[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.113' (ECDSA) to the list of known hosts. 2020/12/16 05:15:11 fuzzer started 2020/12/16 05:15:11 dialing manager at 10.128.0.105:33803 2020/12/16 05:15:11 syscalls: 3308 2020/12/16 05:15:11 code coverage: enabled 2020/12/16 05:15:11 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2020/12/16 05:15:11 extra coverage: extra coverage is not supported by the kernel 2020/12/16 05:15:11 setuid sandbox: enabled 2020/12/16 05:15:11 namespace sandbox: enabled 2020/12/16 05:15:11 Android sandbox: /sys/fs/selinux/policy does not exist 2020/12/16 05:15:11 fault injection: enabled 2020/12/16 05:15:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/12/16 05:15:11 net packet injection: enabled 2020/12/16 05:15:11 net device setup: enabled 2020/12/16 05:15:11 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/12/16 05:15:11 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/12/16 05:15:11 USB emulation: /dev/raw-gadget does not exist 2020/12/16 05:15:11 hci packet injection: enabled 2020/12/16 05:15:11 wifi device emulation: kernel 4.17 required (have 4.14.212-syzkaller) 05:16:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x22004843, 0x0, 0x0) 05:16:40 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x10440, 0x0) 05:16:40 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x5, &(0x7f0000000040)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0xa9, &(0x7f0000000100)=""/169, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:16:40 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff5000/0x8000)=nil, 0x0}, 0x68) 05:16:40 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') preadv(r0, &(0x7f00000017c0), 0x33b, 0x2, 0x0) 05:16:40 executing program 5: epoll_pwait(0xffffffffffffffff, &(0x7f0000000200)=[{}], 0x1, 0x0, &(0x7f0000000280)={[0x7]}, 0x8) syzkaller login: [ 123.593076] IPVS: ftp: loaded support on port[0] = 21 [ 123.748838] IPVS: ftp: loaded support on port[0] = 21 [ 123.877467] chnl_net:caif_netlink_parms(): no params data found [ 123.891928] IPVS: ftp: loaded support on port[0] = 21 [ 123.979507] chnl_net:caif_netlink_parms(): no params data found [ 124.017212] IPVS: ftp: loaded support on port[0] = 21 [ 124.142830] IPVS: ftp: loaded support on port[0] = 21 [ 124.170873] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.179701] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.186837] device bridge_slave_0 entered promiscuous mode [ 124.197219] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.204855] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.212018] device bridge_slave_1 entered promiscuous mode [ 124.234090] chnl_net:caif_netlink_parms(): no params data found [ 124.331996] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.338912] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.345974] device bridge_slave_0 entered promiscuous mode [ 124.356039] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.363753] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.372124] device bridge_slave_1 entered promiscuous mode [ 124.380453] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 124.390261] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 124.426286] chnl_net:caif_netlink_parms(): no params data found [ 124.469569] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 124.476936] team0: Port device team_slave_0 added [ 124.484346] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 124.495870] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 124.505056] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 124.516402] team0: Port device team_slave_1 added [ 124.549083] IPVS: ftp: loaded support on port[0] = 21 [ 124.556881] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 124.567950] team0: Port device team_slave_0 added [ 124.590874] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 124.597446] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 124.623117] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 124.634349] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 124.643208] team0: Port device team_slave_1 added [ 124.664126] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.670939] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.678326] device bridge_slave_0 entered promiscuous mode [ 124.685208] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 124.691728] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 124.717885] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 124.733769] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 124.750899] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.757279] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.764973] device bridge_slave_1 entered promiscuous mode [ 124.795378] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 124.826623] device hsr_slave_0 entered promiscuous mode [ 124.832315] device hsr_slave_1 entered promiscuous mode [ 124.840541] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 124.846774] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 124.872774] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 124.884688] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 124.891260] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 124.916673] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 124.928537] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 124.936320] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 124.951902] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 124.964055] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 124.981088] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 125.000596] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 125.063250] chnl_net:caif_netlink_parms(): no params data found [ 125.092813] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 125.100249] team0: Port device team_slave_0 added [ 125.127366] device hsr_slave_0 entered promiscuous mode [ 125.133868] device hsr_slave_1 entered promiscuous mode [ 125.140811] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 125.151409] team0: Port device team_slave_1 added [ 125.169385] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 125.176124] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.183677] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.192064] device bridge_slave_0 entered promiscuous mode [ 125.218352] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 125.232788] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.240100] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.249936] device bridge_slave_1 entered promiscuous mode [ 125.279388] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 125.285645] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.311360] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 125.322653] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 125.329046] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.354291] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 125.393254] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 125.402267] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 125.426592] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 125.454158] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 125.485019] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.493733] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.501380] device bridge_slave_0 entered promiscuous mode [ 125.532032] device hsr_slave_0 entered promiscuous mode [ 125.538025] device hsr_slave_1 entered promiscuous mode [ 125.546659] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 125.555125] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.562033] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.569851] device bridge_slave_1 entered promiscuous mode [ 125.608217] Bluetooth: hci0 command 0x0409 tx timeout [ 125.620731] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 125.669948] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 125.677048] team0: Port device team_slave_0 added [ 125.702621] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 125.716206] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 125.728450] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 125.735746] team0: Port device team_slave_1 added [ 125.751165] chnl_net:caif_netlink_parms(): no params data found [ 125.767756] Bluetooth: hci1 command 0x0409 tx timeout [ 125.767893] Bluetooth: hci5 command 0x0409 tx timeout [ 125.772990] Bluetooth: hci4 command 0x0409 tx timeout [ 125.779622] Bluetooth: hci2 command 0x0409 tx timeout [ 125.790470] Bluetooth: hci3 command 0x0409 tx timeout [ 125.827063] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 125.833427] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.860621] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 125.892010] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 125.900928] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.926605] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 125.939732] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 125.946998] team0: Port device team_slave_0 added [ 125.958395] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 125.980109] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 125.995141] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 126.004573] team0: Port device team_slave_1 added [ 126.023186] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 126.035748] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 126.057288] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 126.063689] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 126.090114] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 126.133026] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 126.140505] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 126.167094] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 126.178031] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 126.204977] device hsr_slave_0 entered promiscuous mode [ 126.211305] device hsr_slave_1 entered promiscuous mode [ 126.217172] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 126.243101] device hsr_slave_0 entered promiscuous mode [ 126.249247] device hsr_slave_1 entered promiscuous mode [ 126.257599] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 126.280362] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 