb2907efdff63dbb2a2894661d5f26d186e9ff81e52dda6a21cb4c6469e71962eca867351fe8edd8978fd9a14c66a90654e364b7e9d4574330f0b73c471d5fe842412398e45d252b4a9465ec0f0383a6f6bc5b339b96ad3ad9ff8be4a70811acfd846585a9340281230b21c6c60adfb6c31e863f52158fc9fd7f972ef2608e85ec260c65bfa3b94faf638ce45d0dac7ac851a20f405ad4363a7afe9c449ce981b37b187283d15ea41448574f29a1fd3d5cbd9efef61404ef1e76a38bc4aeeee01968e648d028ff5a946aac6b22062bdabee99d02d747ec2ef9dafee361c77a7c9975902a617f804a854287c62e00251a37f26ef169dcbe9151fc1ac23288f2551c3f60b55a065185c9dcac5548e290b5bb7b50ee528ec15e828be8a6d543ad7421fc0483bfc3211cd84b585602382cff1d134fbce56d8763217c3f9d4e54bbfb538d938256a6b22aee728d19f94d171b332741f2b5474b3b1e0eb482efb89c257baadeb1c559978ed17b5f193758caccafa1add88c0c09c0ba24303c97816cb96a97b99575e94f69cc8cfb59d3bbf737000b02fc357381af2940061ff007c92f081d5351b16177b66e5a99f377fd06bfd1fd955a5e1cd3361712428d12ad8399880bddeaa1d905ad18c2a46b4ec2ff542d005531695e32690c75279ce1980c38e33e578e334b643bcdc5fec7f5929bc46ea9ca890ef7f9e5a68c98767abd62f4402fa82999316edb98154296c94718abc02ff1a7d95125874f0db9a09ff0dee42353a945b3bd6bce1d92772b2887db144b5a95f6aef2e93413d85164708a2ef892e19e135f908308471735d3f264362f4089dfe7cba519bf49a72325e7aba6d3453a1721e9f2027664b375d1e1158a230e7b2bc3dfa0c4b9591de0c90050bbb67516d6cdc179e5a05094c67ca24187c19ccf4fa269cc2c7f5983c9437733a33a7924a4e75a5b9fcb448e2d152274adbfec6450efe85f9b51b6f93e40fb89aa044437823f8f609df74138d90997f16347b80f4a2fff31a3022cb0f197ccdc48eb7a396615d522aee2cd995a84aa8d12d58a864d98e807829eb5cc614363de144f40871c4d5a6c9c0d2dfedcc21877fabfb2df2e9e3d9d218c523ca00745b8283113a777c1d0d8acbaf1fc78dba6cbca9dcec055818d9fec65a91b75d8f3a204758adb84f6752f3c6e779b9f806496a565ea01d207ef1e21d40462da675ce5b9526fa03e3aee1d2ae29bf6fd6b077860624f952869b0aa5185014c594b158e8aab1f13feea8701bc9c04b274e3012c50d8cac5d3bb3a49dd061c8f3114d15d3cdb4e3051a5481cf71af2e79dc2918e4fd662bb175a2fa596bddaf8101ccebf992969ca1616497fed6dcd15137599c65659a6f10f0f4c9921581c7274718a04aacddf71a4bf184f9a6f8f2809c453c41449f77d369c8956d2d722d3b84a8b74bd1bf2ded8fff960bef0f84fbfd9416a9ee54cd6e27a692ea3b420708bee6f9b1082ca8fcacf77434a3a4ff7a8efc9440d553269d8e0200342b82f18985974b303aedb264e88cdf1dab92ba8e36a6b8e67721e546593ee6e14e3fa0f11193dc78be695922a6c395dfabaea46f8a4af749079816047178c13a47aef54969c5be65d83b5f9dbdc271c796e17787881d2f1a3d506b409addc7036cf755516e46d2f25e3b968d9334cbe51251e52632479078d7d652e181d4a62db40c2150c856e3861941179dc004d311cfa714fcaf13258e3a8a4958ef5b60d39478baedf14c6547dcc707cbfd189313971ece2ee17b212c5479c2e130e8b45cff4f3586b81f7f6fe8d6e9c6491f72822166650e9dbbe3933a98042cec15e95b274ea378fbb63eb6fe21ccf1571db0625e4ecf97923dfd2e3c89215bfc9001b4676ea408f74cc122f888f987fae03cee50f52899c43e786898e3529be37904f8f90858deb47497fdda7fa3ba2c0008b7c41e1d6d22a9037863dc6c33168095aea4cf68b4d3e5dd7a6a420f92217f038ce967667303d6826832b440b7a687b1381228a8d516b24d7662db18aab7fdc19dfad6a14d57b7a13950fe58c70c8516d925587f9b9bf09325afc1da368063a75447736bf8014fdcf9ab02a3ae38daa9eb71d46ca9ae080bc0402bba38015f772aa3df9ff91e041172d47924438fa1a663856011ef7c075efee1477eed45c2a8260c1dc911bfc0f47cd604885f793378de6fc0e776cb79b58639d73965918404c03808afead2981b94515d42cde620afc5e4156616a032789a0c23a37d4d8199b8ad59ff405e238e15b2705c6340905d5a608e20ad428b8a4a27b6c0d28b8984f4088e045662cb1e7652a7edcb50ceea33f9cb26cc541c6a1ba51cd9093a9ac539539449f7b17826a2dd80ef9da421a32f1feae0fc1a4f16cd45f529393475956cdaccb6df8bdf98c4a8582161e9aeef1fcd9bd7c2d124205fa2aa210f8a9264b277d9c809e68349aacdc5d65bbf41adfef33cccd5cdcfa5a5350a905160aa9230dcf96be4b6dd124910ab7c5515d862d421f9210e4ff1066fbe6b06b7784b86c8b56a9644270c7026c5342900b1ebe05c323d7e9168a3571dbded9258644c55388574cd9699e107e000833018c0f2679938e2e6912737efe85b59294fe6793446e4b2445781d16edd13df14d45601ee9907d2e0a75fdd8376fc9c36a572b3127eb0d58cbe69362eb4d22be3ace864e4ac32bc06f00c91821ca81f9934e901213882c962b8fa414a96a4c668d5a94c4f2ca7f7ad313472ab2f2bc708da7dd11004143884b53a82b7afa098811ca2497e9e7533ab6b5413cd73444c024d71f266a33ddb08fa7be4ac943c0edd478010411981e08eabefb40da3ecdd5807dac2de875659bfc0ac5027e86975b246d921e2a46985ce72a70443852429563442d7665dbad34688b5e13a576e0722033c8f14bc2135062244ca322ff8af7ab974694027cfae258fd1359cf220518bcb231e37d70cf21e7b9ea5b1581bcabb3178381d0b78d8ebf4a548bab4517f9cb8e18cecb9b70691b05ee0c0402482cc5a970e37eab6c0e4a078544a697b84fbbfe8eb91824fa84c48381ecc589c1b917520fd251cb4e296d9981835d379faed7f6598d7155df8e012fb72eb56ca4843b65732f4fc869737fb54c2985d9f782a596adb3b808244e5c740b4dcdf66717b1c96373d771c798a0e36728a101b2217630c5c26607e54a75d16d5f041a1051807d2455994bdcbd830240656db24cc7afc298df1ee724745da0fc31d6ddd82aef6bc6e9ecd7110655a423fc8ebdd459b4fe321e733e982a627bcd640dcf19f06bca5a1419c85f93eecb58e650fe5cefb3a0b125833648c73f34f86eac20cc0a2fc75b55f14c078e6d548b0eec203882fc119db0c4f0499d72bf5bbb8691f582704f4685592244d5ac8ccdf0795744d837e46876a7a1825524d53cf61f8471ddd5ffc4e1427070d4ee639400eccdbcc34527788966e0f9b83ce0177f0912c933ac3f899dfbbd7924061e45a5fff25df1c99c835dbfccf774e87c8e83984f9d62d9d1c8d49ec560f034f0d6f79af0b5a2e63717ae37023137996afc88f323fb466f0743d84b929e11da1ae517c951819dab1442172018c5b0d1cb2cf2572a23da6f8dd49820626f6fc806cc772ce066e9f51303b0d13f11c8bb96e1fb30d37ef930d3259d5151ef28d120c597a8cebded696cce6bad37d14951e90b33251ed3dc6d5fcd9a9be9d245d2043676f4437bf177c2e5869b89a9eeb8de99c3602fb59cc62a88028b7124b228d1d20031660416b6394191486d73a7f9f92fefef034ff06f7d786af3a184da53382e0c19249d2e9007e341521192578dd8bea981a97970dac9a94940f36eb902916cc3c5200c94c1c50d55396c27942af52b49a7481e239b3a8002082cdb427b6dc0341b509e5860688ae1f9994a2573b6dc9c805caacdf5f50a6979852c9fd11aed59bf92d1d23cc894b52e2a20a04091499a836ed5bd031f4491e08a8c45651df4b1cc4facc8711c408ca045b0cce3d3539a6e93f817b35886da2199d8b2ac22bf83fde3f4f52af5968ba5379b64fa3e7fcab1b81f3e6b8ec268b68af5554b924f79e671e5839f053fec81bf5e2fe6ce360d54cd6e6a5d3eabd25ead8ffe93dcda288135886a9bf949fb40249b862df635dfd04a576fe0104e5b5aa700617352e080ed4cf3029021a3fba03c69c40e4ba6db2de62fcdf5ec5cd48e59a000ac18e7abc9ba2b7681777a6d398a90e0785e4cf254bba37de4074a67787e41d321f8e5a5a1eb21560703b027a48a820017b864e0b98c2e74582449cd52696d388907b6c96a3c1ff0f46e7f7049723e6980e899f66c89c67e12c6669072a74e27be8636488de15f9f59877c045ed7ff75c2f4a18d016ab1869a39f1df510135e5bcbacaed8b2335de4fcb06bddd53d0711da8aab3a6f82963fc6ecee11e4348767edf55491b3356cb53aea5e3817b3ac6207785a7a3094c5410749d604ef02e2635b24662eebbb6637e60ee7c1170764a9575d70bfb002fb83dc0979b4d2f4d6da7f38dddad8e38c1dcae7bfb932bf0524b7e85059ec12960625ebc3ee573813bc945c19b1fa8d7a78fdb73f85e374758de45dc47da7f56f2a0097906df5e3db9b24a5e7d5959d15ab7269992d4ec253acd50e7d5a8f0dc91d47f6ea3c82964d53946c57e0557babe7c3c669bdee4c1fb1148b13773e3adf9b99eb7c063b82b40faecab5f17791e8743201b9ffc9a3b791cead0dd91ac04fbd9d989843139197be28329bcdda0c212ee241bea789c26a89b99574a4a35f12ad45a347f430af2a18c0b026a4578cb652c9124fc0b3ee38807c87ad9b7f1f059ea983f856e0dc1a0e4152951f650d2bd7150003ea5febc12f9884cb4f6e6d369bb043a1015ea23236c54f8d5eeeff559aed44b3cd2e99448ab27be3f96cdcda34f9f16318688803ce49bf86b778344c865a14a3dfd44a2670aff5216688d1334e63aadd1a6ed35db35b96d5d7d62e9f1ecea05ba2a7ae56aafe7292fc8b0c8b16a0581f33ad54e988dadd1d5219cf36cb3777b0fdf32ee7320e022f2643424afaad811f4f47ee46d13f8f37af19e592e70330bf14bf498a39f46de001abbf6028f8e87941d3d6d5d71028f71c9b3020cff8a012e0fb33931334763e3480c141b3738f26d54e6d4afb05163c1876925e69854ca7ef18173738a26026ef30bf6dd2b922197a35a66a20f3e1107ba17914ae0679d9e5d6d82839486a22abba8d66cf7622f523fdae379cdc376d7d72bc52235c1c21864e65c40cc17079fcd1853f1c87cb569801a5f13270170da73ec982052f48298adc04fa1b36a429b75c3d8543d0301992e2c6ad71a506240d11ff19194d4b7bf421c38cb500cc4695dac1b27b1838552ea78e78c5e3cc5d7bd0171a55fe601141f2a27991713b26f964afc55cb6fb56082616db7b8e27b419b3cdcb38b1dd16f2b3cd7c2b3f03fcdfa4891fa38ea39ea5088ad4aedfdc43759eb15ae2828215c8043783bad59d73862a544d78b6d2ec95873887378f9c6683a03ca90579dd4d05215e1e5f76189d7a53463de8450142e361dc26e5f368519e711933afd47311e31dfd3838ddf1ba2b4bf136b246aecced777e86506be4280ca7ebbc591124da8ee65837f13240ec00dc956997d694105225788e84bce814d18987e7f82ec79c0a863a367dba2db28cb634683b9917af0a56e6033b6ddbb39eb488049a53d41a797eb3f646067045827a489ac96cfe5cdaa6540a51f49e2b3595205c9fbfdc0573c7ec093b31c7c5ca48aa5c1447617889d9f660c350f7e2af3db1362f716adb3a524c978b70bf8e4cfaf70c2ee39ef775d61180c7c214dbd30e33a7de43ea4646535f35c32172c8de8229c80b3a91c5b31cedc05e87f2ef8d45612f84e067c0efc46e7a8539aeb2b9d5eb375696992c84f3682f5deebdc7b75ff63d4128f415f22cfc161b53d379fd5de1422c885dc4f5c9f3c45851d51e555b7cb12f52599fb8111a81cad69a18b8cdf9af2fe8380a18fc31534d177e6962a32afefee48e7328696ca130e4d3d75590f76aa11a4831d1b0f06b2a5eca996405cae27ea5630d75e28f2f5b9580877e2c2b477acd59081817b640d28d63fdc84ecc7be6e58e74ab306a60cbd27e9afcbad44cd46b16740729b91e89524f6ef493cabf7b5c70ec548ec401a7777abf4edcc305065f9afdbe00ffce3c91a4cc903c0410597a6f83294952c6919408aab694c0beb006a918edd4dc25199f8eeea8e5ac7fc66b5be3b855968f4199befc543d1acde670467ff6f69fd9f8bcedc866779123e933ad8be0527f935e51db9d6c407f99cbe4b7a91e7cf1aae5f7975918aea8c3c4be9e15d93d5daea9e5d55b48b9a8e578024eff16f0984211573d2db8e5770f28fd254d2b770a90d965a4e8bcb8d11343f02761e5049042a4a93672587ec4974f143c3b4fdef929392c18f5e5653c7d292d724074f468df8b4fcd8d2f69d88468af97d7fe705fb783137974ca6da864428af5e0aa13beff1db3e750148492cc7b9c0720fa415026d8a714dc2538fbf648930b7b434a920f7f833b1973c6e15d58ea7a047c71f745c4ace72736e8d6dd7d47c73a297d43b4cb2fbf4e4fe6e1607e9c1c1cd0d9ee1756d15559274331b0b727e3e5bdbec669e0497c5e2a15733a3f414b80c2338e2b5ab83b3ab35d83c017783b2351f1e33755633daeabafe84deda63b0dfc7da2c4dc68b075eb3276b40e66845132c70dbc36acd562a0a9e92dc5efc32eb3756b2d7bb009e703a41ccda5b219ba4093a6687f872d6c38a2e6123c3816299ed11aab96781333c039b0f12face932053393418b1e3a6e4152166bdf82bd2a519f7623b62558865b2918f86ca0b9b0d42fc39ccef18cdc17e55ca748c10e2e5a06c4ffd3f18b4cf10bff33e6c3ddd8d1fabc8a85934078d1f01b7aabab90816dc269fda4f00aa9359f1e6c1aa1e2822c22c2c9d338aabf760354cdb30bcc726a93de1f8749cabc091423c5db8500134689f86769964059ecf202ad1d3814386481c07dd15af8cb3aed1a7999da3f0981c1f1cabcff74db76c76ddd3a770b546cb4c874db6e1df4436c5ea85486bf18d2d892cc645b47695b87b23d1f6a5a4ca6d9564f45e599399fbb67cfae1c5fba25535f63da6978706ea4d80601433e0a0cb03704ca5b2499acb84ca1f6f3e134a6908c00933dd12be278fd85bfbdb2c27f52e24d3750697327fa378e6e1e71d41af9e1877ae353116bc22831f581edd527eec09cf273da3984f90890977032e322ea4969991a63d3bbc5a34e5822ff1da7db23e5a69e8925de1e6d44981dfc1575c6a1e53d628d2a130e23770bb289e0f27bea45ed4cad651d1e77a748b8ec66862982fbc37ea9df409be09f61d2a60a64a6b0c11e7e626582e8e85b3018a3678306813ff10c746c821c4a636403eeab7b8917c6779426abb44d94eb2501a124c1b07993a49aac5ddb24ccdd3460a38ff2b0eff9adc9b47ebc9d387964f34007fb7d333698c243c34f02f5a700e99d21fda37eaa1c15942bdde264ff7e3c669ffbfff79c780809c03994f63a5821f1edb25965586953a3bc6e592d0bec340ef5897d0f18ea0cb31a2d01180d6e313d355976176d4784da56c5889fcde41f3c2e78ce4730242fd012ec6b0b34d8bd99c1c44d95dfe1ac5e340d6cb6c2eb4154f4514b1caf03d10cda77f48a4cd755484da4fbea581a95f8e8532bf69017b5635e10c618a9476a18c55a79c5b07846d7467d4b1966fd4ebb9aeb4fdfc7533fbb87f5112136646ef74455ae5393f6d0aa0129ecf4263ffbb5aa0b9078651556960ade3e52eaff12439cbf190b57e6f1741bc8afcff0ed6f56a561fefa98523473fa19eb28499fee139160bf4a45a1793bb489bbeb0491818d7ea0598c8f813ff32ef3ff7e2ba980e10ae34bbf9f667980d354c464d2fa85fc4d2c983d4ab1074ad4b64515c9b3b0cd0f3420864c663670b5cedfcc450e834652d584c0c619cdfb5288a8e9f1c6b005390bad8e9111221948eeafc3119b58b98ccb291d0238c9f24062405e390db2d830bd0af276709e03d4573398540f6d5424d4bf82e85b492953379683654b6da754aa7b5dfc12059a9b4cd1630b1d11a39dbe530a6d30bb3a0a30b6b4a271611277608e8e37fa525d63532906d7d4fd94d562c2f2fbb1f2e61fd7dbd23198bd2", 0x2000, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x90, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x7ffffffffffffffc, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1000, 0x9, 0xee00, 0x0, 0x8}}}, 0x0, 0x0, 0x0, 0x0}) 11:50:54 executing program 3: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000140)={[{@pqnoenforce='pqnoenforce'}, {@nogrpid='nogrpid'}]}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000040)={0x0, @llc={0x1a, 0x30a, 0x9, 0x0, 0xfc, 0x81, @local}, @xdp={0x2c, 0x3, 0x0, 0x17}, @l2={0x1f, 0x8, @fixed={[], 0x10}, 0x2, 0x2}, 0xfff, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)='netdevsim0\x00', 0x1, 0x3f, 0x6}) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000180)={0xffffffff, {{0xa, 0x4e24, 0x17, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x100}}}, 0x88) 11:50:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) [ 285.937277][T11598] RIP: 0033:0x45deb9 [ 285.941182][T11598] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.960787][T11598] RSP: 002b:00007f4f6e053c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 285.969206][T11598] RAX: ffffffffffffffda RBX: 0000000000033640 RCX: 000000000045deb9 [ 285.977179][T11598] RDX: 0000000000000016 RSI: 0000000000000107 RDI: 0000000000000004 [ 285.985154][T11598] RBP: 00007f4f6e053ca0 R08: 0000000000000010 R09: 0000000000000000 [ 285.993128][T11598] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000000 [ 286.001103][T11598] R13: 00007ffe6dab5a8f R14: 00007f4f6e0549c0 R15: 000000000119bf2c 11:50:55 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:50:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) [ 286.175222][T11618] FAULT_INJECTION: forcing a failure. [ 286.175222][T11618] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 286.201789][T11618] CPU: 0 PID: 11618 Comm: syz-executor.0 Not tainted 5.10.0-rc6-syzkaller #0 [ 286.210574][T11618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.220634][T11618] Call Trace: 11:50:55 executing program 4 (fault-call:5 fault-nth:1): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) [ 286.223935][T11618] dump_stack+0x107/0x163 [ 286.228286][T11618] should_fail.cold+0x5/0xa [ 286.232802][T11618] _copy_from_user+0x2c/0x180 [ 286.237494][T11618] packet_setsockopt+0x1bab/0x3950 [ 286.242707][T11618] ? find_held_lock+0x2d/0x110 [ 286.247489][T11618] ? sock_has_perm+0x120/0x280 [ 286.252258][T11618] ? packet_bind+0x1b0/0x1b0 [ 286.256868][T11618] ? find_held_lock+0x2d/0x110 [ 286.261642][T11618] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 286.267979][T11618] ? selinux_netlbl_sock_rcv_skb+0x530/0x530 [ 286.273972][T11618] ? __fget_files+0x294/0x400 [ 286.278670][T11618] ? selinux_socket_setsockopt+0x6a/0x80 [ 286.284318][T11618] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 286.289879][T11618] __sys_setsockopt+0x2db/0x610 [ 286.294741][T11618] ? packet_bind+0x1b0/0x1b0 [ 286.299339][T11618] ? __ia32_sys_recv+0x100/0x100 [ 286.304307][T11618] ? vfs_write+0x18e/0xa30 [ 286.308738][T11618] ? fput_many+0x2f/0x1a0 [ 286.313086][T11618] __x64_sys_setsockopt+0xba/0x150 [ 286.318207][T11618] ? syscall_enter_from_user_mode+0x1d/0x50 [ 286.324112][T11618] do_syscall_64+0x2d/0x70 [ 286.328539][T11618] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 286.334437][T11618] RIP: 0033:0x45deb9 [ 286.338334][T11618] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.357942][T11618] RSP: 002b:00007fb03d11cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 286.366362][T11618] RAX: ffffffffffffffda RBX: 0000000000033540 RCX: 000000000045deb9 [ 286.374339][T11618] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 [ 286.382315][T11618] RBP: 00007fb03d11cca0 R08: 0000000000000010 R09: 0000000000000000 [ 286.390288][T11618] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000000 [ 286.398265][T11618] R13: 00007ffe286ba3af R14: 00007fb03d11d9c0 R15: 000000000119bf2c [ 286.425480][T11609] XFS (loop3): Invalid superblock magic number [ 286.549312][T11634] FAULT_INJECTION: forcing a failure. [ 286.549312][T11634] name failslab, interval 1, probability 0, space 0, times 1 [ 286.654144][T11634] CPU: 1 PID: 11634 Comm: syz-executor.4 Not tainted 5.10.0-rc6-syzkaller #0 [ 286.662939][T11634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.672996][T11634] Call Trace: [ 286.676298][T11634] dump_stack+0x107/0x163 [ 286.680642][T11634] should_fail.cold+0x5/0xa [ 286.685163][T11634] should_failslab+0x5/0x10 [ 286.689675][T11634] kmem_cache_alloc_node_trace+0x336/0x560 [ 286.695491][T11634] ? lock_downgrade+0x6d0/0x6d0 11:50:55 executing program 0 (fault-call:3 fault-nth:1): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:50:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) 11:50:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) 11:50:55 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x10}, 0x10}}, 0x0) [ 286.700358][T11634] __get_vm_area_node+0xd3/0x380 [ 286.705313][T11634] ? bpf_prog_alloc_no_stats+0x33/0x2e0 [ 286.710869][T11634] __vmalloc+0xf3/0x1a0 [ 286.715034][T11634] ? bpf_prog_alloc_no_stats+0x33/0x2e0 [ 286.720591][T11634] bpf_prog_alloc_no_stats+0x33/0x2e0 [ 286.725975][T11634] bpf_prog_alloc+0x2c/0x250 [ 286.730574][T11634] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 286.736566][T11634] bpf_prog_create_from_user+0xb7/0x660 [ 286.742117][T11634] packet_setsockopt+0x1a35/0x3950 [ 286.747219][T11634] ? find_held_lock+0x2d/0x110 [ 286.751980][T11634] ? packet_bind+0x1b0/0x1b0 [ 286.756556][T11634] ? find_held_lock+0x2d/0x110 [ 286.761306][T11634] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 286.767621][T11634] ? __fget_files+0x294/0x400 [ 286.772289][T11634] ? selinux_socket_setsockopt+0x6a/0x80 [ 286.777908][T11634] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 286.783453][T11634] __sys_setsockopt+0x2db/0x610 [ 286.788300][T11634] ? packet_bind+0x1b0/0x1b0 [ 286.792879][T11634] ? __ia32_sys_recv+0x100/0x100 [ 286.797804][T11634] ? vfs_write+0x18e/0xa30 [ 286.802205][T11634] ? fput_many+0x2f/0x1a0 [ 286.806527][T11634] __x64_sys_setsockopt+0xba/0x150 [ 286.811622][T11634] ? syscall_enter_from_user_mode+0x1d/0x50 [ 286.817497][T11634] do_syscall_64+0x2d/0x70 [ 286.821895][T11634] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 286.827768][T11634] RIP: 0033:0x45deb9 [ 286.831649][T11634] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.851236][T11634] RSP: 002b:00007f4f6e053c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 286.859644][T11634] RAX: ffffffffffffffda RBX: 0000000000033640 RCX: 000000000045deb9 [ 286.867598][T11634] RDX: 0000000000000016 RSI: 0000000000000107 RDI: 0000000000000004 [ 286.875549][T11634] RBP: 00007f4f6e053ca0 R08: 0000000000000010 R09: 0000000000000000 [ 286.883499][T11634] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000001 [ 286.891452][T11634] R13: 00007ffe6dab5a8f R14: 00007f4f6e0549c0 R15: 000000000119bf2c 11:50:55 executing program 3: syz_open_dev$dri(&(0x7f0000000880)='/dev/dri/card#\x00', 0x0, 0x200440) 11:50:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) [ 287.031657][T11646] FAULT_INJECTION: forcing a failure. [ 287.031657][T11646] name failslab, interval 1, probability 0, space 0, times 1 [ 287.098347][T11646] CPU: 0 PID: 11646 Comm: syz-executor.0 Not tainted 5.10.0-rc6-syzkaller #0 [ 287.107139][T11646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.115622][T11634] syz-executor.4: vmalloc: allocation failure: 4096 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 287.117189][T11646] Call Trace: [ 287.117220][T11646] dump_stack+0x107/0x163 [ 287.117242][T11646] should_fail.cold+0x5/0xa [ 287.117268][T11646] should_failslab+0x5/0x10 [ 287.117284][T11646] kmem_cache_alloc_trace+0x31c/0x440 [ 287.117312][T11646] packet_setsockopt+0x234e/0x3950 [ 287.117330][T11646] ? find_held_lock+0x2d/0x110 [ 287.117355][T11646] ? sock_has_perm+0x120/0x280 [ 287.117379][T11646] ? packet_bind+0x1b0/0x1b0 [ 287.141810][T11634] ,cpuset= [ 287.145553][T11646] ? find_held_lock+0x2d/0x110 [ 287.145576][T11646] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 287.145594][T11646] ? selinux_netlbl_sock_rcv_skb+0x530/0x530 [ 287.145616][T11646] ? __fget_files+0x294/0x400 [ 287.173154][T11634] / [ 287.177909][T11646] ? selinux_socket_setsockopt+0x6a/0x80 [ 287.177934][T11646] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 287.177954][T11646] __sys_setsockopt+0x2db/0x610 [ 287.213396][T11646] ? packet_bind+0x1b0/0x1b0 [ 287.217998][T11646] ? __ia32_sys_recv+0x100/0x100 [ 287.222947][T11646] ? vfs_write+0x18e/0xa30 [ 287.227372][T11646] ? fput_many+0x2f/0x1a0 [ 287.231727][T11646] __x64_sys_setsockopt+0xba/0x150 [ 287.235649][T11634] ,mems_allowed=0-1 [ 287.236840][T11646] ? syscall_enter_from_user_mode+0x1d/0x50 11:50:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) [ 287.236858][T11646] do_syscall_64+0x2d/0x70 [ 287.236876][T11646] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 287.236889][T11646] RIP: 0033:0x45deb9 [ 287.236906][T11646] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.236915][T11646] RSP: 002b:00007fb03d11cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 287.236931][T11646] RAX: ffffffffffffffda RBX: 0000000000033540 RCX: 000000000045deb9 11:50:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getpeername$netlink(r0, 0x0, &(0x7f0000001880)) [ 287.236940][T11646] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 [ 287.236950][T11646] RBP: 00007fb03d11cca0 R08: 0000000000000010 R09: 0000000000000000 [ 287.236960][T11646] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000001 [ 287.236969][T11646] R13: 00007ffe286ba3af R14: 00007fb03d11d9c0 R15: 000000000119bf2c 11:50:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) 11:50:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x0, 0x0}, 0x10) 11:50:56 executing program 3: mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 287.461795][T11634] [ 287.464258][T11634] CPU: 1 PID: 11634 Comm: syz-executor.4 Not tainted 5.10.0-rc6-syzkaller #0 [ 287.473030][T11634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.483088][T11634] Call Trace: [ 287.486391][T11634] dump_stack+0x107/0x163 [ 287.490735][T11634] warn_alloc.cold+0x87/0x17a [ 287.495526][T11634] ? zone_watermark_ok_safe+0x2a0/0x2a0 [ 287.501090][T11634] ? kmem_cache_alloc_node_trace+0x441/0x560 [ 287.507077][T11634] ? lock_downgrade+0x6d0/0x6d0 [ 287.511941][T11634] ? __get_vm_area_node+0x292/0x380 [ 287.517149][T11634] ? bpf_prog_alloc_no_stats+0x33/0x2e0 [ 287.522700][T11634] __vmalloc+0x15e/0x1a0 [ 287.526956][T11634] bpf_prog_alloc_no_stats+0x33/0x2e0 [ 287.532338][T11634] bpf_prog_alloc+0x2c/0x250 [ 287.536938][T11634] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 287.542926][T11634] bpf_prog_create_from_user+0xb7/0x660 [ 287.548484][T11634] packet_setsockopt+0x1a35/0x3950 [ 287.553601][T11634] ? find_held_lock+0x2d/0x110 [ 287.558492][T11634] ? packet_bind+0x1b0/0x1b0 [ 287.563089][T11634] ? find_held_lock+0x2d/0x110 [ 287.567859][T11634] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 287.574199][T11634] ? __fget_files+0x294/0x400 [ 287.578893][T11634] ? selinux_socket_setsockopt+0x6a/0x80 [ 287.584531][T11634] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 287.590088][T11634] __sys_setsockopt+0x2db/0x610 [ 287.594944][T11634] ? packet_bind+0x1b0/0x1b0 [ 287.599542][T11634] ? __ia32_sys_recv+0x100/0x100 [ 287.604484][T11634] ? vfs_write+0x18e/0xa30 [ 287.608908][T11634] ? fput_many+0x2f/0x1a0 [ 287.613257][T11634] __x64_sys_setsockopt+0xba/0x150 [ 287.618377][T11634] ? syscall_enter_from_user_mode+0x1d/0x50 [ 287.624280][T11634] do_syscall_64+0x2d/0x70 [ 287.628700][T11634] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 287.634592][T11634] RIP: 0033:0x45deb9 [ 287.638494][T11634] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.658098][T11634] RSP: 002b:00007f4f6e053c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 287.666521][T11634] RAX: ffffffffffffffda RBX: 0000000000033640 RCX: 000000000045deb9 [ 287.674492][T11634] RDX: 0000000000000016 RSI: 0000000000000107 RDI: 0000000000000004 [ 287.682467][T11634] RBP: 00007f4f6e053ca0 R08: 0000000000000010 R09: 0000000000000000 [ 287.690441][T11634] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000001 [ 287.698417][T11634] R13: 00007ffe6dab5a8f R14: 00007f4f6e0549c0 R15: 000000000119bf2c [ 287.866050][T11634] Mem-Info: [ 287.869215][T11634] active_anon:279 inactive_anon:151201 isolated_anon:15 [ 287.869215][T11634] active_file:6920 inactive_file:42642 isolated_file:0 [ 287.869215][T11634] unevictable:0 dirty:100 writeback:0 [ 287.869215][T11634] slab_reclaimable:23119 slab_unreclaimable:116477 [ 287.869215][T11634] mapped:61229 shmem:5064 pagetables:1439 bounce:0 [ 287.869215][T11634] free:1271034 free_pcp:669 free_cma:0 [ 287.912202][T11634] Node 0 active_anon:1116kB inactive_anon:604704kB active_file:27532kB inactive_file:170568kB unevictable:0kB isolated(anon):60kB isolated(file):0kB mapped:244916kB dirty:400kB writeback:0kB shmem:20256kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 460800kB writeback_tmp:0kB kernel_stack:8736kB all_unreclaimable? no [ 287.964556][T11634] Node 1 active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:32kB all_unreclaimable? no [ 288.002371][T11634] Node 0 DMA free:15908kB min:208kB low:260kB high:312kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 288.030586][T11634] lowmem_reserve[]: 0 2661 2661 2661 2661 [ 288.037122][T11634] Node 0 DMA32 free:1053472kB min:35748kB low:44684kB high:53620kB reserved_highatomic:0KB active_anon:1116kB inactive_anon:604676kB active_file:27412kB inactive_file:170492kB unevictable:0kB writepending:400kB present:3129332kB managed:2730620kB mlocked:0kB pagetables:5608kB bounce:0kB free_pcp:2680kB local_pcp:1280kB free_cma:0kB [ 288.072777][T11634] lowmem_reserve[]: 0 0 0 0 0 [ 288.086592][T11634] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:120kB inactive_file:76kB unevictable:0kB writepending:0kB present:1048576kB managed:196kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 288.127770][T11634] lowmem_reserve[]: 0 0 0 0 0 [ 288.132593][T11634] Node 1 Normal free:4015640kB min:54148kB low:67684kB high:81220kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB writepending:0kB present:4194304kB managed:4128264kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 288.174075][T11634] lowmem_reserve[]: 0 0 0 0 0 [ 288.183488][T11634] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 288.207983][T11634] Node 0 DMA32: 13023*4kB (UME) 1627*8kB (UME) 742*16kB (UME) 164*32kB (UME) 18*64kB (UME) 47*128kB (UME) 19*256kB (UM) 9*512kB (UM) 7*1024kB (ME) 2*2048kB (UE) 230*4096kB (M) = 1052212kB [ 288.255058][T11634] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 288.295210][T11634] Node 1 Normal: 138*4kB (UME) 254*8kB (UME) 208*16kB (UME) 92*32kB (UM) 48*64kB (UM) 33*128kB (UM) 11*256kB (UM) 4*512kB (U) 1*1024kB (M) 2*2048kB (ME) 974*4096kB (M) = 4015640kB [ 288.337549][T11634] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 288.353013][T11634] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 288.373681][T11634] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 288.384639][T11634] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 288.407181][T11634] 53122 total pagecache pages [ 288.411869][T11634] 0 pages in swap cache [ 288.418015][T11634] Swap cache stats: add 0, delete 0, find 0/0 [ 288.424109][T11634] Free swap = 0kB [ 288.428623][T11634] Total swap = 0kB [ 288.432407][T11634] 2097051 pages RAM 11:50:57 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:57 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x0, 0x0) 11:50:57 executing program 0 (fault-call:3 fault-nth:2): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:50:57 executing program 1: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) 11:50:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x0, 0x0}, 0x10) 11:50:57 executing program 3: syz_open_dev$usbmon(&(0x7f0000001b40)='/dev/usbmon#\x00', 0x0, 0x4040) [ 288.437024][T11634] 0 pages HighMem/MovableOnly [ 288.441704][T11634] 378304 pages reserved [ 288.446435][T11634] 0 pages cma reserved 11:50:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$netlink(r0, 0x0, &(0x7f0000000180)) [ 288.533788][T11680] device bond0 entered promiscuous mode [ 288.562109][T11680] device bond_slave_0 entered promiscuous mode 11:50:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={0x0}}, 0x0) 11:50:57 executing program 1: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) [ 288.605538][T11680] FAULT_INJECTION: forcing a failure. [ 288.605538][T11680] name failslab, interval 1, probability 0, space 0, times 0 11:50:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x0, 0x0}, 0x10) [ 288.678168][T11680] CPU: 1 PID: 11680 Comm: syz-executor.0 Not tainted 5.10.0-rc6-syzkaller #0 [ 288.686973][T11680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.697037][T11680] Call Trace: [ 288.700344][T11680] dump_stack+0x107/0x163 [ 288.704691][T11680] should_fail.cold+0x5/0xa [ 288.709211][T11680] should_failslab+0x5/0x10 [ 288.713722][T11680] kmem_cache_alloc_node+0x62/0x520 [ 288.718939][T11680] __alloc_skb+0x71/0x550 [ 288.723289][T11680] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 288.728587][T11680] rtmsg_ifinfo+0x83/0x120 [ 288.733015][T11680] __dev_notify_flags+0x226/0x2b0 [ 288.738050][T11680] ? dev_change_name+0x690/0x690 [ 288.743000][T11680] ? record_print_text.cold+0x16/0x16 [ 288.748375][T11680] ? tick_nohz_tick_stopped+0x13/0xa0 [ 288.753746][T11680] ? __irq_work_queue_local+0x125/0x190 [ 288.759286][T11680] ? irq_work_queue+0x29/0x80 [ 288.763953][T11680] __dev_set_promiscuity+0x197/0x210 [ 288.769227][T11680] dev_set_promiscuity+0x4f/0x150 [ 288.774241][T11680] bond_change_rx_flags+0x220/0x6e0 [ 288.779431][T11680] ? bond_time_in_interval.isra.0+0xc0/0xc0 [ 288.785424][T11680] ? fs_reclaim_release+0x90/0xd0 [ 288.790447][T11680] ? bond_time_in_interval.isra.0+0xc0/0xc0 [ 288.796326][T11680] __dev_set_promiscuity.cold+0x2f1/0x35f [ 288.802030][T11680] dev_set_promiscuity+0x4f/0x150 [ 288.807059][T11680] packet_dev_mc+0x73/0x290 [ 288.811549][T11680] packet_setsockopt+0x26b8/0x3950 [ 288.816644][T11680] ? find_held_lock+0x2d/0x110 [ 288.821393][T11680] ? sock_has_perm+0x120/0x280 [ 288.826144][T11680] ? packet_bind+0x1b0/0x1b0 [ 288.830717][T11680] ? find_held_lock+0x2d/0x110 [ 288.835463][T11680] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 288.841772][T11680] ? selinux_netlbl_sock_rcv_skb+0x530/0x530 [ 288.847739][T11680] ? __fget_files+0x294/0x400 [ 288.852406][T11680] ? selinux_socket_setsockopt+0x6a/0x80 [ 288.858022][T11680] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 288.863567][T11680] __sys_setsockopt+0x2db/0x610 [ 288.868403][T11680] ? packet_bind+0x1b0/0x1b0 [ 288.872974][T11680] ? __ia32_sys_recv+0x100/0x100 [ 288.877894][T11680] ? vfs_write+0x18e/0xa30 [ 288.882296][T11680] ? fput_many+0x2f/0x1a0 [ 288.886618][T11680] __x64_sys_setsockopt+0xba/0x150 [ 288.891711][T11680] ? syscall_enter_from_user_mode+0x1d/0x50 [ 288.897583][T11680] do_syscall_64+0x2d/0x70 [ 288.901979][T11680] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 288.908024][T11680] RIP: 0033:0x45deb9 11:50:57 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x29, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) [ 288.911901][T11680] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.931483][T11680] RSP: 002b:00007fb03d11cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 288.939882][T11680] RAX: ffffffffffffffda RBX: 0000000000033540 RCX: 000000000045deb9 [ 288.947834][T11680] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 [ 288.955788][T11680] RBP: 00007fb03d11cca0 R08: 0000000000000010 R09: 0000000000000000 [ 288.963744][T11680] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000002 [ 288.971696][T11680] R13: 00007ffe286ba3af R14: 00007fb03d11d9c0 R15: 000000000119bf2c 11:50:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 11:50:57 executing program 3: mmap$usbmon(&(0x7f0000cdb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x8) 11:50:58 executing program 1: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) [ 289.095001][T11680] device bond_slave_1 entered promiscuous mode [ 289.113141][T11675] device bond0 left promiscuous mode [ 289.139890][T11675] device bond_slave_0 left promiscuous mode [ 289.175778][T11675] device bond_slave_1 left promiscuous mode 11:50:58 executing program 0 (fault-call:3 fault-nth:3): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:50:58 executing program 2: syz_open_dev$usbmon(&(0x7f0000000680)='/dev/usbmon#\x00', 0x0, 0x56d240) 11:50:58 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x106, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040)=0x9, 0x4) 11:50:58 executing program 3: pselect6(0x40, &(0x7f0000001200), 0x0, &(0x7f0000001280)={0x6}, 0x0, 0x0) 11:50:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:58 executing program 2: pselect6(0x40, &(0x7f0000001200), &(0x7f0000001240)={0x1}, 0x0, &(0x7f00000012c0)={0x77359400}, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) 11:50:58 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, 0x0) 11:50:58 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x108, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) [ 289.428661][T11718] device bond0 entered promiscuous mode [ 289.458352][T11718] device bond_slave_0 entered promiscuous mode 11:50:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) [ 289.485952][T11718] FAULT_INJECTION: forcing a failure. [ 289.485952][T11718] name failslab, interval 1, probability 0, space 0, times 0 [ 289.550608][T11718] CPU: 1 PID: 11718 Comm: syz-executor.0 Not tainted 5.10.0-rc6-syzkaller #0 [ 289.559398][T11718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.569458][T11718] Call Trace: [ 289.572753][T11718] dump_stack+0x107/0x163 [ 289.577077][T11718] should_fail.cold+0x5/0xa [ 289.581579][T11718] should_failslab+0x5/0x10 [ 289.586072][T11718] kmem_cache_alloc_node_trace+0x68/0x560 [ 289.591779][T11718] ? rcu_read_lock_sched_held+0x3a/0x70 [ 289.597308][T11718] ? kmem_cache_alloc_node+0x41e/0x520 [ 289.602751][T11718] __kmalloc_node_track_caller+0x38/0x60 [ 289.608372][T11718] __alloc_skb+0xae/0x550 [ 289.612688][T11718] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 289.617959][T11718] rtmsg_ifinfo+0x83/0x120 [ 289.622362][T11718] __dev_notify_flags+0x226/0x2b0 [ 289.627367][T11718] ? dev_change_name+0x690/0x690 [ 289.632284][T11718] ? record_print_text.cold+0x16/0x16 [ 289.637637][T11718] ? tick_nohz_tick_stopped+0x13/0xa0 [ 289.642994][T11718] ? __irq_work_queue_local+0x125/0x190 [ 289.648524][T11718] ? irq_work_queue+0x29/0x80 [ 289.653188][T11718] __dev_set_promiscuity+0x197/0x210 [ 289.658483][T11718] dev_set_promiscuity+0x4f/0x150 [ 289.663494][T11718] bond_change_rx_flags+0x220/0x6e0 [ 289.668681][T11718] ? bond_time_in_interval.isra.0+0xc0/0xc0 [ 289.674554][T11718] ? fs_reclaim_release+0x90/0xd0 [ 289.679760][T11718] ? bond_time_in_interval.isra.0+0xc0/0xc0 [ 289.685638][T11718] __dev_set_promiscuity.cold+0x2f1/0x35f [ 289.691344][T11718] dev_set_promiscuity+0x4f/0x150 [ 289.696351][T11718] packet_dev_mc+0x73/0x290 [ 289.700839][T11718] packet_setsockopt+0x26b8/0x3950 [ 289.705934][T11718] ? find_held_lock+0x2d/0x110 [ 289.710685][T11718] ? sock_has_perm+0x120/0x280 [ 289.715432][T11718] ? packet_bind+0x1b0/0x1b0 [ 289.720019][T11718] ? find_held_lock+0x2d/0x110 [ 289.724776][T11718] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 289.731097][T11718] ? selinux_netlbl_sock_rcv_skb+0x530/0x530 [ 289.737062][T11718] ? __fget_files+0x294/0x400 [ 289.741727][T11718] ? selinux_socket_setsockopt+0x6a/0x80 [ 289.747430][T11718] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 289.753053][T11718] __sys_setsockopt+0x2db/0x610 [ 289.757888][T11718] ? packet_bind+0x1b0/0x1b0 [ 289.762458][T11718] ? __ia32_sys_recv+0x100/0x100 [ 289.767377][T11718] ? vfs_write+0x18e/0xa30 [ 289.771798][T11718] ? fput_many+0x2f/0x1a0 [ 289.776115][T11718] __x64_sys_setsockopt+0xba/0x150 [ 289.781210][T11718] ? syscall_enter_from_user_mode+0x1d/0x50 [ 289.787098][T11718] do_syscall_64+0x2d/0x70 [ 289.791497][T11718] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 289.797370][T11718] RIP: 0033:0x45deb9 [ 289.801259][T11718] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.820841][T11718] RSP: 002b:00007fb03d11cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 289.829239][T11718] RAX: ffffffffffffffda RBX: 0000000000033540 RCX: 000000000045deb9 [ 289.837194][T11718] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 [ 289.845158][T11718] RBP: 00007fb03d11cca0 R08: 0000000000000010 R09: 0000000000000000 [ 289.853110][T11718] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000003 [ 289.861062][T11718] R13: 00007ffe286ba3af R14: 00007fb03d11d9c0 R15: 000000000119bf2c [ 289.883743][T11718] device bond_slave_1 entered promiscuous mode [ 289.894552][T11713] device bond0 left promiscuous mode 11:50:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000001700)=ANY=[]) 11:50:58 executing program 2: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20048045) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000006, 0x12, 0xffffffffffffffff, 0x0) [ 289.906712][T11713] device bond_slave_0 left promiscuous mode [ 289.920893][T11713] device bond_slave_1 left promiscuous mode 11:50:58 executing program 0 (fault-call:3 fault-nth:4): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:50:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:50:59 executing program 2: pselect6(0x40, &(0x7f0000001200)={0xff}, 0x0, 0x0, 0x0, 0x0) 11:50:59 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x40, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000780)='/dev/dri/card#\x00', 0x5, 0x0) [ 290.107024][T11739] device bond0 entered promiscuous mode [ 290.112872][T11737] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 290.190573][T11739] device bond_slave_0 entered promiscuous mode [ 290.198740][T11739] FAULT_INJECTION: forcing a failure. [ 290.198740][T11739] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 290.211960][T11739] CPU: 0 PID: 11739 Comm: syz-executor.0 Not tainted 5.10.0-rc6-syzkaller #0 [ 290.220720][T11739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.230774][T11739] Call Trace: [ 290.234079][T11739] dump_stack+0x107/0x163 [ 290.238424][T11739] should_fail.cold+0x5/0xa [ 290.242940][T11739] ? __dev_set_promiscuity.cold+0x2f1/0x35f [ 290.248844][T11739] __alloc_pages_nodemask+0x189/0x730 [ 290.254228][T11739] ? __alloc_pages_slowpath.constprop.0+0x2510/0x2510 [ 290.261001][T11739] ? lock_chain_count+0x20/0x20 [ 290.265873][T11739] ? find_held_lock+0x2d/0x110 [ 290.270731][T11739] cache_grow_begin+0x71/0x420 [ 290.275508][T11739] cache_alloc_refill+0x27f/0x380 [ 290.280551][T11739] kmem_cache_alloc_node_trace+0x470/0x560 11:50:59 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000440)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) [ 290.286367][T11739] ? kmem_cache_alloc_node+0x41e/0x520 [ 290.292191][T11739] __kmalloc_node_track_caller+0x38/0x60 [ 290.297837][T11739] __alloc_skb+0xae/0x550 [ 290.302183][T11739] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 290.307480][T11739] rtmsg_ifinfo+0x83/0x120 [ 290.311908][T11739] __dev_notify_flags+0x226/0x2b0 [ 290.316941][T11739] ? dev_change_name+0x690/0x690 [ 290.321890][T11739] ? record_print_text.cold+0x16/0x16 [ 290.327276][T11739] ? tick_nohz_tick_stopped+0x13/0xa0 [ 290.332797][T11739] ? __irq_work_queue_local+0x125/0x190 11:50:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) [ 290.338356][T11739] ? irq_work_queue+0x29/0x80 [ 290.343045][T11739] __dev_set_promiscuity+0x197/0x210 [ 290.348349][T11739] dev_set_promiscuity+0x4f/0x150 [ 290.353383][T11739] bond_change_rx_flags+0x220/0x6e0 [ 290.358595][T11739] ? bond_time_in_interval.isra.0+0xc0/0xc0 [ 290.364513][T11739] ? fs_reclaim_release+0x90/0xd0 [ 290.369551][T11739] ? bond_time_in_interval.isra.0+0xc0/0xc0 [ 290.375455][T11739] __dev_set_promiscuity.cold+0x2f1/0x35f [ 290.381188][T11739] dev_set_promiscuity+0x4f/0x150 [ 290.386225][T11739] packet_dev_mc+0x73/0x290 [ 290.390740][T11739] packet_setsockopt+0x26b8/0x3950 [ 290.395860][T11739] ? find_held_lock+0x2d/0x110 [ 290.400642][T11739] ? sock_has_perm+0x120/0x280 [ 290.405414][T11739] ? packet_bind+0x1b0/0x1b0 [ 290.410012][T11739] ? find_held_lock+0x2d/0x110 [ 290.414784][T11739] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 290.421119][T11739] ? selinux_netlbl_sock_rcv_skb+0x530/0x530 [ 290.427110][T11739] ? __fget_files+0x294/0x400 [ 290.432261][T11739] ? selinux_socket_setsockopt+0x6a/0x80 [ 290.437901][T11739] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 290.443455][T11739] __sys_setsockopt+0x2db/0x610 [ 290.448313][T11739] ? packet_bind+0x1b0/0x1b0 [ 290.452911][T11739] ? __ia32_sys_recv+0x100/0x100 [ 290.457966][T11739] ? vfs_write+0x18e/0xa30 [ 290.462391][T11739] ? fput_many+0x2f/0x1a0 [ 290.466740][T11739] __x64_sys_setsockopt+0xba/0x150 [ 290.471962][T11739] ? syscall_enter_from_user_mode+0x1d/0x50 [ 290.477866][T11739] do_syscall_64+0x2d/0x70 [ 290.482291][T11739] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 290.488213][T11739] RIP: 0033:0x45deb9 [ 290.492114][T11739] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.511720][T11739] RSP: 002b:00007fb03d11cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 290.520146][T11739] RAX: ffffffffffffffda RBX: 0000000000033540 RCX: 000000000045deb9 [ 290.528124][T11739] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 11:50:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x109, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:59 executing program 5: syz_open_dev$usbmon(&(0x7f0000001b40)='/dev/usbmon#\x00', 0xffffffff, 0x4040) [ 290.536101][T11739] RBP: 00007fb03d11cca0 R08: 0000000000000010 R09: 0000000000000000 [ 290.544081][T11739] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000004 [ 290.552057][T11739] R13: 00007ffe286ba3af R14: 00007fb03d11d9c0 R15: 000000000119bf2c 11:50:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) [ 290.592513][T11739] device bond_slave_1 entered promiscuous mode [ 290.602064][T11736] device bond0 left promiscuous mode [ 290.627899][T11736] device bond_slave_0 left promiscuous mode 11:50:59 executing program 0 (fault-call:3 fault-nth:5): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) [ 290.651757][T11736] device bond_slave_1 left promiscuous mode 11:50:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x114, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:50:59 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x40, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000780)='/dev/dri/card#\x00', 0x5, 0x0) 11:50:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0xfffffefffbfbbfbe, &(0x7f000006ffe4)={0xa, 0x0, 0x0, @empty}, 0x1c) getsockopt$inet6_buf(r2, 0x29, 0x18, 0x0, &(0x7f0000000080)) 11:50:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) [ 290.816147][T11769] device bond0 entered promiscuous mode [ 290.821857][T11769] device bond_slave_0 entered promiscuous mode [ 290.831281][T11769] device bond_slave_1 entered promiscuous mode [ 290.841374][T11769] FAULT_INJECTION: forcing a failure. [ 290.841374][T11769] name failslab, interval 1, probability 0, space 0, times 0 [ 290.907722][T11769] CPU: 1 PID: 11769 Comm: syz-executor.0 Not tainted 5.10.0-rc6-syzkaller #0 [ 290.916509][T11769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.926567][T11769] Call Trace: [ 290.929874][T11769] dump_stack+0x107/0x163 [ 290.934219][T11769] should_fail.cold+0x5/0xa [ 290.938739][T11769] should_failslab+0x5/0x10 [ 290.943250][T11769] kmem_cache_alloc_node+0x62/0x520 [ 290.948466][T11769] __alloc_skb+0x71/0x550 [ 290.952813][T11769] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 290.958109][T11769] rtmsg_ifinfo+0x83/0x120 [ 290.962540][T11769] __dev_notify_flags+0x226/0x2b0 [ 290.967581][T11769] ? dev_change_name+0x690/0x690 [ 290.972528][T11769] ? record_print_text.cold+0x16/0x16 [ 290.977917][T11769] ? dev_set_promiscuity+0x119/0x150 [ 290.983220][T11769] __dev_set_promiscuity+0x197/0x210 [ 290.988522][T11769] dev_set_promiscuity+0x4f/0x150 [ 290.993568][T11769] bond_change_rx_flags+0x220/0x6e0 [ 290.998780][T11769] ? bond_time_in_interval.isra.0+0xc0/0xc0 [ 291.004677][T11769] ? fs_reclaim_release+0x90/0xd0 [ 291.009720][T11769] ? bond_time_in_interval.isra.0+0xc0/0xc0 [ 291.015621][T11769] __dev_set_promiscuity.cold+0x2f1/0x35f [ 291.021358][T11769] dev_set_promiscuity+0x4f/0x150 [ 291.026397][T11769] packet_dev_mc+0x73/0x290 [ 291.030919][T11769] packet_setsockopt+0x26b8/0x3950 [ 291.036049][T11769] ? find_held_lock+0x2d/0x110 [ 291.040828][T11769] ? sock_has_perm+0x120/0x280 [ 291.045601][T11769] ? packet_bind+0x1b0/0x1b0 [ 291.050200][T11769] ? find_held_lock+0x2d/0x110 [ 291.054975][T11769] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 291.061311][T11769] ? selinux_netlbl_sock_rcv_skb+0x530/0x530 [ 291.067394][T11769] ? __fget_files+0x294/0x400 [ 291.072091][T11769] ? selinux_socket_setsockopt+0x6a/0x80 [ 291.077735][T11769] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 291.083295][T11769] __sys_setsockopt+0x2db/0x610 [ 291.088157][T11769] ? packet_bind+0x1b0/0x1b0 [ 291.092756][T11769] ? __ia32_sys_recv+0x100/0x100 [ 291.097705][T11769] ? vfs_write+0x18e/0xa30 [ 291.102151][T11769] ? fput_many+0x2f/0x1a0 [ 291.106502][T11769] __x64_sys_setsockopt+0xba/0x150 [ 291.111627][T11769] ? syscall_enter_from_user_mode+0x1d/0x50 [ 291.117529][T11769] do_syscall_64+0x2d/0x70 [ 291.121954][T11769] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 291.127849][T11769] RIP: 0033:0x45deb9 [ 291.131751][T11769] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:51:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) [ 291.151483][T11769] RSP: 002b:00007fb03d11cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 291.159907][T11769] RAX: ffffffffffffffda RBX: 0000000000033540 RCX: 000000000045deb9 [ 291.167886][T11769] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 [ 291.175863][T11769] RBP: 00007fb03d11cca0 R08: 0000000000000010 R09: 0000000000000000 [ 291.183839][T11769] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000005 [ 291.191831][T11769] R13: 00007ffe286ba3af R14: 00007fb03d11d9c0 R15: 000000000119bf2c 11:51:00 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0}, 0x68) pipe2$9p(&(0x7f0000001a80), 0x0) [ 291.237997][T11768] device bond0 left promiscuous mode [ 291.243315][T11768] device bond_slave_0 left promiscuous mode 11:51:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000001800)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000017c0)={&(0x7f00000002c0)={0xec4, 0x14, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x59, 0x1, "d8301b0b81f5b4fdd55117a440a3d8bdf908829285c79f5c82e8474af088571a9665b22a2af2bf112a1f3f102ac87ee9c6a2cb43f756aca991484118df2e46119af62343993db563c51eb47728fa1cfeae1fa0c17a"}, @INET_DIAG_REQ_BYTECODE={0xc9, 0x1, "794c26166df51251ca263225e906ae498b0f5bcd4f2ecf5256347aaa5e32383f72c73ed5f9886b525ca2ec34f88fd809409d96596b9c3b4695ff26e09f9afe9776ad37b1c37f5310492153a105dfd546a22caa1feca850d548ae1709d8641e7423e1c04977fdce902c29a6047d74cc618283a84e0619f26825e0f91b17bac7d0998dc74ce3696d5bcee98fc70ea2eaa501a618476261249f0b480306e7f0722c08bd5a027fe8457fce66265aaba73ea7190e644ac2eb80d4751634fc41f128d887ccbcd4f9"}, @INET_DIAG_REQ_BYTECODE={0xb1, 0x1, "76b75556a679e365d72198cf54e2fc83ff7da081e3dd49a9d6d90147966fe6ab5221fb0439c54587918bb661307fb5bc0ede7d8bcfd347d19dec06d95000af477e539d0c3d7ad7528b35246bd1e006d22dc742105837773bf46894a7c6b7e43f6b90e0b60fae0cd3454e37401527c36e4a929306bade785c7c5b80c400c812b4217fe405e24aaf7f84979a2fe843f5a6b77c69e88e21c567621c46d7505ef43c698b21364aad046b030f35db25"}, @INET_DIAG_REQ_BYTECODE={0xcd1, 0x1, "7f7e962e6d09cc6447cecd3f170721ec3b1c80d9cc90ced121afe3264f8efeb0555e0cbd29146545d0108857cb0d31382abb9fe97a58ffe5b316fc5bb0ac537df1523be789256ea4c3af2cf6cb6b00c6bc6edff88694036bf7d5c3f4f943d5e93f4cd3cc1a42e7cdd71ecbebfa83ce26731e2863a8eccd8495ef49b215c986b652909e75a29d0cab162e5406d4b21f21638dcc4f542f72cd78ac82978fc944256357113d04b65f172ae20a25123ef10b8f42fd1a063760eb546f482c80846f0efd214803f789e875f579ede223c1bb8d23b98d98fd3ed6b390b479a9b3e9f8312bf9b7a491d662c0620d2dfb55000879445b70f437b5727b51fbbd2675a9fee9741fa78dd7556bd8c85a819cb5664490aed9ea326ab49ecb8a276e683dae7ecf23ecdfff2ddcdaef24c3b5c2fc95302a5b744ab50efe5c135ddae9ed753f3112f973339db70a85298cb8937128122ed726405954d9f14b4f9edec7e6be9c058e8e09514865e263ecfbbee466de9e457b0287ae34f0ba4e2fd1dd06bb5d268c8c80759d10a927bb34abef9bf1f0bde3941b9d528af5771222e0136f462fac3aebdd3886449849a06efdb25af94ee51fea9f47bce85e9d85b4f927660aa2b2c0d5e9d9ebd4f3087ff65b3a1b9a4e7c89a9d442a8da8eaeeb19f4ab35fbc0a04c8a616b8a2a84031727b33ffcf8fc51f536ac034b43dab64133a068e05bc3981160b0bb97655ccc5c3932353a28b7555f0d9780f3ecdc0f9581008bc8cb2f496dfe6f2736668eea799f949cdc90e721b46119d26b6496c70bc3331a6a6c3f657ebf4b21dcadd154d6ad725116527997757bc0fdde36acede6aab29895f0751a2aae56bd6fc65da555921e6c1ddeeedf8840aa0ee21dd934b3849cdfe533f4dd4e9ad90e44d84955ff1e3f5a35d1c98f5fb647205e1769a80d6e4aa74b4c9d433ad4e65684dcb0641cd5d10c0a3bb22f73f659bd300dd99bb49844c1a7543d24ce5f367213d72b456a5cd3c413608d71d833f3113c94c1c18d14e6a4ed3064d532db3972b84b779a59014849b20aaee0c1b0172dbadf59f6d090d336d68bc14177598dbd4050f93acd6c15ab8ef299b5a3a0a3add69e9dbdb8b1a87b62baac26645d2ee084eb76c4848bfaed6deb8cead791b7fcbf33a5659e09530e469079e053e05ad177fc3af8876dd06015bf6d48dec21bbc15136244cf27a82f788bfb7781ea9a678ab68b18c6ae0433354b57b9aad98740efd97bfc71e0ba8cd45a8d6caeab2c8a0e10fab424d84751a1e1c92508aa0f24c452d6a6695cf82847aa11faa258297bbe1622efd19927de18735fcc1b611540aa5dcdfbb4bab499f3c8d7b7bd01ffab0696f03c88b057292786f2829fd0e6e5a7049179753b3ad980708619fd59a89022e6bc7cf538048195dded47694d788cfcaec289bd3914b78fe1b6e8cc9fe89e725328fa65ce432e2f2570e12b17a14aa69fed7feec7947bb531a55a8a8d7a8e82c9a61cb313ecc416b13635d038a0d7ba129961dd783630e92e8cd97538fc42264436bc8c5248500642e16f16ffe3a61452b27c2c28d6b0bcd8577fa98e7eb22172dfbf7d025de2572fe15b85186a8e5466c5219ac63acdfe6494c5b81a01bda77ec4f59c057c961cbb7c41cec87e98efa5d8067757f2b1bee14747e554cbebd196a7ad54dbae0f7bc0428776625608b16a04089a8432bccf8e8e897a711e84070803238dd227d177e1a75ff86710e2c9e0caa3c0248f3d5d1c63411c79df2bbdf0599197b4966fab4900e5d0457a07a88c8ec9eb40df4fce3321281c50a3fc68ac12df5f8f461ef242102adf265c19ac4befdd93aa8fea826c493f40628ab421d1e558dbc18ba7dc43a27e8d7d9eb723438b33309ab7d9f57a86681009aa582232adf26325c2e83a970f4e898d66b622803a074d5f881fdbc88359c9a3bc24f60e8c80e941d464a3568efb1f4c3c5450be2f9770267dc09d035545b9b3f8ef79ca2b49ac94b3a8b98b4f6b567016c1f04ce362fff014c226969bcf212899f5942a9e607448b808702b2a260a0010e1ff34da77d5fc0a269a7738c37111cae1bf3d83cab69fb768072747396302b10d5d82057403485ffb2c044e550b25f21ff2c494ef7b0876311e26416beb2c9ea37e9497c3ee90dddd1abc44a23ef9c0381dca7c6063121ef8c22dff3c8931904e5a35a7c69a132839e6c9facd2cded163af9c88778debd3b67074efe90f264831b8b34b5a94169b0c17625ca0d7350ec19ddfc0806c341c4db7e3c2f0b68996a606e5bb6b2c78dd52c9f180dbed712bd80a4b7ba0d6908eb8454ca9af706aee63c3e48d7b477dbd899548b018889adbbe1ef7dbe3ab5cea9372d338267d598bb301122c09c2e3c59dd74565c4a452b33d05270970b448401a050805b1ce05ceae4847a6ca884af974e1c7aad3b488b23253def3587933df62557cd2bddcdb9f1f48845f1d90f06cb5cd9cecff5364bf588c2178a27a80de7bb6a8461c1d89bde1c5caca0b466eb93413666e27bfb6176f3a2541eb9e9d9f599e5d43bb05940272a321d316e496cfee8651b67aaea8b697575d583599c1e59f1a8e29f2353cc09b437a40489c1d2830d3d4b50c62ef5105221245e30f2a86465618482de5523cb74e2ba9abc04b84ea80d80bde415a86fe5219c51bfa7297d094d91c5f024a8bd824f9290e4a657a10258e8be912fa1e0f34a93d693dd32499cd38c63d962751fe01aa2b0b7e6235df0df83c493027b2aee5af05902f85cb0035e694ee510a09d5bd402f56d03c671be38962ce558b29c5bcd4c7900c5daf9ccb6fc3ca20f1dd03f08376637ef6f37d65abc18c71d5cb18ea73ce0bb2449825411c08426f6925b0a5708477928e43051252786845b77f510b632a3e53ff762a603d8c7827d09716a4159c16e8a9c33ad0d620b4ccd076c1af27ec89b59cffd715ce8a1a7c5fb6131a5cd25c7df8bc11a469e33418275cb35fd769bc50124e4756153fa1380193d09ab9d63473ec08a0039abb8727a68b5a82ca8c0dbedf44471780159510d2a9e033fae05f2e22ac7e9a8fa7483dd4ad3a75ac70b6f91d1ceb8514789b105a2cd7c38003d17fd8df3cfc2ad89e73a5e9eedec12a97409ab0ecc3cfe9f3d2c6ceb894a11b31080dd794f2b5c282607de3132138e005e65ef4ac688d39d23943eeeda94a500f0dc9e645e57b874b64fbb0fcfacb6721c0698965509ed13fe5fc88cd2b167d91ef77e16f6ba6e1ac9422a72bd8aee038bfd2a9490d1703476d1465c799b22eb3894c7457f10b104100d902ebf5976d154ac70b19b6a394fc906befbe460f447c7a2252cc7301cddd7e3cb8423592fe4ddc5c7473baeb8601bed509217e29e3b02a0a4661adc43cff584f71cdf5dca474d11345a7fd4756c01c29182e7b55e171a38dcecb98cefbc33dc66a003e8c2f792014c2c70cc382dc85fe6ff0b4b5f50cd3214defbf3b20db8a62604eea086312fc051f35544557bef1af5c371a876debe3c58430c5ceae2b4d58c421d259bc15a49fdd6c6e0e14c4cceb56080c4a472b6b616e193bf3774ccd58532396e6b38de23263b47eacb81e72b6fab1a625d7e584f549975e8de7016797ab6e7c30a7ac17ba781756ff9533b79df8656b0805b07527ee8dd270e659d297da229c61423a1038e93fc6b4d63032ddddf36e6cfaec0b3d4471c5782f05d15b84d932151af6c1124893e97b433d47a4ec5eb2b90a91dc1f6286c53353ccb83d271485a96836afa134a79e393c63d0f06615e391f38c1e954d167d1efb229192ebc85567de960da264e39922e97723f3da845d11e8ad71dd256730eff89a03e1b2cfc71e72461f2269a404ffdc59dc1d32fb08c03dd7ff04a623d00fcc7e647c0ade01a6942bcb280c9cb1db64befdf639f81bb2b8eb38511d78fb155652987926cbb57d004048874cf42eb38f87a7fa2f16a39ab83266c26f60de564b2bc35ba4d873d0bd187f34e20c664880bac836503f109862afbaee4f6bcc1882f6b19ab1199d4c0eeb0e6ad4571a0c431f9cc185836ced705004f77eceba4e003b2ce2d9d7bed58ebb5595a3950f97b814015a28aff0afa70a6ea382b339ca27d860eecfc50d92f2c9648669709dc97ac1e01e05c0c7b35cf18324f826b2ae7b3d3dd3db5bac50a73d542aae04b9111a8c8d805032d79ae459b95f6fd8e4670067b3dc3610175c5ec50ae551e052b7f1b66f0c0331f9abce9c506583166940ff34a94deb28d7ad350eea44aca36a26d0e8a87cab8534e21838b999f3a46bac9fa28567f677854b2bd9fffb182a3c7df1db51076adb80aa8ad46296770c2f4f8e19ea0749191f07acb53886f8c3a535143cdb2093be60e1bca0dd0465a8db1573cd128c572398ccad064f975abd79e1dc4ee207a3be63e577794d7d840f4a91581077f0e41c6a1f7a528368abfc7b736c72f1269480fd96bb12b09f2c0222f79920acadc9a5df975cbec4e7bad8b3cffede7659533bcd124267f052133ce084224c59ba40a12109ee6d2a6c63bfdb88dfad1b1ac64ac7a73cb37a999b747de817ece812598247f290a56b01f3585428a5470ca03ae8ca22ed3be56c6b1713a683aaf4962188da61e17e3d840d2150a6a3"}]}, 0xec4}}, 0x40040) 11:51:00 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) [ 291.278251][T11768] device bond_slave_1 left promiscuous mode 11:51:00 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'syztnl0\x00', 0x0}) 11:51:00 executing program 0 (fault-call:3 fault-nth:6): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:00 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:51:00 executing program 5: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:51:00 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x5, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:00 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000018c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) [ 291.585490][T11800] device bond0 entered promiscuous mode [ 291.616797][T11800] device bond_slave_0 entered promiscuous mode 11:51:00 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x1, 0x4) 11:51:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:00 executing program 5: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x204040, 0x0) [ 291.653988][T11800] device bond_slave_1 entered promiscuous mode [ 291.684542][T11800] FAULT_INJECTION: forcing a failure. [ 291.684542][T11800] name failslab, interval 1, probability 0, space 0, times 0 [ 291.731319][T11800] CPU: 1 PID: 11800 Comm: syz-executor.0 Not tainted 5.10.0-rc6-syzkaller #0 [ 291.740107][T11800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.750167][T11800] Call Trace: [ 291.753476][T11800] dump_stack+0x107/0x163 [ 291.757822][T11800] should_fail.cold+0x5/0xa [ 291.762342][T11800] should_failslab+0x5/0x10 [ 291.766856][T11800] kmem_cache_alloc_node+0x62/0x520 [ 291.772076][T11800] __alloc_skb+0x71/0x550 [ 291.776425][T11800] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 291.781729][T11800] rtmsg_ifinfo+0x83/0x120 [ 291.786173][T11800] __dev_notify_flags+0x226/0x2b0 [ 291.791208][T11800] ? dev_change_name+0x690/0x690 [ 291.796160][T11800] ? record_print_text.cold+0x16/0x16 [ 291.801546][T11800] ? dev_set_promiscuity+0x119/0x150 [ 291.806855][T11800] __dev_set_promiscuity+0x197/0x210 [ 291.812157][T11800] dev_set_promiscuity+0x4f/0x150 [ 291.817198][T11800] bond_change_rx_flags+0x220/0x6e0 [ 291.822411][T11800] ? bond_time_in_interval.isra.0+0xc0/0xc0 [ 291.828466][T11800] ? fs_reclaim_release+0x90/0xd0 [ 291.833510][T11800] ? bond_time_in_interval.isra.0+0xc0/0xc0 [ 291.839417][T11800] __dev_set_promiscuity.cold+0x2f1/0x35f [ 291.845158][T11800] dev_set_promiscuity+0x4f/0x150 [ 291.850199][T11800] packet_dev_mc+0x73/0x290 [ 291.854720][T11800] packet_setsockopt+0x26b8/0x3950 [ 291.859843][T11800] ? find_held_lock+0x2d/0x110 [ 291.864625][T11800] ? sock_has_perm+0x120/0x280 [ 291.869398][T11800] ? packet_bind+0x1b0/0x1b0 [ 291.873999][T11800] ? find_held_lock+0x2d/0x110 [ 291.878774][T11800] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 291.885110][T11800] ? selinux_netlbl_sock_rcv_skb+0x530/0x530 [ 291.891105][T11800] ? __fget_files+0x294/0x400 [ 291.895801][T11800] ? selinux_socket_setsockopt+0x6a/0x80 [ 291.901450][T11800] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 291.907007][T11800] __sys_setsockopt+0x2db/0x610 [ 291.911871][T11800] ? packet_bind+0x1b0/0x1b0 [ 291.916468][T11800] ? __ia32_sys_recv+0x100/0x100 [ 291.921423][T11800] ? vfs_write+0x18e/0xa30 [ 291.925852][T11800] ? fput_many+0x2f/0x1a0 [ 291.930205][T11800] __x64_sys_setsockopt+0xba/0x150 [ 291.935330][T11800] ? syscall_enter_from_user_mode+0x1d/0x50 [ 291.941233][T11800] do_syscall_64+0x2d/0x70 [ 291.945672][T11800] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 291.951684][T11800] RIP: 0033:0x45deb9 [ 291.955590][T11800] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:51:00 executing program 5: getitimer(0x0, &(0x7f0000000100)) 11:51:00 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x7, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) [ 291.975199][T11800] RSP: 002b:00007fb03d11cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 291.983623][T11800] RAX: ffffffffffffffda RBX: 0000000000033540 RCX: 000000000045deb9 [ 291.991601][T11800] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 [ 291.999578][T11800] RBP: 00007fb03d11cca0 R08: 0000000000000010 R09: 0000000000000000 [ 292.007816][T11800] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000006 [ 292.016054][T11800] R13: 00007ffe286ba3af R14: 00007fb03d11d9c0 R15: 000000000119bf2c 11:51:01 executing program 2: pselect6(0x40, &(0x7f0000001200), &(0x7f0000001240)={0x1}, &(0x7f0000001280)={0x6}, 0x0, &(0x7f0000001340)={&(0x7f0000001300), 0x8}) [ 292.236514][T11794] device bond0 left promiscuous mode [ 292.241836][T11794] device bond_slave_0 left promiscuous mode [ 292.274706][T11794] device bond_slave_1 left promiscuous mode 11:51:01 executing program 0 (fault-call:3 fault-nth:7): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:01 executing program 3: r0 = getpgid(0x0) tgkill(0x0, r0, 0x0) 11:51:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:01 executing program 5: socketpair(0x2, 0x0, 0x7fff, 0x0) 11:51:01 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) 11:51:01 executing program 5: 11:51:01 executing program 3: 11:51:01 executing program 2: 11:51:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:01 