126.292413] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 126.299981] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 126.306707] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.313934] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.321252] device bridge_slave_0 entered promiscuous mode [ 126.353692] 8021q: adding VLAN 0 to HW filter on device bond0 [ 126.364025] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.371336] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.379049] device bridge_slave_1 entered promiscuous mode [ 126.399589] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 126.423314] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 126.439250] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 126.454438] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 126.465883] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 126.503214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 126.511152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 126.541850] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 126.549215] team0: Port device team_slave_0 added [ 126.555614] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 126.564094] team0: Port device team_slave_1 added [ 126.592647] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 126.599805] 8021q: adding VLAN 0 to HW filter on device team0 [ 126.643092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 126.665148] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 126.674804] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 126.685397] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 126.692286] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 126.718414] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 126.731119] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 126.743019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 126.751071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.759772] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.766345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.774054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 126.783165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.790862] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.797200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.807134] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 126.817040] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 126.823694] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 126.849159] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 126.863580] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 126.872852] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 126.879339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 126.886365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 126.894266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 126.902456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 126.911794] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 126.924065] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 126.935996] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 126.943907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 126.952191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 126.961035] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 126.969913] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 126.981054] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 126.991188] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 127.000094] 8021q: adding VLAN 0 to HW filter on device team0 [ 127.009563] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 127.036449] device hsr_slave_0 entered promiscuous mode [ 127.042574] device hsr_slave_1 entered promiscuous mode [ 127.052031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 127.059921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 127.069905] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 127.088377] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 127.097148] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 127.104268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.112679] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.120760] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.127118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.134324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 127.142017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.154502] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 127.162847] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 127.172387] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 127.180210] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 127.201220] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.208784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.216581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.224844] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.231286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.238823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 127.246350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.256073] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 127.263218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 127.292894] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 127.310098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.319974] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 127.330238] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 127.340701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 127.348938] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 127.355616] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 127.364241] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 127.376482] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 127.396102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 127.404760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 127.412713] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 127.421191] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 127.433925] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 127.450096] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 127.457693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 127.465434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 127.482638] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 127.493565] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.503554] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 127.525565] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 127.533529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 127.545582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.554033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 127.562285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.571973] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.581694] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 127.599962] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 127.612345] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 127.621900] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 127.634775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 127.644489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.653643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 127.661362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.670271] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 127.679582] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 127.685585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 127.692485] Bluetooth: hci0 command 0x041b tx timeout [ 127.698721] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 127.704775] 8021q: adding VLAN 0 to HW filter on device team0 [ 127.715132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 127.723224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.732786] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 127.739161] 8021q: adding VLAN 0 to HW filter on device team0 [ 127.750977] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 127.763387] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 127.770972] 8021q: adding VLAN 0 to HW filter on device team0 [ 127.780162] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 127.794679] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 127.805694] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 127.813844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.822018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.829674] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.836013] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.842962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.850875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.858575] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.864917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.871918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.880042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.887780] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.894116] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.901276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.908517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.915681] Bluetooth: hci4 command 0x041b tx timeout [ 127.916731] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 127.921013] Bluetooth: hci3 command 0x041b tx timeout [ 127.921061] Bluetooth: hci2 command 0x041b tx timeout [ 127.921113] Bluetooth: hci5 command 0x041b tx timeout [ 127.921158] Bluetooth: hci1 command 0x041b tx timeout [ 127.938211] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 127.960351] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 127.968760] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 127.979534] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 127.987427] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 127.994406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 128.002655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.011218] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.017636] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.024687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 128.032786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.040582] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.047051] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.054089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 128.061971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.069738] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.076097] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.083342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 128.091306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 128.099513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 128.111152] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 128.119811] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 128.129976] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 128.140447] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 128.147970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 128.155859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 128.165879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 128.176475] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 128.184832] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 128.195279] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 128.208233] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 128.224524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 128.232520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 128.240854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 128.249707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 128.257843] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 128.265424] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 128.272341] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 128.279610] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 128.290265] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 128.297970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 128.305693] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 128.317017] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 128.331567] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 128.353659] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 128.360964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 128.373286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 128.381674] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 128.392547] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 128.402723] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 128.411326] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 128.418327] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 128.426340] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 128.436003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 128.447858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 128.455600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 128.465124] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 128.475430] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 128.484394] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 128.497048] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 128.505916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 128.514124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.522393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 128.530895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.538844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 128.546403] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 128.554542] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 128.561621] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 128.573416] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 128.583167] device veth0_vlan entered promiscuous mode [ 128.594230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 128.602606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.611742] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 128.620091] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 128.628408] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 128.644019] 8021q: adding VLAN 0 to HW filter on device bond0 [ 128.650899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 128.659524] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.666912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 128.674799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.682836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 128.690530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.702059] device veth1_vlan entered promiscuous mode [ 128.709089] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 128.718121] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 128.727314] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 128.734581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 128.742461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.752032] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 128.758243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 128.773760] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 128.784292] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 128.795219] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 128.806964] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 128.813329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 128.831396] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 128.839660] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 128.846673] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 128.860282] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 128.868226] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 128.880514] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 128.889543] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 128.896923] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 128.905103] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 128.912476] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 128.919443] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 128.926126] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 128.933287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.940257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.951563] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 128.964267] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 128.974987] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 128.981907] 8021q: adding VLAN 0 to HW filter on device team0 [ 128.991675] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 129.001570] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 129.010721] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 129.019116] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 129.025911] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 129.038973] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 129.059594] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 129.068598] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 129.075623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 129.094851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 129.103165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 129.112136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 129.120323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.129567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.137958] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.144312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.152458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 129.161838] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 129.168802] device veth0_macvtap entered promiscuous mode [ 129.183823] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 129.196863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.213400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.224353] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.230777] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.239031] device veth1_macvtap entered promiscuous mode [ 129.247845] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 129.256846] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 129.269289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 129.281867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 129.293853] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 129.310261] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 129.329265] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 129.336524] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 129.344419] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 129.354808] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 129.366882] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 129.378836] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 129.386151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 129.398807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 129.406861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 129.417714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 129.426517] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 129.436454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 129.445218] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 129.453518] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 129.462590] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 129.475806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 129.488431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.496251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 129.504906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 129.513004] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 129.521809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 129.530279] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 129.537559] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 129.549186] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 129.559704] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 129.568322] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 129.575183] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 129.590624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 129.598887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 129.608038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 