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x9, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) [ 292.521063][T11842] device bond0 entered promiscuous mode [ 292.540295][T11842] device bond_slave_0 entered promiscuous mode [ 292.572138][T11842] device bond_slave_1 entered promiscuous mode [ 292.597393][T11842] FAULT_INJECTION: forcing a failure. [ 292.597393][T11842] name failslab, interval 1, probability 0, space 0, times 0 [ 292.672431][T11842] CPU: 0 PID: 11842 Comm: syz-executor.0 Not tainted 5.10.0-rc6-syzkaller #0 [ 292.681213][T11842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.691270][T11842] Call Trace: [ 292.694574][T11842] dump_stack+0x107/0x163 [ 292.698921][T11842] should_fail.cold+0x5/0xa [ 292.703461][T11842] should_failslab+0x5/0x10 [ 292.707982][T11842] kmem_cache_alloc_node_trace+0x68/0x560 [ 292.713720][T11842] ? rcu_read_lock_sched_held+0x3a/0x70 [ 292.719289][T11842] ? kmem_cache_alloc_node+0x41e/0x520 [ 292.724761][T11842] __kmalloc_node_track_caller+0x38/0x60 [ 292.730409][T11842] __alloc_skb+0xae/0x550 [ 292.734750][T11842] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 292.740047][T11842] rtmsg_ifinfo+0x83/0x120 [ 292.744474][T11842] __dev_notify_flags+0x226/0x2b0 [ 292.749507][T11842] ? dev_change_name+0x690/0x690 [ 292.754452][T11842] ? record_print_text.cold+0x16/0x16 [ 292.759834][T11842] ? dev_set_promiscuity+0x119/0x150 [ 292.765137][T11842] __dev_set_promiscuity+0x197/0x210 [ 292.770435][T11842] dev_set_promiscuity+0x4f/0x150 [ 292.775469][T11842] bond_change_rx_flags+0x220/0x6e0 [ 292.780674][T11842] ? bond_time_in_interval.isra.0+0xc0/0xc0 [ 292.786568][T11842] ? fs_reclaim_release+0x90/0xd0 [ 292.791600][T11842] ? bond_time_in_interval.isra.0+0xc0/0xc0 [ 292.797499][T11842] __dev_set_promiscuity.cold+0x2f1/0x35f [ 292.803231][T11842] dev_set_promiscuity+0x4f/0x150 [ 292.808270][T11842] packet_dev_mc+0x73/0x290 [ 292.812780][T11842] packet_setsockopt+0x26b8/0x3950 [ 292.817911][T11842] ? find_held_lock+0x2d/0x110 [ 292.822689][T11842] ? sock_has_perm+0x120/0x280 [ 292.827461][T11842] ? packet_bind+0x1b0/0x1b0 [ 292.832053][T11842] ? find_held_lock+0x2d/0x110 [ 292.836826][T11842] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 292.843160][T11842] ? selinux_netlbl_sock_rcv_skb+0x530/0x530 [ 292.849150][T11842] ? __fget_files+0x294/0x400 [ 292.853843][T11842] ? selinux_socket_setsockopt+0x6a/0x80 [ 292.859486][T11842] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 292.865043][T11842] __sys_setsockopt+0x2db/0x610 [ 292.869902][T11842] ? packet_bind+0x1b0/0x1b0 [ 292.874498][T11842] ? __ia32_sys_recv+0x100/0x100 [ 292.879442][T11842] ? vfs_write+0x18e/0xa30 [ 292.883868][T11842] ? fput_many+0x2f/0x1a0 [ 292.888214][T11842] __x64_sys_setsockopt+0xba/0x150 [ 292.893333][T11842] ? syscall_enter_from_user_mode+0x1d/0x50 [ 292.899234][T11842] do_syscall_64+0x2d/0x70 [ 292.903659][T11842] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 292.909562][T11842] RIP: 0033:0x45deb9 [ 292.913463][T11842] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.933066][T11842] RSP: 002b:00007fb03d11cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 292.941487][T11842] RAX: ffffffffffffffda RBX: 0000000000033540 RCX: 000000000045deb9 [ 292.949463][T11842] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 [ 292.957440][T11842] RBP: 00007fb03d11cca0 R08: 0000000000000010 R09: 0000000000000000 [ 292.965416][T11842] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000007 11:51:01 executing program 3: [ 292.973393][T11842] R13: 00007ffe286ba3af R14: 00007fb03d11d9c0 R15: 000000000119bf2c 11:51:02 executing program 0 (fault-call:3 fault-nth:8): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:02 executing program 2: 11:51:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:02 executing program 5: 11:51:02 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:02 executing program 3: [ 293.145814][T11841] device bond0 left promiscuous mode [ 293.153473][T11841] device bond_slave_0 left promiscuous mode [ 293.162459][T11841] device bond_slave_1 left promiscuous mode 11:51:02 executing program 2: 11:51:02 executing program 3: 11:51:02 executing program 5: [ 293.322781][T11867] device bond0 entered promiscuous mode [ 293.336386][T11867] device bond_slave_0 entered promiscuous mode 11:51:02 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) [ 293.367817][T11867] device bond_slave_1 entered promiscuous mode [ 293.401134][T11867] FAULT_INJECTION: forcing a failure. [ 293.401134][T11867] name failslab, interval 1, probability 0, space 0, times 0 11:51:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:02 executing program 2: [ 293.493264][T11867] CPU: 0 PID: 11867 Comm: syz-executor.0 Not tainted 5.10.0-rc6-syzkaller #0 [ 293.502056][T11867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.512119][T11867] Call Trace: [ 293.515426][T11867] dump_stack+0x107/0x163 [ 293.519775][T11867] should_fail.cold+0x5/0xa [ 293.524300][T11867] should_failslab+0x5/0x10 [ 293.528814][T11867] kmem_cache_alloc_node+0x62/0x520 [ 293.534031][T11867] __alloc_skb+0x71/0x550 [ 293.538378][T11867] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 293.543693][T11867] rtmsg_ifinfo+0x83/0x120 [ 293.548124][T11867] __dev_notify_flags+0x226/0x2b0 [ 293.553159][T11867] ? dev_change_name+0x690/0x690 [ 293.558116][T11867] ? bond_change_rx_flags+0x401/0x6e0 [ 293.563501][T11867] ? bond_time_in_interval.isra.0+0xc0/0xc0 [ 293.569402][T11867] ? fs_reclaim_release+0x90/0xd0 [ 293.574446][T11867] __dev_set_promiscuity+0x197/0x210 [ 293.579746][T11867] dev_set_promiscuity+0x4f/0x150 [ 293.584786][T11867] packet_dev_mc+0x73/0x290 [ 293.589308][T11867] packet_setsockopt+0x26b8/0x3950 [ 293.594431][T11867] ? find_held_lock+0x2d/0x110 [ 293.599218][T11867] ? sock_has_perm+0x120/0x280 [ 293.603993][T11867] ? packet_bind+0x1b0/0x1b0 [ 293.608594][T11867] ? find_held_lock+0x2d/0x110 [ 293.613372][T11867] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 293.619708][T11867] ? selinux_netlbl_sock_rcv_skb+0x530/0x530 [ 293.625705][T11867] ? __fget_files+0x294/0x400 [ 293.630399][T11867] ? selinux_socket_setsockopt+0x6a/0x80 [ 293.636043][T11867] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 293.641603][T11867] __sys_setsockopt+0x2db/0x610 [ 293.646467][T11867] ? packet_bind+0x1b0/0x1b0 [ 293.651076][T11867] ? __ia32_sys_recv+0x100/0x100 [ 293.656023][T11867] ? vfs_write+0x18e/0xa30 [ 293.660448][T11867] ? fput_many+0x2f/0x1a0 [ 293.664800][T11867] __x64_sys_setsockopt+0xba/0x150 [ 293.669921][T11867] ? syscall_enter_from_user_mode+0x1d/0x50 [ 293.675825][T11867] do_syscall_64+0x2d/0x70 [ 293.680251][T11867] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 293.686154][T11867] RIP: 0033:0x45deb9 [ 293.690054][T11867] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.709689][T11867] RSP: 002b:00007fb03d11cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 293.718126][T11867] RAX: ffffffffffffffda RBX: 0000000000033540 RCX: 000000000045deb9 [ 293.726105][T11867] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 [ 293.734090][T11867] RBP: 00007fb03d11cca0 R08: 0000000000000010 R09: 0000000000000000 [ 293.742071][T11867] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000008 [ 293.750049][T11867] R13: 00007ffe286ba3af R14: 00007fb03d11d9c0 R15: 000000000119bf2c [ 293.867565][T11863] device bond0 left promiscuous mode [ 293.872885][T11863] device bond_slave_0 left promiscuous mode [ 293.889116][T11863] device bond_slave_1 left promiscuous mode 11:51:02 executing program 0 (fault-call:3 fault-nth:9): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:02 executing program 3: 11:51:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 11:51:02 executing program 5: 11:51:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:02 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0xd, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:02 executing program 5: 11:51:03 executing program 3: 11:51:03 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0xe, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:03 executing program 2: [ 294.095661][T11891] device bond0 entered promiscuous mode [ 294.122236][T11891] device bond_slave_0 entered promiscuous mode [ 294.132968][T11891] device bond_slave_1 entered promiscuous mode [ 294.159391][T11891] FAULT_INJECTION: forcing a failure. [ 294.159391][T11891] name failslab, interval 1, probability 0, space 0, times 0 [ 294.221751][T11891] CPU: 0 PID: 11891 Comm: syz-executor.0 Not tainted 5.10.0-rc6-syzkaller #0 [ 294.230552][T11891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.240745][T11891] Call Trace: [ 294.244047][T11891] dump_stack+0x107/0x163 [ 294.248394][T11891] should_fail.cold+0x5/0xa [ 294.252917][T11891] should_failslab+0x5/0x10 [ 294.257432][T11891] kmem_cache_alloc_node+0x62/0x520 [ 294.262649][T11891] __alloc_skb+0x71/0x550 [ 294.267004][T11891] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 294.272307][T11891] rtmsg_ifinfo+0x83/0x120 [ 294.276736][T11891] __dev_notify_flags+0x226/0x2b0 [ 294.281771][T11891] ? dev_change_name+0x690/0x690 [ 294.286725][T11891] ? bond_change_rx_flags+0x401/0x6e0 [ 294.292110][T11891] ? bond_time_in_interval.isra.0+0xc0/0xc0 [ 294.298129][T11891] ? fs_reclaim_release+0x90/0xd0 [ 294.303179][T11891] __dev_set_promiscuity+0x197/0x210 [ 294.308481][T11891] dev_set_promiscuity+0x4f/0x150 [ 294.313521][T11891] packet_dev_mc+0x73/0x290 11:51:03 executing program 3: [ 294.318043][T11891] packet_setsockopt+0x26b8/0x3950 [ 294.323163][T11891] ? find_held_lock+0x2d/0x110 [ 294.329336][T11891] ? sock_has_perm+0x120/0x280 [ 294.334116][T11891] ? packet_bind+0x1b0/0x1b0 [ 294.338718][T11891] ? find_held_lock+0x2d/0x110 [ 294.343497][T11891] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 294.349835][T11891] ? selinux_netlbl_sock_rcv_skb+0x530/0x530 [ 294.355833][T11891] ? __fget_files+0x294/0x400 [ 294.360528][T11891] ? selinux_socket_setsockopt+0x6a/0x80 [ 294.366175][T11891] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 294.371733][T11891] __sys_setsockopt+0x2db/0x610 [ 294.376601][T11891] ? packet_bind+0x1b0/0x1b0 [ 294.381199][T11891] ? __ia32_sys_recv+0x100/0x100 [ 294.386154][T11891] ? vfs_write+0x18e/0xa30 [ 294.390587][T11891] ? fput_many+0x2f/0x1a0 [ 294.394938][T11891] __x64_sys_setsockopt+0xba/0x150 [ 294.400063][T11891] ? syscall_enter_from_user_mode+0x1d/0x50 [ 294.405969][T11891] do_syscall_64+0x2d/0x70 [ 294.410393][T11891] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 294.416288][T11891] RIP: 0033:0x45deb9 [ 294.420192][T11891] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.439813][T11891] RSP: 002b:00007fb03d11cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 294.448239][T11891] RAX: ffffffffffffffda RBX: 0000000000033540 RCX: 000000000045deb9 [ 294.456217][T11891] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 [ 294.464193][T11891] RBP: 00007fb03d11cca0 R08: 0000000000000010 R09: 0000000000000000 [ 294.472171][T11891] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000009 [ 294.480149][T11891] R13: 00007ffe286ba3af R14: 00007fb03d11d9c0 R15: 000000000119bf2c 11:51:03 executing program 0 (fault-call:3 fault-nth:10): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:03 executing program 3: 11:51:03 executing program 5: 11:51:03 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0xf, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:03 executing program 2: 11:51:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18b"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) [ 294.588866][T11889] device bond0 left promiscuous mode [ 294.594188][T11889] device bond_slave_0 left promiscuous mode [ 294.605887][T11889] device bond_slave_1 left promiscuous mode 11:51:03 executing program 3: 11:51:03 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x11, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:03 executing program 2: 11:51:03 executing program 5: [ 294.785863][T11913] device bond0 entered promiscuous mode 11:51:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18b"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:03 executing program 3: [ 294.834249][T11913] device bond_slave_0 entered promiscuous mode [ 294.869512][T11913] device bond_slave_1 entered promiscuous mode [ 294.901251][T11913] FAULT_INJECTION: forcing a failure. [ 294.901251][T11913] name failslab, interval 1, probability 0, space 0, times 0 [ 294.968720][T11913] CPU: 1 PID: 11913 Comm: syz-executor.0 Not tainted 5.10.0-rc6-syzkaller #0 [ 294.977510][T11913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.987572][T11913] Call Trace: [ 294.990901][T11913] dump_stack+0x107/0x163 [ 294.995242][T11913] should_fail.cold+0x5/0xa [ 294.999765][T11913] should_failslab+0x5/0x10 [ 295.004275][T11913] kmem_cache_alloc_node+0x62/0x520 [ 295.009494][T11913] __alloc_skb+0x71/0x550 [ 295.013841][T11913] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 295.019140][T11913] rtmsg_ifinfo+0x83/0x120 [ 295.023574][T11913] __dev_notify_flags+0x226/0x2b0 [ 295.028610][T11913] ? dev_change_name+0x690/0x690 [ 295.033560][T11913] ? bond_change_rx_flags+0x401/0x6e0 [ 295.038945][T11913] ? bond_time_in_interval.isra.0+0xc0/0xc0 [ 295.044843][T11913] ? fs_reclaim_release+0x90/0xd0 [ 295.049887][T11913] __dev_set_promiscuity+0x197/0x210 [ 295.055185][T11913] dev_set_promiscuity+0x4f/0x150 [ 295.060226][T11913] packet_dev_mc+0x73/0x290 [ 295.064745][T11913] packet_setsockopt+0x26b8/0x3950 [ 295.069865][T11913] ? find_held_lock+0x2d/0x110 [ 295.074647][T11913] ? sock_has_perm+0x120/0x280 [ 295.079422][T11913] ? packet_bind+0x1b0/0x1b0 [ 295.084034][T11913] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 295.090377][T11913] ? selinux_netlbl_sock_rcv_skb+0x530/0x530 [ 295.096374][T11913] ? __fget_files+0x294/0x400 [ 295.101073][T11913] ? selinux_socket_setsockopt+0x6a/0x80 [ 295.106719][T11913] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 295.112279][T11913] __sys_setsockopt+0x2db/0x610 [ 295.117142][T11913] ? packet_bind+0x1b0/0x1b0 [ 295.121738][T11913] ? __ia32_sys_recv+0x100/0x100 [ 295.126685][T11913] ? vfs_write+0x18e/0xa30 [ 295.131134][T11913] __x64_sys_setsockopt+0xba/0x150 [ 295.136257][T11913] ? syscall_enter_from_user_mode+0x1d/0x50 [ 295.142156][T11913] do_syscall_64+0x2d/0x70 [ 295.146581][T11913] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 295.152479][T11913] RIP: 0033:0x45deb9 [ 295.156381][T11913] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.175988][T11913] RSP: 002b:00007fb03d11cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 295.184420][T11913] RAX: ffffffffffffffda RBX: 0000000000033540 RCX: 000000000045deb9 [ 295.192396][T11913] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 [ 295.200375][T11913] RBP: 00007fb03d11cca0 R08: 0000000000000010 R09: 0000000000000000 [ 295.208351][T11913] R10: 0000000020000280 R11: 0000000000000246 R12: 000000000000000a [ 295.216326][T11913] R13: 00007ffe286ba3af R14: 00007fb03d11d9c0 R15: 000000000119bf2c [ 295.257405][T11912] device bond0 left promiscuous mode [ 295.262723][T11912] device bond_slave_0 left promiscuous mode [ 295.304147][T11912] device bond_slave_1 left promiscuous mode 11:51:04 executing program 0 (fault-call:3 fault-nth:11): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:04 executing program 5: 11:51:04 executing program 3: 11:51:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18b"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:04 executing program 2: 11:51:04 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x12, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1c"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:04 executing program 3: 11:51:04 executing program 2: 11:51:04 executing program 5: [ 295.503497][T11936] device bond0 entered promiscuous mode [ 295.519618][T11936] device bond_slave_0 entered promiscuous mode [ 295.540421][T11936] device bond_slave_1 entered promiscuous mode [ 295.569509][T11936] FAULT_INJECTION: forcing a failure. [ 295.569509][T11936] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 295.582718][T11936] CPU: 1 PID: 11936 Comm: syz-executor.0 Not tainted 5.10.0-rc6-syzkaller #0 [ 295.591479][T11936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.601537][T11936] Call Trace: [ 295.604843][T11936] dump_stack+0x107/0x163 [ 295.609188][T11936] should_fail.cold+0x5/0xa [ 295.613704][T11936] ? packet_setsockopt+0x26b8/0x3950 [ 295.619001][T11936] __alloc_pages_nodemask+0x189/0x730 [ 295.624385][T11936] ? __alloc_pages_slowpath.constprop.0+0x2510/0x2510 [ 295.631164][T11936] ? lock_chain_count+0x20/0x20 [ 295.636032][T11936] ? find_held_lock+0x2d/0x110 [ 295.640815][T11936] cache_grow_begin+0x71/0x420 [ 295.645595][T11936] cache_alloc_refill+0x27f/0x380 [ 295.650639][T11936] kmem_cache_alloc_node_trace+0x470/0x560 [ 295.656455][T11936] ? kmem_cache_alloc_node+0x41e/0x520 [ 295.661928][T11936] __kmalloc_node_track_caller+0x38/0x60 [ 295.667577][T11936] __alloc_skb+0xae/0x550 [ 295.671925][T11936] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 295.677226][T11936] rtmsg_ifinfo+0x83/0x120 [ 295.681657][T11936] __dev_notify_flags+0x226/0x2b0 [ 295.686698][T11936] ? dev_change_name+0x690/0x690 [ 295.691660][T11936] ? bond_change_rx_flags+0x401/0x6e0 [ 295.697045][T11936] ? bond_time_in_interval.isra.0+0xc0/0xc0 [ 295.702945][T11936] ? fs_reclaim_release+0x90/0xd0 [ 295.707999][T11936] __dev_set_promiscuity+0x197/0x210 [ 295.713299][T11936] dev_set_promiscuity+0x4f/0x150 [ 295.718341][T11936] packet_dev_mc+0x73/0x290 [ 295.722859][T11936] packet_setsockopt+0x26b8/0x3950 [ 295.727978][T11936] ? find_held_lock+0x2d/0x110 [ 295.732759][T11936] ? sock_has_perm+0x120/0x280 [ 295.737534][T11936] ? packet_bind+0x1b0/0x1b0 [ 295.742149][T11936] ? find_held_lock+0x2d/0x110 [ 295.746926][T11936] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 295.753263][T11936] ? selinux_netlbl_sock_rcv_skb+0x530/0x530 [ 295.759257][T11936] ? __fget_files+0x294/0x400 [ 295.763949][T11936] ? selinux_socket_setsockopt+0x6a/0x80 [ 295.769591][T11936] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 295.775150][T11936] __sys_setsockopt+0x2db/0x610 [ 295.780010][T11936] ? packet_bind+0x1b0/0x1b0 [ 295.784607][T11936] ? __ia32_sys_recv+0x100/0x100 [ 295.789555][T11936] ? vfs_write+0x18e/0xa30 [ 295.793981][T11936] ? fput_many+0x2f/0x1a0 [ 295.798333][T11936] __x64_sys_setsockopt+0xba/0x150 [ 295.803473][T11936] ? syscall_enter_from_user_mode+0x1d/0x50 [ 295.809376][T11936] do_syscall_64+0x2d/0x70 [ 295.813803][T11936] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 295.819700][T11936] RIP: 0033:0x45deb9 [ 295.823602][T11936] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.843212][T11936] RSP: 002b:00007fb03d11cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 295.851637][T11936] RAX: ffffffffffffffda RBX: 0000000000033540 RCX: 000000000045deb9 [ 295.859614][T11936] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 11:51:04 executing program 3: 11:51:04 executing program 3: [ 295.867591][T11936] RBP: 00007fb03d11cca0 R08: 0000000000000010 R09: 0000000000000000 [ 295.875566][T11936] R10: 0000000020000280 R11: 0000000000000246 R12: 000000000000000b [ 295.883552][T11936] R13: 00007ffe286ba3af R14: 00007fb03d11d9c0 R15: 000000000119bf2c 11:51:05 executing program 0 (fault-call:3 fault-nth:12): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:05 executing program 3: 11:51:05 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x13, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:05 executing program 5: 11:51:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1c"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:05 executing program 2: [ 296.039747][T11934] device bond0 left promiscuous mode [ 296.053171][T11934] device bond_slave_0 left promiscuous mode [ 296.063609][T11934] device bond_slave_1 left promiscuous mode 11:51:05 executing program 3: 11:51:05 executing program 2: 11:51:05 executing program 5: [ 296.247361][T11958] device bond0 entered promiscuous mode 11:51:05 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x14, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1c"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) [ 296.288759][T11958] device bond_slave_0 entered promiscuous mode [ 296.337646][T11958] device bond_slave_1 entered promiscuous mode [ 296.344232][T11958] FAULT_INJECTION: forcing a failure. [ 296.344232][T11958] name fail_usercopy, interval 1, probability 0, space 0, times 0 11:51:05 executing program 3: [ 296.428095][T11958] CPU: 1 PID: 11958 Comm: syz-executor.0 Not tainted 5.10.0-rc6-syzkaller #0 [ 296.436902][T11958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.446973][T11958] Call Trace: [ 296.450257][T11958] dump_stack+0x107/0x163 [ 296.454581][T11958] should_fail.cold+0x5/0xa [ 296.459105][T11958] _copy_to_user+0x2c/0x150 [ 296.463612][T11958] simple_read_from_buffer+0xcc/0x160 [ 296.468974][T11958] proc_fail_nth_read+0x187/0x220 [ 296.473986][T11958] ? proc_exe_link+0x1d0/0x1d0 [ 296.478758][T11958] ? security_file_permission+0x248/0x560 [ 296.484468][T11958] ? proc_exe_link+0x1d0/0x1d0 [ 296.489215][T11958] vfs_read+0x1b5/0x570 [ 296.493358][T11958] ksys_read+0x12d/0x250 [ 296.497603][T11958] ? vfs_write+0xa30/0xa30 [ 296.502022][T11958] ? syscall_enter_from_user_mode+0x1d/0x50 [ 296.507907][T11958] do_syscall_64+0x2d/0x70 [ 296.512312][T11958] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 296.518208][T11958] RIP: 0033:0x4177b1 [ 296.522088][T11958] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 296.541675][T11958] RSP: 002b:00007fb03d11cc80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 296.550075][T11958] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004177b1 [ 296.558044][T11958] RDX: 000000000000000f RSI: 00007fb03d11ccb0 RDI: 0000000000000005 [ 296.565998][T11958] RBP: 0000000000000000 R08: 0000000000000010 R09: 0000000000000000 [ 296.573950][T11958] R10: 0000000020000280 R11: 0000000000000293 R12: 000000000000000c [ 296.581903][T11958] R13: 00007ffe286ba3af R14: 00007fb03d11d9c0 R15: 000000000119bf2c 11:51:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:05 executing program 2: 11:51:05 executing program 5: 11:51:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f94535"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:05 executing program 3: 11:51:05 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x17, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) [ 296.743153][T11958] device bond0 left promiscuous mode [ 296.748742][T11958] device bond_slave_0 left promiscuous mode [ 296.755217][T11958] device bond_slave_1 left promiscuous mode 11:51:05 executing program 5: 11:51:05 executing program 2: 11:51:05 executing program 3: [ 296.896607][T11980] device bond0 entered promiscuous mode [ 296.902839][T11980] device bond_slave_0 entered promiscuous mode [ 296.924772][T11980] device bond_slave_1 entered promiscuous mode 11:51:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f94535"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) [ 296.973410][T11977] device bond0 left promiscuous mode 11:51:05 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x1b, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) [ 296.994027][T11977] device bond_slave_0 left promiscuous mode [ 297.042132][T11977] device bond_slave_1 left promiscuous mode 11:51:06 executing program 2: 11:51:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x29, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:06 executing program 5: 11:51:06 executing program 3: 11:51:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f94535"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:06 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:06 executing program 2: 11:51:06 executing program 5: 11:51:06 executing program 3: 11:51:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x106, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:06 executing program 2: 11:51:06 executing program 3: 11:51:06 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:06 executing program 5: 11:51:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x108, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:06 executing program 3: 11:51:06 executing program 2: 11:51:06 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:06 executing program 5: 11:51:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x110, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:06 executing program 2: 11:51:06 executing program 3: 11:51:06 executing program 5: 11:51:06 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x118, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:06 executing program 2: 11:51:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfe"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:07 executing program 3: 11:51:07 executing program 5: 11:51:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x125, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:07 executing program 3: 11:51:07 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfe"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:07 executing program 2: 11:51:07 executing program 5: 11:51:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x13d, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:07 executing program 3: 11:51:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfe"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:07 executing program 5: 11:51:07 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:07 executing program 3: 11:51:07 executing program 2: 11:51:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x144, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:07 executing program 2: 11:51:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @dev}}, 0x1e) 11:51:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c6"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:07 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x13, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:07 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) 11:51:07 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={0x0, @sco={0x1f, @none}, @qipcrtr, @hci, 0xff}) 11:51:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x2, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c6"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:07 executing program 5: prctl$PR_GET_PDEATHSIG(0x10, &(0x7f00000036c0)) 11:51:07 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x21, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:08 executing program 2: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/clear_refs\x00', 0x1, 0x0) write$sysctl(r0, &(0x7f0000000100)='1\x00', 0x2) 11:51:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c6"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:08 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x3, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:08 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) 11:51:08 executing program 5: 11:51:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:08 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x9c00, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x1, 0xa, 0x101}, 0x14}}, 0x0) 11:51:08 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x5, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:08 executing program 5: r0 = eventfd(0x100) read$eventfd(r0, &(0x7f0000000000), 0x8) 11:51:08 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) 11:51:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:08 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x2}]}, 0x10) 11:51:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000680)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000640)={&(0x7f0000000500)={0x4c, 0x17, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc}]}, 0x4c}}, 0x0) 11:51:08 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x7, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getpeername(r0, &(0x7f0000000040)=@alg, &(0x7f00000000c0)=0x80) 11:51:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:08 executing program 2: syz_open_dev$cec(&(0x7f0000000fc0)='/dev/cec#\x00', 0x1, 0x2) 11:51:08 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) 11:51:08 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x3}]}, 0x10) 11:51:08 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x8, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:08 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @bcast, @bcast, @rose, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) listen(r0, 0x0) accept(r0, 0x0, 0x0) 11:51:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000042c0)=[{{&(0x7f0000000740)={0xa, 0x4e23, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x7ffffff7) 11:51:08 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x4}]}, 0x10) 11:51:08 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x9, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:09 executing program 2: pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180), 0x0) 11:51:09 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:09 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @bcast, @bcast, @rose, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) listen(r0, 0x0) accept(r0, 0x0, 0x0) 11:51:09 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5}]}, 0x10) 11:51:09 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0xa, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) bind(r0, 0x0, 0x0) fdatasync(r0) r1 = shmget(0x0, 0x1000, 0x780012c9, &(0x7f0000ffa000/0x1000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, &(0x7f0000000240)) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) clone(0x24300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$bsg(0xffffff9c, 0x0, 0x1, 0x0) write$P9_RAUTH(r2, &(0x7f0000000180)={0x14, 0x67, 0x2, {0x80}}, 0x14) r3 = timerfd_create(0x0, 0x0) pread64(r3, &(0x7f00000000c0)=""/12, 0xc, 0x8) mount(&(0x7f0000000400)=ANY=[@ANYRES16, @ANYRES32=r3, @ANYRESDEC=r1, @ANYRES64, @ANYBLOB="3d48137b6a9f0973c1e156857427a6b743b3a7b21b03b0d16767048f7a2d8350e49ad9d4e0f640caa781556cde0e9d7a47b29e53646f3526f2bba6d6854e3e7f07a12e5023c8aa8ce1fa9b4bb2cbaf78adf04ccc", @ANYRESDEC=r1], &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='befs\x00', 0x0, 0x0) 11:51:09 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:09 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x7}]}, 0x10) 11:51:09 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0xc, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:09 executing program 5: prctl$PR_GET_PDEATHSIG(0x24, 0x0) [ 300.622814][ T2975] blk_update_request: I/O error, dev loop4, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 11:51:09 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0xd, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:09 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:09 executing program 2: r0 = syz_usbip_server_init(0x0) write$usbip_server(r0, 0x0, 0x0) 11:51:09 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x8}]}, 0x10) 11:51:09 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000180)) 11:51:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) [ 300.934639][T12213] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 11:51:09 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x9}]}, 0x10) 11:51:09 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0xe, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000680)={&(0x7f00000004c0), 0xc, &(0x7f0000000640)={&(0x7f0000000500)={0x40, 0x17, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc}]}, 0x40}}, 0x0) 11:51:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:10 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:10 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0xf, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:10 executing program 5: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x0, 0x0) prctl$PR_GET_PDEATHSIG(0x19, &(0x7f00000036c0)) 11:51:10 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xc}]}, 0x10) 11:51:10 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) 11:51:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:10 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:10 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x10, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:10 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x14}]}, 0x10) 11:51:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40008007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 301.480524][T12213] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 301.617145][T12252] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 11:51:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:10 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, &(0x7f0000000100)) 11:51:10 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x11, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:10 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:10 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x15}]}, 0x10) 11:51:10 executing program 5: bpf$LINK_GET_NEXT_ID(0xe, 0x0, 0x0) 11:51:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:10 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x12, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:10 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, 0x0, 0x0, 0x0, 0x4) 11:51:10 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) 11:51:10 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:11 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001c40)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 11:51:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) 11:51:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x13, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000)=0x7fff, 0x4) 11:51:11 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x1c}]}, 0x10) 11:51:11 executing program 3: write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:11 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x1d}]}, 0x10) 11:51:11 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$l2tp(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000700)='system.posix_acl_access\x00', &(0x7f0000002ac0), 0x24, 0x0) 11:51:11 executing program 2: prctl$PR_GET_PDEATHSIG(0x21, &(0x7f00000036c0)) 11:51:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) 11:51:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x14, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @dev, 0x8001}], 0x1c) 11:51:11 executing program 3: write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:11 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x21}]}, 0x10) 11:51:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x16, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:11 executing program 2: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x0, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000036c0)) 11:51:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) 11:51:11 executing program 3: write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:11 executing program 5: inotify_add_watch(0xffffffffffffffff, 0x0, 0x21000003) 11:51:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x17, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:11 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x24}]}, 0x10) 11:51:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:11 executing program 3: mkdir(0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:11 executing program 2: prctl$PR_GET_PDEATHSIG(0x27, &(0x7f00000036c0)) 11:51:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x0) 11:51:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x18, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) [ 303.029996][T12347] "syz-executor.5" (12347) uses obsolete ecb(arc4) skcipher 11:51:12 executing program 2: pselect6(0x40, &(0x7f0000000280), &(0x7f00000002c0)={0x8001}, &(0x7f0000000300), &(0x7f0000000340)={0x77359400}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x5]}, 0x8}) 11:51:12 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x25}]}, 0x10) 11:51:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) [ 303.078793][T12347] "syz-executor.5" (12347) uses obsolete ecb(arc4) skcipher 11:51:12 executing program 3: mkdir(0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x25, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:12 executing program 5: syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x0, 0x410200) 11:51:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 11:51:12 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x28}]}, 0x10) 11:51:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28}, 0x10) 11:51:12 executing program 3: mkdir(0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:12 executing program 5: prctl$PR_GET_PDEATHSIG(0x17, 0x0) 11:51:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x3d, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="40000000170a0102000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x24020851}, 0x20040000) 11:51:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) 11:51:12 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:12 executing program 5: socketpair(0x1e, 0x0, 0x100000, &(0x7f0000000080)) 11:51:12 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x2c}]}, 0x10) [ 303.586657][T12384] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 11:51:12 executing program 2: openat$vcsu(0xffffffffffffff9c, &(0x7f00000040c0)='/dev/vcsu\x00', 0x42c1, 0x0) 11:51:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x44, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:12 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) 11:51:12 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000100)="1f04f853de748f70cc950a4104cac759", 0x10) 11:51:12 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x2d}]}, 0x10) 11:51:12 executing program 2: prctl$PR_GET_PDEATHSIG(0x16, 0x0) 11:51:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x63, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:12 executing program 5: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r0) 11:51:12 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) 11:51:13 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x30}]}, 0x10) 11:51:13 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000000c0)=0xfffd) 11:51:13 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x300, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 11:51:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 11:51:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) 11:51:13 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x34}]}, 0x10) 11:51:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x3bb, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:13 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 11:51:13 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f00000002c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff7e) 11:51:13 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x35}]}, 0x10) 11:51:13 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:13 executing program 2: prctl$PR_GET_PDEATHSIG(0x1c, &(0x7f00000036c0)) 11:51:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x3c2, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) [ 304.748145][ T34] audit: type=1804 audit(1606909873.654:17): pid=12457 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir780382796/syzkaller.S5pTQy/182/bus" dev="sda1" ino=16078 res=1 errno=0 11:51:13 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x3c}]}, 