129.615528] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 129.623896] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 129.632252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 129.642221] device veth0_vlan entered promiscuous mode [ 129.651098] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 129.657871] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 129.670871] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 129.678529] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 129.685214] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 129.694633] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 129.742233] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 129.752744] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 129.772478] Bluetooth: hci0 command 0x040f tx timeout [ 129.779273] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 129.786778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 129.796563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.807342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 129.815246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 129.824040] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 129.832275] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 129.842276] device veth0_vlan entered promiscuous mode [ 129.849817] device veth1_vlan entered promiscuous mode [ 129.855715] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 129.871242] device veth1_vlan entered promiscuous mode [ 129.878307] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 129.889380] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 129.903849] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 129.915536] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 129.929015] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 129.932052] Bluetooth: hci5 command 0x040f tx timeout [ 129.936254] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 129.949552] Bluetooth: hci2 command 0x040f tx timeout [ 129.950067] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 129.961256] Bluetooth: hci3 command 0x040f tx timeout [ 129.962801] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 129.973704] Bluetooth: hci4 command 0x040f tx timeout [ 129.977763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 129.986839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.000478] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 130.016113] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 130.023386] Bluetooth: hci1 command 0x040f tx timeout [ 130.030891] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 130.043129] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 130.053181] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 130.065675] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 130.072912] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 130.082848] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 130.093252] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 130.101277] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 130.110158] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 130.116815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 130.125355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.133471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 130.141496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.150253] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.157560] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.168630] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 130.176833] device veth0_vlan entered promiscuous mode [ 130.197805] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 130.205031] device veth0_macvtap entered promiscuous mode [ 130.222566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 130.233811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.244939] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 130.253132] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 130.260080] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 130.269011] device veth1_macvtap entered promiscuous mode [ 130.287226] device veth0_macvtap entered promiscuous mode [ 130.293567] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 130.302919] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 130.314576] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 130.323191] device veth1_vlan entered promiscuous mode [ 130.336479] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 130.344916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 130.353094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.361164] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.372358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.381082] device veth1_macvtap entered promiscuous mode [ 130.388278] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 130.398111] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 130.408590] device veth0_vlan entered promiscuous mode [ 130.424850] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 130.435123] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 130.453550] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 130.465814] device veth1_vlan entered promiscuous mode [ 130.472815] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 130.481313] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 130.493327] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.504582] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 130.511658] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 130.521573] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 130.532047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.541844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 130.551964] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.562915] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 130.571057] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 130.584667] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 130.595785] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 05:16:48 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000140)="120000001600e70d017b00000000008e1584", 0x28f, 0x0, 0x0, 0x3d4) [ 130.604204] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 130.617890] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 130.625740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 130.636366] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 130.645619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 130.657180] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 130.668543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.681702] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 130.690431] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 130.698876] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 130.708371] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 130.718789] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 130.726153] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 130.736442] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 130.744630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 05:16:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x6e6bbb}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@dev}}, 0xe8) [ 130.753053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 130.761397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.770060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 130.778502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.801388] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready 05:16:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x69) [ 130.828922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 130.844344] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.862345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 05:16:49 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xd}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x35}, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de8}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/netlink\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x605400, 0x0) [ 130.872250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.884351] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 130.896422] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 130.906415] device veth0_macvtap entered promiscuous mode [ 130.913681] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 130.930264] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 130.939218] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 130.947507] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 130.955343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 130.963906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 130.972020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.986659] device veth1_macvtap entered promiscuous mode [ 130.993459] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 131.001665] device veth0_macvtap entered promiscuous mode [ 131.017325] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 131.029733] device veth1_macvtap entered promiscuous mode [ 131.036173] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 131.052655] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 131.065796] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 131.080591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 131.092873] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.105361] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 131.118308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.134658] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 131.155669] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.171420] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 131.179576] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 131.193547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 131.204539] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.221545] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 131.231384] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.247478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 131.260534] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.273559] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 131.285800] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 131.488709] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 131.512892] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 131.524010] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 131.532998] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 131.541272] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.549311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.557295] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 131.564957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.576125] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 131.586405] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 131.594074] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 131.609681] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 131.619374] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 131.634974] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.645202] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 131.655710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.665546] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 131.675776] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 05:16:49 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xd}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x35}, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de8}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/netlink\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x605400, 0x0) [ 131.685429] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 131.695712] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.708088] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 131.715089] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 131.749446] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 131.763323] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.772234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.782818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 131.795488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.805415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.813805] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.823748] device veth0_vlan entered promiscuous mode [ 131.834222] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 131.847512] Bluetooth: hci0 command 0x0419 tx timeout [ 131.859762] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.866779] hrtimer: interrupt took 46906 ns [ 131.869002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 131.894008] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.908267] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 131.921603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.933444] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 131.948253] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.961432] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 131.972190] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 132.007029] Bluetooth: hci4 command 0x0419 tx timeout [ 132.014061] Bluetooth: hci3 command 0x0419 tx timeout [ 132.023678] Bluetooth: hci2 command 0x0419 tx timeout [ 132.031128] Bluetooth: hci5 command 0x0419 tx timeout [ 132.086849] Bluetooth: hci1 command 0x0419 tx timeout [ 132.285196] device veth1_vlan entered promiscuous mode [ 132.294678] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 132.303778] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 132.317257] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 132.325123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.341029] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 132.381831] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 132.402963] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 132.411115] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 132.421307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 132.430353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.443716] device veth0_macvtap entered promiscuous mode [ 132.451490] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 132.462647] device veth1_macvtap entered promiscuous mode [ 132.470368] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 132.497186] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 132.516353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 132.530740] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 132.539456] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 05:16:50 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xd}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x35}, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de8}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/netlink\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x605400, 0x0) 05:16:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 132.550366] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 132.576514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.611565] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 132.634009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.653671] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 132.663573] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.673241] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 132.683069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.692386] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 132.702319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.713303] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 132.720500] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 132.735201] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 132.754440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.819451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 132.842059] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.864842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 132.882673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.892322] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 132.903275] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.913228] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 132.923714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.933363] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 132.944024] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.955587] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 132.963086] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 132.980358] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 133.008488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 05:16:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f00000054c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12062, 0x0) 05:16:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@private2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb9, 0x1}, {{@in6=@ipv4={[], [], @private}}, 0x0, @in=@multicast2, 0x0, 0xbdaf15bbcf23792b}}, 0xe8) 05:16:51 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x10000007, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) 05:16:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xd, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:16:51 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8927, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 05:16:51 executing program 1: r0 = socket(0x18, 0x0, 0x2) getsockname$inet(r0, 0x0, &(0x7f0000000040)) 05:16:51 executing program 4: syz_open_dev$loop(&(0x7f00000010c0)='/dev/loop#\x00', 0xff, 0x0) 05:16:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 05:16:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@private2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb9, 0x1}, {{@in6=@ipv4={[], [], @private}}, 0x0, @in=@multicast2, 0x0, 0xbdaf15bbcf23792b}}, 0xe8) 05:16:51 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tgkill(0x0, 0x0, 0x0) 05:16:51 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xd}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x35}, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de8}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/netlink\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x605400, 0x0) 05:16:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f00000001c0), 0x4) 05:16:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x2b, 0x0, 0x0) 05:16:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@private2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb9, 0x1}, {{@in6=@ipv4={[], [], @private}}, 0x0, @in=@multicast2, 0x0, 0xbdaf15bbcf23792b}}, 0xe8) 05:16:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e40)={0x18, 0x2, &(0x7f0000000c00)=@raw=[@btf_id], &(0x7f0000000c80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:16:51 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0xfffffff8}, 0x4) 05:16:51 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, 0x0) 05:16:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@private2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb9, 0x1}, {{@in6=@ipv4={[], [], @private}}, 0x0, @in=@multicast2, 0x0, 0xbdaf15bbcf23792b}}, 0xe8) 05:16:51 executing program 2: socket$inet_udplite(0x3c, 0x6, 0x88) 05:16:51 executing program 0: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 05:16:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x8}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000140)=""/203, 0x39, 0xcb, 0x1}, 0x20) 05:16:51 executing program 3: syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x1, 0x802) 05:16:52 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') readv(r2, &(0x7f0000000380)=[{&(0x7f0000000100)=""/253, 0xfd}], 0x1) 05:16:52 executing program 0: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x5, 0x0) 05:16:52 executing program 4: sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f00000022c0)={0x0, 0x0, 0x0}, 0x0) clock_getres(0x2, &(0x7f0000002300)) 05:16:52 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f00000002c0)) 05:16:52 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10}, 0x10}}, 0x0) 05:16:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x4a) 05:16:52 executing program 2: r0 = eventfd2(0x0, 0x800) read$eventfd(r0, &(0x7f00000001c0), 0x8) 05:16:52 executing program 4: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xbc6, 0x2) 05:16:52 executing program 0: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000e, 0xffffffffffffffff) 05:16:52 