0x10) 11:51:13 executing program 2: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000040)=0x5) 11:51:13 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0xc00e, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) 11:51:14 executing program 2: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000001140)='/dev/input/mice\x00', 0x0) read$proc_mixer(r0, 0x0, 0x0) [ 305.463761][ T34] audit: type=1804 audit(1606909874.374:18): pid=12460 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir780382796/syzkaller.S5pTQy/182/bus" dev="sda1" ino=16078 res=1 errno=0 [ 305.512759][ T34] audit: type=1804 audit(1606909874.394:19): pid=12460 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir780382796/syzkaller.S5pTQy/182/bus" dev="sda1" ino=16078 res=1 errno=0 [ 305.552632][ T34] audit: type=1804 audit(1606909874.454:20): pid=12457 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir780382796/syzkaller.S5pTQy/182/bus" dev="sda1" ino=16078 res=1 errno=0 11:51:14 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000004f00)={&(0x7f0000002b80)={0x10, 0x0, 0x0, 0xa80401}, 0xc, &(0x7f0000004ec0)={0x0}}, 0x0) 11:51:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) 11:51:14 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x3d}]}, 0x10) 11:51:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x7ffffff2, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:14 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x7ffffff8, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) 11:51:14 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:14 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x44}]}, 0x10) 11:51:14 executing program 5: prctl$PR_GET_PDEATHSIG(0x19, &(0x7f00000036c0)) 11:51:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x7ffffff9, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x0, 0x0}, 0x10) 11:51:15 executing program 5: process_vm_writev(0x0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/114, 0x72}], 0x1, &(0x7f0000002b80)=[{0x0}, {0x0}], 0x2, 0x0) 11:51:15 executing program 2: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000001140)='/dev/input/mice\x00', 0x0) read$proc_mixer(r0, 0x0, 0x0) 11:51:15 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x2, 0x6}, 0x10) 11:51:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x45}]}, 0x10) 11:51:15 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 11:51:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x48}]}, 0x10) 11:51:15 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x0, 0x0}, 0x10) 11:51:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x3, 0x6}, 0x10) [ 306.445212][T12543] device bond_slave_0 entered promiscuous mode [ 306.451793][T12543] device bond_slave_1 entered promiscuous mode 11:51:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, 0x0) 11:51:15 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) [ 306.505610][T12539] device bond_slave_0 left promiscuous mode [ 306.511791][T12539] device bond_slave_1 left promiscuous mode 11:51:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae66000800009c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_find_delalloc_range\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x0, 0x0}, 0x10) 11:51:16 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x880) 11:51:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x4c}]}, 0x10) 11:51:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x5, 0x6}, 0x10) 11:51:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @loopback}}) 11:51:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x1, 0x4) 11:51:16 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:16 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) 11:51:16 executing program 5: prctl$PR_GET_PDEATHSIG(0x18, 0x0) 11:51:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x7, 0x6}, 0x10) 11:51:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x4d}]}, 0x10) 11:51:16 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x0, 0x0) mmap$snddsp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x10, r0, 0x0) 11:51:16 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) 11:51:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340), 0x4) 11:51:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x8, 0x6}, 0x10) 11:51:16 executing program 2: openat$mice(0xffffffffffffff9c, &(0x7f0000001140)='/dev/input/mice\x00', 0x0) 11:51:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x50}]}, 0x10) 11:51:16 executing program 1: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x40042, 0x0) 11:51:16 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x2) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) 11:51:16 executing program 5: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socketpair(0xb, 0x0, 0x0, &(0x7f0000000180)) 11:51:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x9, 0x6}, 0x10) 11:51:16 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$pptp(0xffffffffffffffff, 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) syz_genetlink_get_family_id$batadv(&(0x7f0000001340)='batadv\x00') clock_getres(0x6, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000001480)='tls\x00', 0x4) syz_genetlink_get_family_id$l2tp(&(0x7f0000001600)='l2tp\x00') 11:51:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) 11:51:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x54}]}, 0x10) 11:51:16 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x2) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) 11:51:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@updsa={0x138, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@local, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 11:51:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0xa, 0x6}, 0x10) 11:51:16 executing program 1: clock_getres(0x0, &(0x7f0000001440)) 11:51:16 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x8}) 11:51:16 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x2) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) 11:51:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5c}]}, 0x10) 11:51:17 executing program 1: prctl$PR_GET_PDEATHSIG(0x1c, 0x0) 11:51:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0xc, 0x6}, 0x10) 11:51:17 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 11:51:17 executing program 5: syz_mount_image$btrfs(&(0x7f00000001c0)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[]) 11:51:17 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0) 11:51:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x60}]}, 0x10) 11:51:17 executing program 1: socketpair(0xf, 0x3, 0x2, &(0x7f0000000c40)) 11:51:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0xd, 0x6}, 0x10) 11:51:17 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{&(0x7f00000005c0)="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", 0x1fc, 0x4}]) 11:51:17 executing program 5: socket$l2tp(0x2, 0x2, 0x73) openat$mice(0xffffffffffffff9c, &(0x7f0000001140)='/dev/input/mice\x00', 0x0) 11:51:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x61}]}, 0x10) 11:51:17 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0) 11:51:17 executing program 1: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x0, 0x0) prctl$PR_GET_PDEATHSIG(0x25, &(0x7f00000036c0)) 11:51:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0xe, 0x6}, 0x10) [ 308.635513][T12662] Dev loop2: unable to read RDB block 1 [ 308.655446][T12662] loop2: unable to read partition table [ 308.673232][T12662] loop2: partition table beyond EOD, truncated [ 308.679589][T12662] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 11:51:17 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x3938700}, &(0x7f0000000340)={&(0x7f00000002c0)={[0x1]}, 0x8}) 11:51:17 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000080)={0x2}) 11:51:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x64}]}, 0x10) 11:51:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0xf, 0x6}, 0x10) [ 308.793993][T12662] Dev loop2: unable to read RDB block 1 [ 308.799915][T12662] loop2: unable to read partition table [ 308.812450][T12662] loop2: partition table beyond EOD, truncated [ 308.825807][T12662] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 11:51:17 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0) 11:51:17 executing program 1: setgroups(0x0, 0x0) prctl$PR_GET_PDEATHSIG(0x8, 0x0) 11:51:17 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000540)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, 0x0) 11:51:17 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/cgroup\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 11:51:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6c}]}, 0x10) 11:51:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x10, 0x6}, 0x10) 11:51:18 executing program 1: syz_open_dev$binderN(&(0x7f0000000200)='/dev/binder#\x00', 0x0, 0x0) 11:51:18 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/seq/clients\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000080)=[{{0x0, 0x3e, &(0x7f00000018c0)=[{&(0x7f00000001c0)=""/167, 0xa7}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) preadv(r0, &(0x7f00000017c0), 0x4b, 0x0, 0x0) 11:51:18 executing program 2: mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)) 11:51:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x74}]}, 0x10) 11:51:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000042c0)=[{{&(0x7f0000000740)={0xa, 0x4e23, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000c80)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000e80)=[@pktinfo={{0x20, 0x29, 0x34, {@local}}}], 0x20}}], 0x2, 0x0) 11:51:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x11, 0x6}, 0x10) 11:51:18 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000380)={0x0, 0x1}) 11:51:18 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="d400000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e24000005001600020000000500170000000000050008000000000008000600ac"], 0xd4}}, 0x0) r0 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x40000000000024a, 0x0) 11:51:18 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x28983, 0x0) read$FUSE(r0, 0x0, 0x0) 11:51:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x7c}]}, 0x10) [ 309.551773][T12728] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 11:51:18 executing program 2: 11:51:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x84}]}, 0x10) 11:51:18 executing program 5: 11:51:18 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000380)={0x0, 0x1}) 11:51:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x12, 0x6}, 0x10) 11:51:18 executing program 2: [ 309.753030][T12746] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 11:51:18 executing program 5: 11:51:18 executing program 3: 11:51:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x87}]}, 0x10) 11:51:18 executing program 1: 11:51:18 executing program 2: 11:51:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x13, 0x6}, 0x10) 11:51:18 executing program 5: 11:51:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x94}]}, 0x10) 11:51:19 executing program 3: 11:51:19 executing program 2: 11:51:19 executing program 5: 11:51:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x14, 0x6}, 0x10) 11:51:19 executing program 3: 11:51:19 executing program 2: 11:51:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x9c}]}, 0x10) 11:51:19 executing program 1: 11:51:19 executing program 5: 11:51:19 executing program 2: 11:51:19 executing program 3: 11:51:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x16, 0x6}, 0x10) 11:51:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xa4}]}, 0x10) 11:51:19 executing program 2: 11:51:19 executing program 5: 11:51:19 executing program 3: 11:51:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xac}]}, 0x10) 11:51:19 executing program 1: 11:51:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x17, 0x6}, 0x10) 11:51:19 executing program 3: 11:51:19 executing program 2: 11:51:19 executing program 5: 11:51:19 executing program 1: 11:51:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x18, 0x6}, 0x10) 11:51:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xb1}]}, 0x10) 11:51:19 executing program 5: 11:51:19 executing program 3: 11:51:19 executing program 2: 11:51:20 executing program 1: 11:51:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:20 executing program 5: 11:51:20 executing program 3: 11:51:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x25, 0x6}, 0x10) 11:51:20 executing program 2: 11:51:20 executing program 1: 11:51:20 executing program 5: 11:51:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x2}]}, 0x10) 11:51:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x3d, 0x6}, 0x10) 11:51:20 executing program 3: 11:51:20 executing program 2: 11:51:20 executing program 1: 11:51:20 executing program 5: 11:51:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x5}]}, 0x10) 11:51:20 executing program 3: 11:51:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x44, 0x6}, 0x10) 11:51:20 executing program 2: 11:51:20 executing program 1: 11:51:20 executing program 5: 11:51:20 executing program 3: 11:51:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x6}]}, 0x10) 11:51:20 executing program 2: 11:51:20 executing program 1: 11:51:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x63, 0x6}, 0x10) 11:51:20 executing program 5: 11:51:21 executing program 3: 11:51:21 executing program 1: 11:51:21 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x7}]}, 0x10) 11:51:21 executing program 2: 11:51:21 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x300, 0x6}, 0x10) 11:51:21 executing program 5: 11:51:21 executing program 3: 11:51:21 executing program 1: 11:51:21 executing program 2: 11:51:21 executing program 5: 11:51:21 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x8}]}, 0x10) 11:51:21 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x3bb, 0x6}, 0x10) 11:51:21 executing program 3: 11:51:21 executing program 1: 11:51:21 executing program 5: 11:51:21 executing program 2: 11:51:21 executing program 3: 11:51:21 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x9}]}, 0x10) 11:51:21 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x3c2, 0x6}, 0x10) 11:51:21 executing program 5: 11:51:21 executing program 1: 11:51:21 executing program 2: 11:51:21 executing program 3: 11:51:21 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0xc00e, 0x6}, 0x10) 11:51:21 executing program 1: 11:51:21 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x1b}]}, 0x10) 11:51:21 executing program 5: 11:51:21 executing program 3: 11:51:21 executing program 2: 11:51:22 executing program 1: 11:51:22 executing program 2: 11:51:22 executing program 3: 11:51:22 executing program 5: 11:51:22 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x3e}]}, 0x10) 11:51:22 executing program 1: 11:51:22 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x60}]}, 0x10) 11:51:22 executing program 5: 11:51:22 executing program 2: 11:51:22 executing program 3: 11:51:22 executing program 1: 11:51:22 executing program 2: 11:51:22 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x70}]}, 0x10) 11:51:22 executing program 5: 11:51:22 executing program 3: 11:51:22 executing program 1: 11:51:22 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x5}, 0x10) 11:51:22 executing program 2: 11:51:22 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0xfc}]}, 0x10) [ 313.746238][T12940] device bond0 entered promiscuous mode [ 313.777248][T12940] device bond_slave_0 entered promiscuous mode 11:51:22 executing program 1: 11:51:22 executing program 3: 11:51:22 executing program 5: [ 313.807343][T12940] device bond_slave_1 entered promiscuous mode 11:51:22 executing program 2: [ 313.855798][T12936] device bond0 left promiscuous mode [ 313.864356][T12936] device bond_slave_0 left promiscuous mode 11:51:22 executing program 1: [ 313.911024][T12936] device bond_slave_1 left promiscuous mode [ 313.937801][T12940] device bond0 entered promiscuous mode [ 313.946074][T12940] device bond_slave_0 entered promiscuous mode 11:51:22 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0xff}]}, 0x10) [ 313.969637][T12940] device bond_slave_1 entered promiscuous mode [ 313.997172][T12940] device bond0 left promiscuous mode 11:51:22 executing program 5: 11:51:22 executing program 2: 11:51:22 executing program 3: [ 314.027225][T12940] device bond_slave_0 left promiscuous mode [ 314.077255][T12940] device bond_slave_1 left promiscuous mode 11:51:23 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x7}, 0x10) 11:51:23 executing program 1: 11:51:23 executing program 5: 11:51:23 executing program 2: 11:51:23 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:23 executing program 3: 11:51:23 executing program 1: 11:51:23 executing program 2: 11:51:23 executing program 5: 11:51:23 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x2}]}, 0x10) 11:51:23 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x8}, 0x10) 11:51:23 executing program 3: 11:51:23 executing program 1: 11:51:23 executing program 5: 11:51:23 executing program 2: 11:51:23 executing program 3: 11:51:23 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x9}, 0x10) 11:51:23 executing program 1: 11:51:23 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x5}]}, 0x10) 11:51:23 executing program 5: 11:51:23 executing program 2: 11:51:23 executing program 3: 11:51:23 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x10}, 0x10) 11:51:23 executing program 1: 11:51:23 executing program 5: 11:51:23 executing program 2: 11:51:23 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x6}]}, 0x10) 11:51:23 executing program 3: 11:51:24 executing program 1: 11:51:24 executing program 2: 11:51:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x7}]}, 0x10) 11:51:24 executing program 5: 11:51:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x18}, 0x10) 11:51:24 executing program 3: 11:51:24 executing program 2: 11:51:24 executing program 1: 11:51:24 executing program 3: 11:51:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x8}]}, 0x10) 11:51:24 executing program 5: 11:51:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x25}, 0x10) 11:51:24 executing program 1: 11:51:24 executing program 2: 11:51:24 executing program 5: 11:51:24 executing program 3: 11:51:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x9}]}, 0x10) 11:51:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x3d}, 0x10) 11:51:24 executing program 1: 11:51:24 executing program 3: 11:51:24 executing program 5: 11:51:24 executing program 2: 11:51:24 executing program 1: 11:51:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x44}, 0x10) 11:51:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x1b}]}, 0x10) 11:51:24 executing program 3: 11:51:24 executing program 5: 11:51:24 executing program 2: 11:51:24 executing program 1: 11:51:25 executing program 2: 11:51:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 11:51:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x3e}]}, 0x10) 11:51:25 executing program 3: 11:51:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x80, 0x5, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 11:51:25 executing program 1: bpf$MAP_CREATE(0x9, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) [ 316.190209][T13055] device bond0 entered promiscuous mode [ 316.209785][T13055] device bond_slave_0 entered promiscuous mode [ 316.235830][T13055] device bond_slave_1 entered promiscuous mode 11:51:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5450, 0x0) 11:51:25 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000300)={'batadv0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d616376746170000400028008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4], 