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x5411, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 05:16:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x50, 0x2, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x14, 0x4, @private0}}}]}]}, 0x50}}, 0x0) 05:16:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x12, 0x0, &(0x7f0000000040)) 05:16:52 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x10}, @loopback}}) 05:16:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000001200)=""/4101, 0x26, 0x1005, 0x1}, 0x20) 05:16:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x24, 0x5, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000200)=""/4096, 0x41, 0x1000, 0x1}, 0x20) 05:16:52 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8923, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 05:16:52 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x541b, &(0x7f0000000340)={'sit0\x00', 0x0}) 05:16:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000002280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@typedef={0x8}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000001280)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 05:16:52 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000080)) 05:16:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000200)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 05:16:52 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000140)='fuse\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xc2, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'system_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}) 05:16:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0020000000fc6af01a1ac700ec00720e13"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000800001300"}) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000003c0)=0x4) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 05:16:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000002280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@typedef={0x8}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000001280)=""/4096, 0x2d, 0x1000, 0x1}, 0x20) 05:16:52 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {0x0, 0x0, 0x400fe0}, {&(0x7f0000011900), 0x0, 0x404fe0}], 0x0, &(0x7f0000014900)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 05:16:52 executing program 3: r0 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 05:16:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x50, 0x2, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}]}, 0x50}}, 0x0) 05:16:52 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 05:16:52 executing program 3: sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 05:16:52 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8948, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 05:16:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 05:16:52 executing program 1: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x401, 0x2) 05:16:52 executing program 3: mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000940)) 05:16:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0020000000fc6af01a1ac700ec00720e13"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000800001300"}) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000003c0)=0x4) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 05:16:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) readv(r0, &(0x7f0000001080)=[{&(0x7f0000000000)=""/45, 0x2d}, {&(0x7f0000001200)=""/4097, 0xff2}, {&(0x7f0000001140)=""/135, 0xffffffffffffffdb}], 0x3) 05:16:52 executing program 5: mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) [ 134.803337] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 134.866709] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 134.879941] F2FS-fs (loop2): invalid crc value [ 134.886093] F2FS-fs (loop2): invalid crc value [ 134.902007] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 134.912428] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 134.933038] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 134.956863] F2FS-fs (loop2): invalid crc value [ 134.962572] F2FS-fs (loop2): invalid crc value 05:16:53 executing program 0: epoll_pwait(0xffffffffffffffff, &(0x7f0000000200)=[{}], 0x1, 0x0, &(0x7f0000000280), 0x8) 05:16:53 executing program 1: ioperm(0x7f, 0x1, 0x0) 05:16:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x1, {{0x2, 0x0, @multicast1}}}, 0x88) 05:16:53 executing program 3: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1002) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) mlock(&(0x7f0000ffa000/0x5000)=nil, 0x5000) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 05:16:53 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {0x0, 0x0, 0x400fe0}, {&(0x7f0000011900), 0x0, 0x404fe0}], 0x0, &(0x7f0000014900)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 05:16:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0020000000fc6af01a1ac700ec00720e13"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000800001300"}) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000003c0)=0x4) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) [ 134.968652] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 05:16:53 executing program 1: ioperm(0x7f, 0x1, 0x0) 05:16:53 executing program 0: r0 = socket$inet(0x2, 0x3, 0x5) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x890b, 0x0) 05:16:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='ip6_vti0\x00') 05:16:53 executing program 3: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/190, 0x0, 0xbe}, 0x20) 05:16:53 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) 05:16:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0020000000fc6af01a1ac700ec00720e13"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000800001300"}) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000003c0)=0x4) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 05:16:53 executing program 0: creat(&(0x7f0000000240)='./bus\x00', 0x0) setsockopt$TIPC_MCAST_REPLICAST(0xffffffffffffffff, 0x10f, 0x86) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r5, @ANYBLOB="08000400ffffffff08000200e0"], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x20}}, 0x0) 05:16:53 executing program 3: socket$inet(0x2, 0xa, 0x1f) 05:16:53 executing program 1: ioperm(0x7f, 0x1, 0x0) 05:16:53 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8993, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) [ 135.221625] audit: type=1804 audit(1608095813.375:2): pid=9716 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir636109902/syzkaller.FsRUI1/14/bus" dev="sda1" ino=15774 res=1 [ 135.252473] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) 05:16:53 executing program 1: ioperm(0x7f, 0x1, 0x0) 05:16:53 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x8902, 0x0) 05:16:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x18) 05:16:53 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {0x0, 0x0, 0x400fe0}, {&(0x7f0000011900), 0x0, 0x404fe0}], 0x0, &(0x7f0000014900)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 05:16:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x1}}, @const={0xc}]}}, &(0x7f0000000140)=""/136, 0x3e, 0x88, 0x1}, 0x20) 05:16:53 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f00000000c0)={0x8}, 0xf) 05:16:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @private2}}) 05:16:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f00000000c0)=0x54) [ 136.123186] audit: type=1804 audit(1608095814.275:3): pid=9725 uid=0 auid=0 ses=4 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir636109902/syzkaller.FsRUI1/14/bus" dev="sda1" ino=15774 res=1 05:16:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) 05:16:54 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10}, 0x10}}, 0x0) 05:16:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x6, 0x0, &(0x7f0000000040)) 05:16:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xffffffffffffffbb, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, ["", "", "", "", "", "", "", "", ""]}, 0x20}}, 0x0) 05:16:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x0, @empty}, {0x6, @link_local}, 0x2a, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'bridge0\x00'}) 05:16:54 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {0x0, 0x0, 0x400fe0}, {&(0x7f0000011900), 0x0, 0x404fe0}], 0x0, &(0x7f0000014900)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) [ 136.252101] audit: type=1804 audit(1608095814.405:4): pid=9759 uid=0 auid=0 ses=4 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir636109902/syzkaller.FsRUI1/14/bus" dev="sda1" ino=15774 res=1 [ 136.272586] audit: type=1804 audit(1608095814.405:5): pid=9758 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir636109902/syzkaller.FsRUI1/14/bus" dev="sda1" ino=15774 res=1 05:16:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x4) 05:16:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x3c000000) 05:16:54 executing program 4: ioprio_set$uid(0x3, 0xffffffffffffffff, 0x6000) 05:16:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}) 05:16:54 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 05:16:54 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x4020940d, &(0x7f0000000040)) [ 136.378284] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 05:16:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {0x2}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) 05:16:54 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) getsockopt$inet6_udp_int(r1, 0x11, 0x0, 0x0, 0x0) 05:16:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_KEY_IDX={0x5}]}, 0x28}}, 0x0) 05:16:54 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080), 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, 0x0) 05:16:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, &(0x7f0000000200)=""/4096, 0x3e, 0x1000, 0x1}, 0x20) 05:16:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {0x2}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) 05:16:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae00, 0x0) 05:16:54 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de8}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x339, 0x0) 05:16:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd01a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:16:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {0x2}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) 05:16:54 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000000)) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) 05:16:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x18, 0x2, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x2}]}, 0x18}}, 0x0) 05:16:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {0x2}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) 05:16:54 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}], 0x0, &(0x7f0000014900)) 05:16:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4}, {}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000200)=""/4096, 0x41, 0x1000, 0x1}, 0x20) 05:16:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x18, 0x2, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x2}]}, 0x18}}, 0x0) 05:16:54 executing program 3: syz_mount_image$fuse(&(0x7f0000000140)='fuse\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}}) [ 136.665023] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 05:16:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3811, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3901, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:16:54 executing program 3: futex(0x0, 0xeaccb389bb262c70, 0x0, 0x0, 0x0, 0x0) [ 136.759542] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 05:16:55 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000001740)='/dev/uhid\x00', 0x802, 0x0) write$UHID_SET_REPORT_REPLY(r0, 0x0, 0x0) 05:16:55 executing program 0: mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) 05:16:55 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc", 0xa5, 0x400000}, {&(0x7f0000011900)}, {&(0x7f0000011a00)}], 0x0, &(0x7f0000014900)) 05:16:55 executing program 2: syz_genetlink_get_family_id$ipvs(&(0x7f00000028c0)='IPVS\x00') 05:16:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, &(0x7f0000001200)=""/4096, 0x3e, 0x1000, 0xffffffff}, 0x20) 05:16:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x18, 0x2, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x2}]}, 0x18}}, 0x0) 05:16:55 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xbc6, 0x22e02) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 05:16:55 executing program 3: r0 = socket(0x18, 0x0, 0x2) listen(r0, 0x0) 05:16:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x29, 0x0, 0x0) [ 137.200176] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 05:16:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000080)=""/213, 0x1000000, 0xd5, 0x1}, 0x20) 05:16:55 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc", 0xa5, 0x400000}, {&(0x7f0000011900)}, {&(0x7f0000011a00)}], 0x0, &(0x7f0000014900)) 05:16:55 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000100)='sed\x00') 05:16:55 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002640)) 05:16:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x18, 0x2, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x2}]}, 0x18}}, 0x0) 05:16:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000200)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 05:16:55 executing program 2: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/190, 0x0, 0xbe}, 0x20) 05:16:55 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000180)={0x1}) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$lock(r1, 0x26, &(0x7f0000000180)={0x1}) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$lock(r3, 0x26, &(0x7f0000000180)={0x1}) dup2(r0, r2) 05:16:55 executing program 0: r0 = socket(0x18, 0x0, 0x2) sendmmsg$sock(r0, &(0x7f0000001240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 05:16:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x18, 0x3, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x4}]}, 0x18}}, 0x0) 05:16:55 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}], 0x0, &(0x7f0000014900)) [ 137.369816] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 05:16:55 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc", 0xa5, 0x400000}, {&(0x7f0000011900)}, {&(0x7f0000011a00)}], 0x0, &(0x7f0000014900)) 05:16:55 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0xfffffc01, 0x4) 05:16:55 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0x541b, 0x0) 05:16:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4}, {}]}]}}, &(0x7f0000000140)=""/195, 0x36, 0xc3, 0x1}, 0x20) 05:16:55 executing program 0: sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) dup(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff00000000000000", 0x1e5) recvmmsg(r1, &(0x7f0000002ec0), 0x2a8, 0x880e, &(0x7f00000001c0)={0x77359400}) 05:16:55 executing program 2: socketpair(0xf, 0x0, 0x0, &(0x7f0000000200)) 05:16:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, r1, 0x1}, 0x14}}, 0x0) 05:16:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000048c0)={0x0, 0x0, &(0x7f0000004880)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0xcc0, 0x6, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0xca0, 0x4, 0x0, 0x1, [{0x2b4, 0x1, 0x0, 0x1, [@tunnel={{0xb, 0x1, 'tunnel\x00'}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_DREG={0x8}, @NFTA_TUNNEL_MODE={0x8}, @NFTA_TUNNEL_MODE={0x8}]}}, @immediate={{0xe, 0x1, 'immediate\x00'}, @val={0x270, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8}, @NFTA_IMMEDIATE_DREG={0x8}, @NFTA_IMMEDIATE_DATA={0x25c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0xc1, 0x1, "30fb1828e354f4c495480086ab9e2e294062169d8de5ad99f75e07d9bbd721b0fd125f169774147677548e63b116f752b7cea54746f67a1e569cc241357843afe33c39bec7422a4cd58eef15b78b4766108e80ad75540e63e47a89dfec3577a461ca0a0e6bb1c9a7a80a9c16c7333ab91ab28463a98a427f70c0fdf1b892fc5f60b96bf161d5fd913a5daa76e16892aab8349cb5e237c0179951d457955b63de2bf31f134f0c61d40a3808fa0c0575dee92455eb214a419730eaf89eb9"}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0xfd, 0x1, "0921b77b0745a0b20fdbc9ecb4bd5bd7e5fd0436a1b0bda86457749bea25f67d1290b53b3db51d260b47c5a663767e4be2e3ecaded06cd6db0fa01956c3f32a3e4a4b575584b8bfb2c914b77c577a32cf38a6f5c2cb34ca33eef7c3cef2409aa8b51cb0b3e686517d6dd131ab87a592205ef7a70a8a4b8a36712bf5c1e0debe5ec59e1e729c731dd509a0bec21231bbfaf674b6932004e26327b57195c944e460873544a8d17206b8d7f2dcc2a8ad31091684a06215c757915a2d9908635b2edc1a5ff8808bff03ac6ae49df90f82c75952d709a4df6047b9aa639e1760462e8d515591ed68683513f11dd136bfb8dc350f77b30d566c0ec53"}]}]}}]}, {0x114, 0x1, 0x0, 0x1, [@limit={{0xa, 0x1, 'limit\x00'}, @void}, @fwd={{0x8, 0x1, 'fwd\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_FWD_SREG_DEV={0x8}]}}, @payload={{0xc, 0x1, 'payload\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_DREG={0x8}, @NFTA_PAYLOAD_SREG={0x8}, @NFTA_PAYLOAD_BASE={0x8}]}}, @counter={{0xc, 0x1, 'counter\x00'}, @void}, @dup={{0x8, 0x1, 'dup\x00'}, @void}, @rt={{0x7, 0x1, 'rt\x00'}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_RT_KEY={0x8}, @NFTA_RT_KEY={0x8}, @NFTA_RT_KEY={0x8}, @NFTA_RT_DREG={0x8}, @NFTA_RT_KEY={0x8}]}}, @redir={{0xa, 0x1, 'redir\x00'}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_REDIR_FLAGS={0x8}, @NFTA_REDIR_REG_PROTO_MAX={0x8}, @NFTA_REDIR_FLAGS={0x8}, @NFTA_REDIR_REG_PROTO_MIN={0x8}, @NFTA_REDIR_REG_PROTO_MAX={0x8}, @NFTA_REDIR_REG_PROTO_MAX={0x8}, @NFTA_REDIR_REG_PROTO_MIN={0x8}]}}, @fwd={{0x8, 0x1, 'fwd\x00'}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_FWD_NFPROTO={0x8}, @NFTA_FWD_SREG_ADDR={0x8}, @NFTA_FWD_NFPROTO={0x8}, @NFTA_FWD_SREG_DEV={0x8}]}}, @payload={{0xc, 0x1, 'payload\x00'}, @void}]}, {0x64, 0x1, 0x0, 0x1, [@masq={{0x9, 0x1, 'masq\x00'}, @void}, @queue={{0xa, 0x1, 'queue\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_QUEUE_NUM={0x6}]}}, @dup_ipv4={{0x8, 0x1, 'dup\x00'}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8}, @NFTA_DUP_SREG_DEV={0x8}, @NFTA_DUP_SREG_ADDR={0x8}, @NFTA_DUP_SREG_ADDR={0x8}, @NFTA_DUP_SREG_DEV={0x8}, @NFTA_DUP_SREG_DEV={0x8}]}}]}, {0x358, 0x1, 0x0, 0x1, [@lookup={{0xb, 0x1, 'lookup\x00'}, @void}, @dynset={{0xb, 0x1, 'dynset\x00'}, @void}, @notrack={{0xc, 0x1, 'notrack\x00'}, @void}, @tunnel={{0xb, 0x1, 'tunnel\x00'}, @void}, @range={{0xa, 0x1, 'range\x00'}, @val={0x318, 0x2, 0x0, 0x1, [@NFTA_RANGE_FROM_DATA={0x224, 0x3, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x50, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xa9, 0x1, "f28653382143dea117320e9f879237e05d985e1a092ef65ec56be3550194b34322888d1531d4b37f2d5d7110f93ebe998a7216b969747c6738648bc487a8821c4712a776cd31ba9ef5839c2678b2b10fd245c12e96464c37913a96665dcaa1addb7e71b3747dce92f15c6c1241a02d4469cb4d5889b47e6e8113522fb47134516b977564d214fb2fcec66e266ce7b67a2edf3c82642b7c2bb4589d90850f700b88da7fe11f"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x60, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_RANGE_FROM_DATA={0x88, 0x3, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x49, 0x1, "c6bcdbb61c293720996adacd7fe8c59b6d832c1bf15d82861df6d3c04f8e4bccc848d74d9d498edc6e9847374b8b0d1cbd6004a0ae3d3a9ff27d12fac7769cc389572c9642"}]}, @NFTA_RANGE_TO_DATA={0x68, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x55, 0x1, "d741ed463042a111cbb86d61dd3bac2b3dc733a44d28afa79dcac5278b5af946c1224b5d58b55ceb9bda2f441389a0728b4bb158ca5cd8d87c18142599091011949fee5722dc7bcead726310ac17c07fa2"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}]}]}}]}, {0x1f0, 0x1, 0x0, 0x1, [@lookup={{0xb, 0x1, 'lookup\x00'}, @val={0x40, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_DREG={0x8}, @NFTA_LOOKUP_SET={0x9, 0x1, 'syz1\x00'}, @NFTA_LOOKUP_FLAGS={0x8}, @NFTA_LOOKUP_SREG={0x8}, @NFTA_LOOKUP_SET_ID={0x8}, @NFTA_LOOKUP_FLAGS={0x8}, @NFTA_LOOKUP_SET_ID={0x8}]}}, @meta={{0x9, 0x1, 'meta\x00'}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_META_SREG={0x8}, @NFTA_META_DREG={0x8}]}}, @tproxy={{0xb, 0x1, 'tproxy\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_TPROXY_FAMILY={0x8}, @NFTA_TPROXY_FAMILY={0x8}, @NFTA_TPROXY_REG_ADDR={0x8}]}}, @lookup={{0xb, 0x1, 'lookup\x00'}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_FLAGS={0x8}, @NFTA_LOOKUP_SET={0x9, 0x1, 'syz0\x00'}, @NFTA_LOOKUP_SET={0x9, 0x1, 'syz1\x00'}]}}, @tproxy={{0xb, 0x1, 'tproxy\x00'}, @void}, @log={{0x8, 0x1, 'log\x00'}, @val={0x54, 0x2, 0x0, 0x1, [@NFTA_LOG_QTHRESHOLD={0x6}, @NFTA_LOG_SNAPLEN={0x8}, @NFTA_LOG_QTHRESHOLD={0x6}, @NFTA_LOG_FLAGS={0x8}, @NFTA_LOG_QTHRESHOLD={0x6}, @NFTA_LOG_QTHRESHOLD={0x6}, @NFTA_LOG_QTHRESHOLD={0x6}, @NFTA_LOG_PREFIX={0xf, 0x2, 0x1, 