0x44}}, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, 0x0) [ 316.267483][T13053] device bond0 left promiscuous mode [ 316.275032][T13053] device bond_slave_0 left promiscuous mode [ 316.301881][T13053] device bond_slave_1 left promiscuous mode 11:51:25 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="4602f80690c6"}, 0x14) 11:51:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x60}]}, 0x10) [ 316.364433][T13055] device bond0 entered promiscuous mode [ 316.378230][T13055] device bond_slave_0 entered promiscuous mode [ 316.417113][T13055] device bond_slave_1 entered promiscuous mode [ 316.454965][T13055] device bond0 left promiscuous mode 11:51:25 executing program 1: 11:51:25 executing program 2: r0 = getpid() process_vm_readv(r0, &(0x7f0000000580)=[{&(0x7f00000001c0)=""/80, 0x50}, {&(0x7f0000000240)=""/29, 0x1d}, {&(0x7f0000000280)=""/224, 0xe0}, {&(0x7f0000000380)=""/156, 0x9c}, {&(0x7f0000000440)=""/5, 0x5}, {&(0x7f0000000480)=""/49, 0x3d}, {&(0x7f00000004c0)=""/192, 0xc0}], 0x7, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/228, 0xe4}], 0xc, 0x0) [ 316.481839][T13055] device bond_slave_0 left promiscuous mode [ 316.504327][T13055] device bond_slave_1 left promiscuous mode [ 316.533639][T13070] batman_adv: batadv0: Adding interface: macvtap1 11:51:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x70}]}, 0x10) 11:51:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6, @empty=[0x2]}, 0x10) 11:51:25 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)) [ 316.569853][T13070] batman_adv: batadv0: The MTU of interface macvtap1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 11:51:25 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, &(0x7f0000000600)=[{{&(0x7f0000000040)=@ipx, 0x80, 0x0}}], 0x1, 0x0, &(0x7f0000000640)) 11:51:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000005440)={'syztnl2\x00', 0x0}) [ 316.702362][T13070] batman_adv: batadv0: Not using interface macvtap1 (retrying later): interface not active 11:51:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0xfc}]}, 0x10) 11:51:25 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) sendmmsg$alg(r1, &(0x7f0000002700)=[{0x1000000000000000, 0x0, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)="0272f8e661d82e2f7a19243ccd5cef7165de1e59931f71baa88f", 0x1a}, {0x0}, {&(0x7f0000002900)="c9", 0x7fffefe6}], 0x3}], 0x7fffefe6, 0x0) [ 316.751533][T13084] device bond0 entered promiscuous mode [ 316.757950][T13084] device bond_slave_0 entered promiscuous mode [ 316.791168][T13084] device bond_slave_1 entered promiscuous mode [ 316.825663][T13073] batman_adv: batadv0: Adding interface: macvtap2 [ 316.864882][T13073] batman_adv: batadv0: The MTU of interface macvtap2 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 11:51:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x4c}}, 0x0) 11:51:25 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) sendmmsg$alg(r1, &(0x7f0000002700)=[{0x1000000000000000, 0x0, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)="0272f8e661d82e2f7a19243ccd5cef7165de1e59931f71baa88f", 0x1a}, {0x0}, {&(0x7f0000002900)="c9", 0x7fffefe6}], 0x3}], 0x7fffefe6, 0x0) 11:51:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0xff}]}, 0x10) [ 316.979451][T13073] batman_adv: batadv0: Not using interface macvtap2 (retrying later): interface not active [ 317.015467][T13080] device bond0 left promiscuous mode [ 317.020916][T13080] device bond_slave_0 left promiscuous mode [ 317.054550][T13080] device bond_slave_1 left promiscuous mode 11:51:26 executing program 2: faccessat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) 11:51:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6, @empty=[0x3]}, 0x10) 11:51:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 11:51:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8924, &(0x7f0000000240)={'batadv0\x00'}) 11:51:26 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) sendmmsg$alg(r1, &(0x7f0000002700)=[{0x1000000000000000, 0x0, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)="0272f8e661d82e2f7a19243ccd5cef7165de1e59931f71baa88f", 0x1a}, {0x0}, {&(0x7f0000002900)="c9", 0x7fffefe6}], 0x3}], 0x7fffefe6, 0x0) [ 317.285261][T13118] device bond0 entered promiscuous mode [ 317.313374][T13118] device bond_slave_0 entered promiscuous mode [ 317.346495][T13118] device bond_slave_1 entered promiscuous mode [ 317.385284][T13113] device bond0 left promiscuous mode 11:51:26 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000300)={'batadv0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d616376746170000400028008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB], 0x44}}, 0x0) 11:51:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="139b0000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001580)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb, 0x1, 'mqprio\x00'}, {0x58, 0x2, {{0x1}}}}]}, 0x88}}, 0x0) 11:51:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2}]}, 0x10) 11:51:26 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0xfffffffd, 0x0, 0x1}, 0x40) [ 317.402204][T13113] device bond_slave_0 left promiscuous mode [ 317.429139][T13113] device bond_slave_1 left promiscuous mode 11:51:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000a40)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2, 0x7}, 0x1c, 0x0}}], 0x1, 0xffffff7f) [ 317.480042][T13126] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 11:51:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000700)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @local, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@dstopts_2292={{0x14}}], 0x14}}], 0x1, 0x0) 11:51:26 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x541b, 0x0) 11:51:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) [ 317.643521][T13126] device bond1 entered promiscuous mode [ 317.690445][T13126] 8021q: adding VLAN 0 to HW filter on device bond1 [ 317.710509][T13118] device bond0 entered promiscuous mode [ 317.723818][T13118] device bond_slave_0 entered promiscuous mode [ 317.739704][T13118] device bond_slave_1 entered promiscuous mode [ 317.758142][T13132] batman_adv: batadv0: Adding interface: macvtap1 [ 317.790145][T13132] batman_adv: batadv0: The MTU of interface macvtap1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.864337][T13132] batman_adv: batadv0: Not using interface macvtap1 (retrying later): interface not active [ 317.901647][T13118] device bond0 left promiscuous mode [ 317.922013][T13118] device bond_slave_0 left promiscuous mode [ 317.929420][T13118] device bond_slave_1 left promiscuous mode [ 317.939267][T13133] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 11:51:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6, @empty=[0x4]}, 0x10) 11:51:26 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x14}, 0x40) 11:51:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) 11:51:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)={0x8001, 0x7, 0x3, 0x3, 0xb, "767a852da5a65782"}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000280)={0x0, 0x1003}, 0x4) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, 0x0) r4 = socket(0x400000000000010, 0x2, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00') sync() ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010aefd, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) [ 317.966145][T13181] batman_adv: batadv0: Adding interface: macvtap2 [ 317.982756][T13181] batman_adv: batadv0: The MTU of interface macvtap2 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 318.008910][T13181] batman_adv: batadv0: Not using interface macvtap2 (retrying later): interface not active 11:51:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2}, 0x40) 11:51:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x891d, &(0x7f0000000240)={'batadv0\x00'}) 11:51:27 executing program 5: add_key$fscrypt_v1(&(0x7f0000000640)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 318.153247][T13191] device bond0 entered promiscuous mode [ 318.158830][T13191] device bond_slave_0 entered promiscuous mode 11:51:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7}]}, 0x10) [ 318.207217][T13191] device bond_slave_1 entered promiscuous mode 11:51:27 executing program 2: keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffa) 11:51:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000004c0)={'batadv_slave_1\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r1}, 0x40) 11:51:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) 11:51:27 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3, 0x1c) [ 318.477527][T13190] device bond0 left promiscuous mode [ 318.490001][T13190] device bond_slave_0 left promiscuous mode [ 318.532241][T13190] device bond_slave_1 left promiscuous mode 11:51:27 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6, @empty=[0x5]}, 0x10) 11:51:27 executing program 2: r0 = memfd_create(&(0x7f0000000000)='J6\x8a\xa9\x16\x11Ou\x9b\x94a\xac\x00\x00\x00\x00\x00\x00\x00\xe6a\xe5\xa3v\x9d\xd2\xd0\xf4\xa7jq\xcc\xf5\xc8\xbd\xdd\xb5\x02bB]-\xc1\xc1\x10\x9a\xfd\xb1\xc4\xc6\x8a\xd0\xe9\xc7Q\xb6\xd5Y-\xaf\x93\x8cnw{\xe3*B\x85\xfdh\x18O\xc2\xd6XI\xa7W\x93\xe3Q\x1e\x10O$w\xae\xee\xe5\x01@Z\x8cb\x81N3g{\xca\x80\xe9d\x98\x8c*\x16\xb4d\xf17(\xf2\v\xc3\b\xdbU\n\x89oj\x94\xc9\xf3\x82\x0fz\rC\xd4\x8a\x1b\xc77\xd1Cg\xb4\x8dAe\xaa\xa4a\x154\x12b\xad\xe6\xa9\x1eA\x1ce\xa0CJ\xe4\xd2\x93\x83\x9d\xec\xe3/v\xa9\x04L\xc5\xc5WG\x15t(\x1b-X\x0ec\xee05\xd6lZ\x0e\x9d\xb3\xd4\x98M\xdd)\xb9U\x94\xd7\xc0J;\xcc\x8f\"7*\x1a\xf0\xa21\xb4I\xe4\'_>\x19\x94\x81\xadp\x00)8\x03\x97\x89\xd09h\xf5w\fC7\x83d\xf6\x0e\xd8\x11(tX\x11\xdf\x14\x87\x84>\xc5[ 6\x05\x0f\f\x84\x0fl\xe5\x17s\x01\xd1\xa2\xcc\xf7\xc2\xac\x04\xe8\x15\x9dt\xbc\x03\x16\xa9a\x9e\xd7\x01GPr\xf1\xa7Xr\x1c\r\x0f;\x00\x00\xb9\xca\x81\xbay\x83\xda\x0e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00g\xb1\xabI\xde\x87\x16\xc3I\xc5w(\xd8\xd6\xbd\xba\xffSq\xed\xe0\xdf\xc3\x03\x95\x11\x01\xd1\xb9\xa2e\xc5`\x15\xf7\xf3Cp\xdc\x84)\x02\xb3\xbae\xcd\xb5\x84>\x12\xf5\xf9\x98a\xf9LPkn\xb8\xdd\xfe\x05B\xec\xefz\xb9\x11\xd8O\xda\xb2$\x95y+\xef\xddL\x1dg\xb6N\xbb\x1e\xa8\xd5}\xdcA\x13\xa1\xaa\xb7\xe3\xfa\x92jNf\x82\xb7\xc1\x87QF6\x19\x97o\x1d\xc3{.A\xf3\x96\xc6e_ \x0f\xe4!\xdbnA\xbe\x84\x17\x15\xa5\xb8\x03\x12Z!o\x89\x9d\xcc?W\x00\xb2\xa5\xcdUk\xe6\xb5\"\xb2\x82q\x9c[}\x16\x14\x97s\xba\xae\xcc\x11\t\xe0\xd5\x01\x99\xd9\xb7\xda#\xc3\x927\xa2\x1e\x06\xb8c\x0e\xacIK\xf2eJ\xf6\v\x19x\x98\xfcO\xc0\xb1<\x0e,\xe3%\xfa\xfchv\x83\xf0\x94=\xcb\xd6\v\x85\x81Ic\x17\xad\xef\xbaxo\xc3\x04A\x99@\x9c9\x12z\xcc\xbd\xd0\xfa\xe7\xa3y\x92\xea~MwGn\xf2\x98\xd0\x97\xaf\x966t\x97\xa0\xf1\xba\xbbw\xc3\xe3\x14\xdc\x9b\xd9W\xd3\xf2\nu\x96\xad\xa2\xdb\x826\xc8aJ\x89\x19\x81\x1b\xc1\"/:w;p\b\\\n\xc5\x8d', 0x2) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[], 0xffffff6b) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r0, 0x409, 0xa) 11:51:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) 11:51:27 executing program 5: r0 = memfd_create(&(0x7f0000000540)='/s\xcb\x9cF2\x1d\b\x00\xca\xdc[\x17\x8b\xb2\xf7W\xf0hW\xdd\xca\xc8k\xc0\xa5velindf\r(\x90\xe0\xe0\r\xa6R\xb4\xb8\xa1\x98\xb43\xa6,\xa6<\x13\xfe\x04\x00\x01\xbd\x96:\xe2\x13\x02\xfaw\xaa\xef\x96\xfbi\xf8\x00\bbQ\xd8gC\xb2-\xa1\x06\x00\x00\x00\xe93\xf2\xd6\x03\'\xaa(\x8f\xaf\f7\n\xcf\xaf\xd6\x1fK\xe0\xf3g\x81\xf3o$\x03\x89\xf7\xb6\xed\xd0\xd2\x18j\x8f\x9b\xd1\x8a\xda\\;\xb6\xf4\'y\x17?\xc5\x90\xcc\xe9\xdc\xa7\a\xe2J8x\xad/\xba\xb1mJ\x7f\xe4m\xe6T\xe9\x00\x00\x00\x00Y\x92$O_\xf6\xb6\x1ce\xd0R\xcf\x1c\xbd\x03\x9a\xca\xc1_\xfb\xd0n\xc0\xc6\x04\xa8\x9c\xf5\xa7\xde\xf8&5\xefD\x04\x160\xafy\x02\\\x15F\x0f\f:\xae\xabm\x8f\xaeh\x8c~8\x9f\xc8\xedO\x00\xbf\x1d\xb1\x84', 0x1) ftruncate(r0, 0x40003) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f0000000200)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1f, 0x200000, 0x7, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x2284, &(0x7f0000000040)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2008000fffffffe) 11:51:27 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000a40)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2, 0x30}, 0x1c, 0x0}}], 0x1, 0x0) 11:51:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)={0x8001, 0x7, 0x3, 0x3, 0xb, "767a852da5a65782"}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000280)={0x0, 0x1003}, 0x4) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, 0x0) r4 = socket(0x400000000000010, 0x2, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00') sync() ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010aefd, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) 11:51:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)={0x8001, 0x7, 0x3, 0x3, 0xb, "767a852da5a65782"}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000280)={0x0, 0x1003}, 0x4) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, 0x0) r4 = socket(0x400000000000010, 0x2, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='./file0\x00') sync() ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010aefd, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) 11:51:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x10}]}, 0x10) [ 318.897500][T13239] device bond0 entered promiscuous mode [ 318.919033][T13239] device bond_slave_0 entered promiscuous mode [ 318.944150][T13239] device bond_slave_1 entered promiscuous mode 11:51:27 executing program 5: r0 = memfd_create(&(0x7f0000000540)='/s\xcb\x9cF2\x1d\b\x00\xca\xdc[\x17\x8b\xb2\xf7W\xf0hW\xdd\xca\xc8k\xc0\xa5velindf\r(\x90\xe0\xe0\r\xa6R\xb4\xb8\xa1\x98\xb43\xa6,\xa6<\x13\xfe\x04\x00\x01\xbd\x96:\xe2\x13\x02\xfaw\xaa\xef\x96\xfbi\xf8\x00\bbQ\xd8gC\xb2-\xa1\x06\x00\x00\x00\xe93\xf2\xd6\x03\'\xaa(\x8f\xaf\f7\n\xcf\xaf\xd6\x1fK\xe0\xf3g\x81\xf3o$\x03\x89\xf7\xb6\xed\xd0\xd2\x18j\x8f\x9b\xd1\x8a\xda\\;\xb6\xf4\'y\x17?\xc5\x90\xcc\xe9\xdc\xa7\a\xe2J8x\xad/\xba\xb1mJ\x7f\xe4m\xe6T\xe9\x00\x00\x00\x00Y\x92$O_\xf6\xb6\x1ce\xd0R\xcf\x1c\xbd\x03\x9a\xca\xc1_\xfb\xd0n\xc0\xc6\x04\xa8\x9c\xf5\xa7\xde\xf8&5\xefD\x04\x160\xafy\x02\\\x15F\x0f\f:\xae\xabm\x8f\xaeh\x8c~8\x9f\xc8\xedO\x00\xbf\x1d\xb1\x84', 0x1) ftruncate(r0, 0x40003) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f0000000200)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1f, 0x200000, 0x7, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x2284, &(0x7f0000000040)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2008000fffffffe) [ 318.987846][T13236] device bond0 left promiscuous mode [ 319.020317][T13236] device bond_slave_0 left promiscuous mode 11:51:28 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x1b}]}, 0x10) [ 319.059225][T13236] device bond_slave_1 left promiscuous mode 11:51:28 executing program 3: openat$rtc(0xffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80001, 0x0) 11:51:28 executing program 5: prctl$PR_CAPBSET_DROP(0x18, 0x1000026) 11:51:28 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6, @empty=[0x6]}, 0x10) [ 319.388704][T13263] device bond0 entered promiscuous mode [ 319.413797][T13263] device bond_slave_0 entered promiscuous mode [ 319.428327][T13263] device bond_slave_1 entered promiscuous mode [ 319.442437][T13261] device bond0 left promiscuous mode [ 319.451571][T13261] device bond_slave_0 left promiscuous mode [ 319.485933][T13261] device bond_slave_1 left promiscuous mode [ 319.538379][T13263] device bond0 entered promiscuous mode [ 319.544564][T13263] device bond_slave_0 entered promiscuous mode [ 319.566602][T13263] device bond_slave_1 entered promiscuous mode [ 319.584619][T13263] device bond0 left promiscuous mode [ 319.597542][T13263] device bond_slave_0 left promiscuous mode [ 319.610485][T13263] device bond_slave_1 left promiscuous mode 11:51:28 executing program 2: keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 11:51:28 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x3e}]}, 0x10) 11:51:28 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x80, 0x5}, 0x40) 11:51:28 executing program 5: bpf$MAP_CREATE(0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 11:51:28 executing program 1: bpf$MAP_CREATE(0xa, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 11:51:28 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6, @empty=[0x7]}, 0x10) [ 319.753030][T13272] device bond0 entered promiscuous mode [ 319.770129][T13272] device bond_slave_0 entered promiscuous mode [ 319.790718][T13272] device bond_slave_1 entered promiscuous mode 11:51:28 executing program 5: perf_event_open(&(0x7f0000000440)={0x4, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$nvram(0xffffff9c, 0x0, 0x8080, 0x0) ioctl$BLKRRPART(r3, 0x125f, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x1) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000000)=0x200000000) getresgid(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026}, &(0x7f0000000300)={0x3, 0x6, 0x8, 0x0, 0x81, 0x5}) 11:51:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c40)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, &(0x7f0000001280)=[{&(0x7f0000000040)="c3", 0x1}], 0x1, &(0x7f00000012c0)=[@hoplimit_2292={{0x10}}, @rthdrdstopts={{0x14}}], 0x24}}], 0x1, 0x0) 11:51:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)="cb", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="ff", 0x1}], 0x1}}], 0x3, 0x8081) sendmmsg$inet6(r0, &(0x7f0000004c00)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000003c0)="cec53680435dd99755d328e86c26e31fdd852c6b750f02cd56338bcb7924da9f3cc849063ce945", 0x27}], 0x1}}], 0x1, 0x0) 11:51:28 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 11:51:28 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x60}]}, 0x10) [ 319.827641][T13271] device bond0 left promiscuous mode [ 319.834045][T13271] device bond_slave_0 left promiscuous mode [ 319.859390][T13271] device bond_slave_1 left promiscuous mode 11:51:28 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6, @empty=[0x8]}, 0x10) 11:51:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000a40)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@dstopts_2292={{0x14}}], 0x14}}], 0x1, 0x0) 11:51:28 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)="cb", 0x1}], 0x1}}], 0x2, 0x8081) sendmmsg$inet6(r0, &(0x7f0000000d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 11:51:29 executing program 2: syz_mount_image$romfs(&(0x7f0000000400)='romfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000001580)) 11:51:29 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x70}]}, 0x10) [ 320.098256][T13296] device bond0 entered promiscuous mode 11:51:29 executing program 1: perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x6) [ 320.159229][T13296] device bond_slave_0 entered promiscuous mode [ 320.207429][T13296] device bond_slave_1 entered promiscuous mode [ 320.217523][T13301] capability: warning: `syz-executor.5' uses deprecated v2 capabilities in a way that may be insecure 11:51:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000480)={0x0, 0x2a, &(0x7f0000000440)={&(0x7f0000000400)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0x38, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0xfffffffffffffe69}}]}, 0xfffffffffffffe58}}, 0x0) [ 320.257286][T13295] device bond0 left promiscuous mode [ 320.266659][T13295] device bond_slave_0 left promiscuous mode [ 320.304695][T13295] device bond_slave_1 left promiscuous mode [ 320.374359][T13296] device bond0 entered promiscuous mode [ 320.380176][T13296] device bond_slave_0 entered promiscuous mode [ 320.426169][T13296] device bond_slave_1 entered promiscuous mode [ 320.467891][T13296] device bond0 left promiscuous mode [ 320.512840][T13296] device bond_slave_0 left promiscuous mode [ 320.553350][T13296] device bond_slave_1 left promiscuous mode 11:51:30 executing program 5: perf_event_open(&(0x7f0000000440)={0x4, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$nvram(0xffffff9c, 0x0, 0x8080, 0x0) ioctl$BLKRRPART(r3, 0x125f, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x1) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000000)=0x200000000) getresgid(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)) clone(0x0, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) capget(&(0x7f0000000180)={0x20071026}, &(0x7f0000000300)={0x3, 0x6, 0x8, 0x0, 0x81, 0x5}) 11:51:30 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfc}]}, 0x10) 11:51:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x5, 0x1, 0x3}, 0x14}}, 0x0) 11:51:30 executing program 1: syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x200001, &(0x7f0000000340)) 11:51:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x4020940d, &(0x7f0000000240)={'batadv0\x00'}) 11:51:30 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6, @empty=[0x48]}, 0x10) 11:51:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x100c1, 0x0) [ 321.479187][T13339] device bond0 entered promiscuous mode [ 321.505351][T13339] device bond_slave_0 entered promiscuous mode 11:51:30 executing program 3: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) 11:51:30 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500}]}, 0x10) 11:51:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001600)={&(0x7f00000000c0)=ANY=[@ANYBLOB="f9a5c53917baab32117a073ab20ae1bacf9c5482", @ANYBLOB, @ANYRES32=r3, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x20008800) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="139b0000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001580)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb, 0x1, 'mqprio\x00'}, {0x58, 0x2, {{0x1, [], 0x0, [0x10]}}}}]}, 0x88}}, 0x0) [ 321.543544][T13339] device bond_slave_1 entered promiscuous mode 11:51:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x4c, r1, 0x1, 0x0, 0x0, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}]}, 0x4c}}, 0x0) [ 321.602003][T13332] device bond0 left promiscuous mode [ 321.607318][T13332] device bond_slave_0 left promiscuous mode [ 321.630718][T13332] device bond_slave_1 left promiscuous mode 11:51:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f0000000040)={0x0, 0x0, 0xfffffdfd}) [ 321.845560][T13353] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 322.032851][T13353] device bond1 entered promiscuous mode [ 322.038805][T13353] 8021q: adding VLAN 0 to HW filter on device bond1 11:51:31 executing program 5: openat$bsg(0xffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x410881, 0x0) 11:51:31 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6, @empty=[0x4c]}, 0x10) 11:51:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x600}]}, 0x10) 11:51:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8921, &(0x7f0000000240)={'batadv0\x00'}) 11:51:31 executing program 2: bpf$MAP_CREATE(0x8, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) [ 322.139402][T13359] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 11:51:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001600)={&(0x7f00000000c0)=ANY=[@ANYBLOB="f9a5c53917baab32117a073ab20ae1bacf9c5482", @ANYBLOB, @ANYRES32=r3, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x20008800) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="139b0000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001580)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb, 0x1, 'mqprio\x00'}, {0x58, 0x2, {{0x1, [], 0x0, [0x10]}}}}]}, 0x88}}, 0x0) 11:51:31 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x101800) [ 322.286583][T13405] device bond0 entered promiscuous mode [ 322.326225][T13405] device bond_slave_0 entered promiscuous mode 11:51:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x700}]}, 0x10) 11:51:31 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='setgroups\x00') write$cgroup_pid(r0, 0x0, 0x0) [ 322.366221][T13405] device bond_slave_1 entered promiscuous mode [ 322.389790][T13401] device bond0 left promiscuous mode [ 322.395472][T13401] device bond_slave_0 left promiscuous mode [ 322.405450][T13401] device bond_slave_1 left promiscuous mode 11:51:31 executing program 5: bpf$MAP_CREATE(0x4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) [ 322.422859][T13405] device bond0 entered promiscuous mode [ 322.428425][T13405] device bond_slave_0 entered promiscuous mode [ 322.453993][T13405] device bond_slave_1 entered promiscuous mode 11:51:31 executing program 3: syz_mount_image$romfs(&(0x7f00000007c0)='romfs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x1, &(0x7f0000001b40)=[{&(0x7f0000000940)="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", 0x200}], 0x0, &(0x7f0000001bc0)={[{'syz0\x00'}, {'cgroup.type\x00'}]}) [ 322.481241][T13411] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 11:51:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2000, 0x0, 0x1}, 0x40) 11:51:31 executing program 2: bpf$MAP_CREATE(0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) [ 322.622398][T13411] device bond2 entered promiscuous mode [ 322.676659][T13411] 8021q: adding VLAN 0 to HW filter on device bond2 [ 322.688844][T13405] device bond0 left promiscuous mode [ 322.695815][T13405] device bond_slave_0 left promiscuous mode [ 322.697279][T13460] romfs: Unknown parameter 'syz0' [ 322.703645][T13405] device bond_slave_1 left promiscuous mode 11:51:31 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6, @empty=[0x60]}, 0x10) 11:51:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x900}]}, 0x10) 11:51:31 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioprio_get$uid(0x3, 0x0) 11:51:31 executing program 5: bpf$MAP_CREATE(0x17, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 11:51:31 executing program 1: r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x1000004) [ 322.796523][T13460] romfs: Unknown parameter 'syz0' 11:51:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8927, &(0x7f0000000240)={'batadv0\x00'}) 11:51:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5452, &(0x7f0000000240)={'batadv0\x00'}) 11:51:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8914, &(0x7f0000000240)={'batadv0\x00'}) 11:51:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x1b00}]}, 0x10) [ 323.006910][T13479] device bond0 entered promiscuous mode [ 323.044545][T13479] device bond_slave_0 entered promiscuous mode 11:51:31 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f0000000180)=""/4082, 0xff2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0x218, 0xc800, 0x0) [ 323.067390][T13479] device bond_slave_1 entered promiscuous mode [ 323.097063][T13474] device bond0 left promiscuous mode [ 323.103117][T13474] device bond_slave_0 left promiscuous mode 11:51:32 executing program 3: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000300)={'batadv0\x00', 0x0}) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d616376746170000400028008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x44}}, 0x0) 11:51:32 executing program 5: clock_gettime(0x0, &(0x7f0000000180)={0x0}) clock_settime(0x0, &(0x7f00000001c0)={r0}) [ 323.148015][T13474] device bond_slave_1 left promiscuous mode [ 323.507609][T13479] device bond0 entered promiscuous mode [ 323.513527][T13479] device bond_slave_0 entered promiscuous mode [ 323.539360][T13479] device bond_slave_1 entered promiscuous mode [ 323.562227][T13479] device bond0 left promiscuous mode [ 323.588650][T13479] device bond_slave_0 left promiscuous mode [ 323.598086][T13479] device bond_slave_1 left promiscuous mode 11:51:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6, @empty=[0x68]}, 0x10) 11:51:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1}, 0x40) 11:51:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000}]}, 0x10) 11:51:32 executing program 5: getpriority(0x74bed0ff24abd416, 0xffffffffffffffff) 11:51:32 executing program 1: syz_mount_image$romfs(&(0x7f00000007c0)='romfs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x1, &(0x7f0000001b40)=[{&(0x7f0000000940)="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", 0x400}], 0x0, &(0x7f0000001bc0)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 11:51:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8923, &(0x7f0000000240)={'batadv0\x00'}) 11:51:32 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x0, 0xffffff81}, 0x1c) [ 323.749492][T13509] MTD: Attempt to mount non-MTD device "/dev/loop1" [ 323.765290][T13512] device bond0 entered promiscuous mode [ 323.781463][T13512] device bond_slave_0 entered promiscuous mode [ 323.790492][T13509] VFS: Can't find a romfs filesystem on dev loop1. [ 323.790492][T13509] [ 323.835036][T13512] device bond_slave_1 entered promiscuous mode [ 323.872958][T13506] device bond0 left promiscuous mode [ 323.878549][T13506] device bond_slave_0 left promiscuous mode [ 323.921207][T13506] device bond_slave_1 left promiscuous mode 11:51:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000a40)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x3}, 0x7}, 0x1c, 0x0}}], 0x1, 0x0) 11:51:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6, @empty=[0x6c]}, 0x10) 11:51:32 executing program 3: add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) [ 324.016365][T13509] MTD: Attempt to mount non-MTD device "/dev/loop1" [ 324.039273][T13509] VFS: Can't find a romfs filesystem on dev loop1. [ 324.039273][T13509] 11:51:32 executing program 2: bpf$MAP_CREATE(0x14, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 11:51:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2fff}]}, 0x10) 11:51:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x89b1, &(0x7f0000000240)={'batadv0\x00'}) [ 324.245741][T13529] device bond0 entered promiscuous mode [ 324.265087][T13529] device bond_slave_0 entered promiscuous mode 11:51:33 executing program 3: keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x0}, 0xfffffffffffffffa) 11:51:33 executing program 5: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_settime(0x0, &(0x7f00000001c0)={r0, r1+10000000}) [ 324.299544][T13529] device bond_slave_1 entered promiscuous mode 11:51:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x20000300) 11:51:33 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x3e00}]}, 0x10) [ 324.392471][T13526] device bond0 left promiscuous mode [ 324.397870][T13526] device bond_slave_0 left promiscuous mode 11:51:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x891e, &(0x7f0000000240)={'batadv0\x00'}) [ 324.461385][T13526] device bond_slave_1 left promiscuous mode [ 324.519606][T13529] device bond0 entered promiscuous mode [ 324.531459][T13529] device bond_slave_0 entered promiscuous mode 11:51:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x541b, 0x0) 11:51:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)="cb", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="ff", 0x300}], 0x1}}], 0x3, 0x8081) [ 324.564858][T13529] device bond_slave_1 entered promiscuous mode [ 324.608714][T13529] device bond0 left promiscuous mode [ 324.629102][T13529] device bond_slave_0 left promiscuous mode [ 324.645927][T13529] device bond_slave_1 left promiscuous mode 11:51:33 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6, @empty=[0x74]}, 0x10) 11:51:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x8, 0x0, 0x0, 0x1}, 0x40) 11:51:33 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6000}]}, 0x10) 11:51:33 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/time_for_children\x00') 11:51:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x541b, &(0x7f0000000240)={'batadv0\x00'}) 11:51:33 executing program 3: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000040)) 11:51:33 executing program 2: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) 11:51:33 executing program 5: prctl$PR_CAPBSET_DROP(0x8, 0x1000026) 11:51:33 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) [ 324.900832][T13568] device bond0 entered promiscuous mode [ 324.930770][T13568] device bond_slave_0 entered promiscuous mode 11:51:33 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7000}]}, 0x10) 11:51:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xe, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) [ 324.972631][T13568] device bond_slave_1 entered promiscuous mode [ 325.004066][T13560] device bond0 left promiscuous mode [ 325.017489][T13560] device bond_slave_0 left promiscuous mode 11:51:33 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f8", 0x16}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) [ 325.050664][T13560] device bond_slave_1 left promiscuous mode 11:51:33 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6, @empty=[0x7a]}, 0x10) 11:51:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000a40)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@dstopts_2292={{0x14, 0x4}}], 0x14}}], 0x1, 0x0) 11:51:33 executing program 2: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000240)={{0x77359400}}, &(0x7f0000000280)) 11:51:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x80, 0x5, 0x1800}, 0x40) [ 325.234012][T13586] FAT-fs (loop5): bogus number of FAT sectors 11:51:34 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfcff}]}, 0x10) 11:51:34 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8f"], 0x2) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 325.317829][T13586] FAT-fs (loop5): Can't find a valid FAT filesystem [ 325.361251][T13592] device bond0 entered promiscuous mode [ 325.373066][T13592] device bond_slave_0 entered promiscuous mode 11:51:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5421, 0x0) [ 325.402343][T13592] device bond_slave_1 entered promiscuous mode [ 325.429119][T13583] device bond0 left promiscuous mode [ 325.436948][T13583] device bond_slave_0 left promiscuous mode [ 325.469352][T13583] device bond_slave_1 left promiscuous mode [ 325.519961][T13592] device bond0 entered promiscuous mode [ 325.529486][T13599] ================================================================================ [ 325.542230][T13592] device bond_slave_0 entered promiscuous mode [ 325.563492][T13592] device bond_slave_1 entered promiscuous mode 11:51:34 executing program 1: socketpair(0xa, 0x1, 0x0, &(0x7f0000000080)) [ 325.578568][T13599] UBSAN: array-index-out-of-bounds in arch/x86/kernel/uprobes.c:263:56 [ 325.614172][T13592] device bond0 left promiscuous mode 11:51:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x1a}, 0x40) 11:51:34 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x9006}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xff0f}]}, 0x10) [ 325.626422][T13599] index 4 is out of range for type 'insn_byte_t [4]' [ 325.651444][T13592] device bond_slave_0 left promiscuous mode [ 325.657890][T13599] CPU: 1 PID: 13599 Comm: syz-executor.3 Not tainted 5.10.0-rc6-syzkaller #0 [ 325.666671][T13599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.670905][T13592] device bond_slave_1 left promiscuous mode [ 325.676723][T13599] Call Trace: [ 325.676791][T13599] dump_stack+0x107/0x163 [ 325.676816][T13599] ubsan_epilogue+0xb/0x5a [ 325.676841][T13599] __ubsan_handle_out_of_bounds.cold+0x62/0x6c [ 325.700857][T13599] arch_uprobe_analyze_insn+0x8f4/0xa40 [ 325.706394][T13599] ? push_emulate_op+0x270/0x270 [ 325.711317][T13599] ? PageHuge+0x11c/0x170 [ 325.715646][T13599] ? memcpy+0x39/0x60 [ 325.719621][T13599] install_breakpoint.isra.0+0x6c4/0x7c0 [ 325.725254][T13599] register_for_each_vma+0x862/0xbd0 [ 325.730540][T13599] uprobe_apply+0xfc/0x150 [ 325.734951][T13599] trace_uprobe_register+0x5c9/0x880 [ 325.740232][T13599] perf_trace_event_init+0x17a/0xa20 [ 325.745512][T13599] perf_uprobe_init+0x16f/0x210 [ 325.750353][T13599] perf_uprobe_event_init+0xff/0x1c0 [ 325.755626][T13599] perf_try_init_event+0x12a/0x560 [ 325.760724][T13599] ? perf_event_alloc.part.0+0xe3f/0x3890 [ 325.766432][T13599] perf_event_alloc.part.0+0xdee/0x3890 [ 325.771968][T13599] ? cap_capable+0x1f1/0x270 [ 325.776549][T13599] ? security_capable+0x8f/0xc0 [ 325.781391][T13599] __do_sys_perf_event_open+0x72c/0x2cb0 [ 325.787021][T13599] ? _copy_to_user+0xdc/0x150 [ 325.791689][T13599] ? perf_event_set_output+0x4c0/0x4c0 [ 325.797131][T13599] ? put_timespec64+0xcb/0x120 [ 325.801880][T13599] ? ns_to_timespec64+0xc0/0xc0 [ 325.806733][T13599] ? syscall_enter_from_user_mode+0x1d/0x50 [ 325.812619][T13599] do_syscall_64+0x2d/0x70 [ 325.817022][T13599] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 325.822898][T13599] RIP: 0033:0x45deb9 [ 325.826784][T13599] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.846393][T13599] RSP: 002b:00007fa34c7e0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 325.854796][T13599] RAX: ffffffffffffffda RBX: 0000000000024e40 RCX: 000000000045deb9 [ 325.862752][T13599] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 325.870708][T13599] RBP: 000000000119bf70 R08: 0000000000000000 R09: 0000000000000000 [ 325.878664][T13599] R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000119bf2c [ 325.886637][T13599] R13: 00007ffdbc06944f R14: 00007fa34c7e19c0 R15: 000000000119bf2c 11:51:34 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) [ 325.957975][T13599] ================================================================================ [ 325.974555][T13599] Kernel panic - not syncing: panic_on_warn set ... [ 325.981169][T13599] CPU: 0 PID: 13599 Comm: syz-executor.3 Not tainted 5.10.0-rc6-syzkaller #0 [ 325.989926][T13599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.999985][T13599] Call Trace: [ 326.003291][T13599] dump_stack+0x107/0x163 [ 326.007634][T13599] panic+0x306/0x73d [ 326.011533][T13599] ? __warn_printk+0xf3/0xf3 [ 326.016148][T13599] ? ubsan_epilogue+0x3e/0x5a [ 326.020848][T13599] ubsan_epilogue+0x54/0x5a [ 326.025388][T13599] __ubsan_handle_out_of_bounds.cold+0x62/0x6c [ 326.031565][T13599] arch_uprobe_analyze_insn+0x8f4/0xa40 [ 326.037120][T13599] ? push_emulate_op+0x270/0x270 [ 326.042067][T13599] ? PageHuge+0x11c/0x170 [ 326.046429][T13599] ? memcpy+0x39/0x60 [ 326.050433][T13599] install_breakpoint.isra.0+0x6c4/0x7c0 [ 326.056093][T13599] register_for_each_vma+0x862/0xbd0 [ 326.061414][T13599] uprobe_apply+0xfc/0x150 [ 326.065845][T13599] trace_uprobe_register+0x5c9/0x880 [ 326.071156][T13599] perf_trace_event_init+0x17a/0xa20 [ 326.076463][T13599] perf_uprobe_init+0x16f/0x210 [ 326.081327][T13599] perf_uprobe_event_init+0xff/0x1c0 [ 326.086622][T13599] perf_try_init_event+0x12a/0x560 [ 326.091742][T13599] ? perf_event_alloc.part.0+0xe3f/0x3890 [ 326.097471][T13599] perf_event_alloc.part.0+0xdee/0x3890 [ 326.103125][T13599] ? cap_capable+0x1f1/0x270 [ 326.107730][T13599] ? security_capable+0x8f/0xc0 [ 326.112600][T13599] __do_sys_perf_event_open+0x72c/0x2cb0 [ 326.118251][T13599] ? _copy_to_user+0xdc/0x150 [ 326.122942][T13599] ? perf_event_set_output+0x4c0/0x4c0 [ 326.128415][T13599] ? put_timespec64+0xcb/0x120 [ 326.133185][T13599] ? ns_to_timespec64+0xc0/0xc0 [ 326.138067][T13599] ? syscall_enter_from_user_mode+0x1d/0x50 [ 326.143978][T13599] do_syscall_64+0x2d/0x70 [ 326.148409][T13599] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 326.154307][T13599] RIP: 0033:0x45deb9 [ 326.158211][T13599] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.177826][T13599] RSP: 002b:00007fa34c7e0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 326.186255][T13599] RAX: ffffffffffffffda RBX: 0000000000024e40 RCX: 000000000045deb9 [ 326.194233][T13599] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 326.202209][T13599] RBP: 000000000119bf70 R08: 0000000000000000 R09: 0000000000000000 [ 326.210188][T13599] R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000119bf2c [ 326.218341][T13599] R13: 00007ffdbc06944f R14: 00007fa34c7e19c0 R15: 000000000119bf2c [ 326.227289][T13599] Kernel Offset: disabled [ 326.231772][T13599] Rebooting in 86400 seconds..