0x0, '/dev/loop#\x00'}, @NFTA_LOG_FLAGS={0x8}]}}, @fwd={{0x8, 0x1, 'fwd\x00'}, @void}, @match={{0xa, 0x1, 'match\x00'}, @val={0xac, 0x2, 0x0, 0x1, [@NFTA_MATCH_INFO={0x9, 0x3, "16261e18f7"}, @NFTA_MATCH_INFO={0x79, 0x3, "f0feadae27652f0868ea76b710fd930d48449e4847e5612009e246875c5e88bfa9f3f99237238405bf60e56b836889a20c30b1a9b573e2a292507ca9504c20eaf41b0bfd8208b609ae508c93c47535a5a80dfa6e0d835f67cf33930e60541ae7d8f87bc3d0479e126f58821cb880ff4989a39204cb"}, @NFTA_MATCH_REV={0x8}, @NFTA_MATCH_REV={0x8}, @NFTA_MATCH_NAME={0xf, 0x1, '/dev/loop#\x00'}]}}]}, {0x6c, 0x1, 0x0, 0x1, [@meta={{0x9, 0x1, 'meta\x00'}, @void}, @quota={{0xa, 0x1, 'quota\x00'}, @void}, @reject={{0xb, 0x1, 'reject\x00'}, @void}, @fwd={{0x8, 0x1, 'fwd\x00'}, @void}, @osf={{0x8, 0x1, 'osf\x00'}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_DREG={0x8}, @NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_DREG={0x8}, @NFTA_OSF_TTL={0x5}, @NFTA_OSF_DREG={0x8}]}}]}, {0x24c, 0x1, 0x0, 0x1, [@numgen={{0xb, 0x1, 'numgen\x00'}, @void}, @range={{0xa, 0x1, 'range\x00'}, @val={0x158, 0x2, 0x0, 0x1, [@NFTA_RANGE_OP={0x8}, @NFTA_RANGE_TO_DATA={0x44, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x31, 0x1, "220680747b89296aa5db59eb593a4c3e4fa98cc058e4e919c679b64bb34b5a76d56e3d1e859afdc0bb71a157b5"}]}, @NFTA_RANGE_FROM_DATA={0x100, 0x3, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x79, 0x1, "dd682b579e2f9ba7958e12647a908e24aca08d07782dd2e8962f16ad27b73d82015b87eb7b063b7e7f042fe72317041c67ae2f40d0e751c8d0eef0d9bca6ad50a1fd37f67a44523e0d6b7e969466b3824a5a99eee4e9d91bd146bc82882a41d8ee5542af491ff3fd7727b9546b9b5304e7231021d1"}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_RANGE_SREG={0x8}]}}, @quota={{0xa, 0x1, 'quota\x00'}, @void}, @cmp={{0x8, 0x1, 'cmp\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CMP_OP={0x8}]}}, @meta={{0x9, 0x1, 'meta\x00'}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8}, @NFTA_META_SREG={0x8}, @NFTA_META_DREG={0x8}, @NFTA_META_SREG={0x8}, @NFTA_META_DREG={0x8}, @NFTA_META_KEY={0x8}, @NFTA_META_KEY={0x8}]}}, @objref={{0xb, 0x1, 'objref\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_OBJREF_SET_SREG={0x8}]}}, @rt={{0x7, 0x1, 'rt\x00'}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8}, @NFTA_RT_KEY={0x8}, @NFTA_RT_DREG={0x8}, @NFTA_RT_KEY={0x8}, @NFTA_RT_DREG={0x8}, @NFTA_RT_DREG={0x8}, @NFTA_RT_KEY={0x8}, @NFTA_RT_KEY={0x8}]}}, @range={{0xa, 0x1, 'range\x00'}, @void}]}, {0x70, 0x1, 0x0, 0x1, [@hash={{0x9, 0x1, 'hash\x00'}, @void}, @numgen={{0xb, 0x1, 'numgen\x00'}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_NG_TYPE={0x8}, @NFTA_NG_TYPE={0x8}, @NFTA_NG_TYPE={0x8}, @NFTA_NG_TYPE={0x8}]}}, @queue={{0xa, 0x1, 'queue\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_QUEUE_NUM={0x6}, @NFTA_QUEUE_SREG_QNUM={0x8}, @NFTA_QUEUE_NUM={0x6}]}}, @dup_ipv6={{0x8, 0x1, 'dup\x00'}, @void}]}]}]}, @NFT_MSG_DELCHAIN={0x1c, 0x5, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_CHAIN_POLICY={0x8}]}, @NFT_MSG_DELSET={0xc8, 0xb, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_GC_INTERVAL={0x8}, @NFTA_SET_EXPR={0x8c, 0x11, 0x0, 0x1, @counter={{0xc, 0x1, 'counter\x00'}, @val={0x7c, 0x2, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_PACKETS={0xc}, @NFTA_COUNTER_PACKETS={0xc}, @NFTA_COUNTER_PACKETS={0xc}, @NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_PACKETS={0xc}, @NFTA_COUNTER_PACKETS={0xc}, @NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_BYTES={0xc}]}}}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_KEY_TYPE={0x8}, @NFTA_SET_OBJ_TYPE={0x8}, @NFTA_SET_KEY_TYPE={0x8}]}, @NFT_MSG_NEWRULE={0xf8, 0x6, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_RULE_COMPAT={0x24, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_IPV6={0x8}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8}, @NFTA_RULE_COMPAT_PROTO_IPV4={0x8}]}, @NFTA_RULE_POSITION={0xc}, @NFTA_RULE_EXPRESSIONS={0xb4, 0x4, 0x0, 0x1, [{0xb0, 0x1, 0x0, 0x1, [@bitwise={{0xc, 0x1, 'bitwise\x00'}, @val={0xa0, 0x2, 0x0, 0x1, [@NFTA_BITWISE_MASK={0x9c, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x49, 0x1, "35f4a80b19688bde4e1579e4c3d2587d16c1b33e988169babb9b2f2d258bd6a661c007f893cf928bf60cdd8f5d0defa50c5ce82b3dedd458d4c00eb3c409b6c0f7334ee13c"}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x4}]}]}}]}]}]}], {0x14}}, 0xec4}}, 0x0) 05:16:56 executing program 1: sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) dup(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff00000000000000", 0x1e5) recvmmsg(r1, &(0x7f0000002ec0), 0x2a8, 0x880e, &(0x7f00000001c0)={0x77359400}) 05:16:56 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}, {&(0x7f0000011900)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x404fe0}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x405fe0}], 0x0, &(0x7f0000014900)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1}, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x8, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 05:16:56 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc", 0xa5, 0x400000}, {&(0x7f0000011900)}, {&(0x7f0000011a00)}], 0x0, &(0x7f0000014900)) 05:16:56 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8992, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 05:16:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000580)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r1, 0x1}, 0x1c}}, 0x0) 05:16:56 executing program 0: sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) dup(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff00000000000000", 0x1e5) recvmmsg(r1, &(0x7f0000002ec0), 0x2a8, 0x880e, &(0x7f00000001c0)={0x77359400}) 05:16:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f0000000100), 0x4) 05:16:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x31, &(0x7f00000001c0)=ANY=[], 0x78) 05:16:56 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x200b41) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) ptrace(0x10, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) setpgid(0x0, 0xffffffffffffffff) sendmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000540)=@abs={0x1}, 0x6e, &(0x7f0000000b40), 0x0, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYRES32=r1, @ANYBLOB, @ANYRES32, @ANYRES32=r1, @ANYRES32], 0x50, 0x24004080}, 0x0) syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={0x0, 0x54}, 0x1, 0x0, 0x0, 0x24000045}, 0x0) link(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)='./file1\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {0x0, 0x0, 0x10e00}, {&(0x7f0000000900)="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", 0x447, 0xe7}], 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="756e695f786c6174653d302c757466383d3100001bff25c244c4d4f8334d472dd79381fb5d06e5dd03a89854272ae90e1ad3279ffadeca430862cf633449044c74834113d7c02fe9becef4f419aa1ea67bbe9a299575726b9ebc960800"]) mknodat(r2, &(0x7f0000000140)='./file0\x00', 0x0, 0xf0ffff) r3 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {0x0, 0x0, 0x10e00}, {&(0x7f0000000900)="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", 0x447, 0xe7}], 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="756e695f786c6174653d302c757466383d3100001bff25c244c4d4f8334d472dd79381fb5d06e5dd03a89854272ae90e1ad3279ffadeca430862cf633449044c74834113d7c02fe9becef4f419aa1ea67bbe9a299575726b9ebc960800"]) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="0200040000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYRESDEC=r2, @ANYRES32=0x0, @ANYBLOB="08000000a01dc698fede08686629a874adac0e3b1f520889ef7b8b3934009f68d8ab20ea031b26fae8e7949858a4cb05b31eebea11a596a2d7b8e70fe209937a881fefa520fe524c34be10941da7dd146265732603e3e23ec1000000000000e008ebac3de9272105771badf32e75f0e11ba3ca572182", @ANYRESDEC=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB="100000000000000020"], 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) keyctl$set_reqkey_keyring(0xe, 0x2) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 05:16:56 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x2, &(0x7f0000000040)) 05:16:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x1e) 05:16:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, 0x0) 05:16:56 executing program 1: sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) dup(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff00000000000000", 0x1e5) recvmmsg(r1, &(0x7f0000002ec0), 0x2a8, 0x880e, &(0x7f00000001c0)={0x77359400}) [ 138.710543] FAT-fs (loop5): bogus number of FAT sectors [ 138.721746] FAT-fs (loop5): Can't find a valid FAT filesystem 05:16:56 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}, {&(0x7f0000011900)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x404fe0}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x405fe0}], 0x0, &(0x7f0000014900)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1}, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x8, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 05:16:56 executing program 0: sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) dup(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff00000000000000", 0x1e5) recvmmsg(r1, &(0x7f0000002ec0), 0x2a8, 0x880e, &(0x7f00000001c0)={0x77359400}) 05:16:56 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') preadv(r0, &(0x7f00000017c0), 0x33b, 0x48000000, 0x0) 05:16:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0xee00}, 0xc) [ 138.807245] print_req_error: I/O error, dev loop5, sector 1 [ 138.813336] Buffer I/O error on dev loop5, logical block 1, async page read [ 138.822014] print_req_error: I/O error, dev loop5, sector 2 [ 138.827852] Buffer I/O error on dev loop5, logical block 2, async page read [ 138.835086] print_req_error: I/O error, dev loop5, sector 3 [ 138.841242] Buffer I/O error on dev loop5, logical block 3, async page read [ 138.848559] print_req_error: I/O error, dev loop5, sector 4 05:16:57 executing program 3: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4002) 05:16:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000900)={0x0, 0x0, 0xf}) [ 138.854284] Buffer I/O error on dev loop5, logical block 4, async page read [ 138.861929] print_req_error: I/O error, dev loop5, sector 5 [ 138.867740] Buffer I/O error on dev loop5, logical block 5, async page read [ 138.874888] print_req_error: I/O error, dev loop5, sector 6 [ 138.881051] Buffer I/O error on dev loop5, logical block 6, async page read [ 138.888303] print_req_error: I/O error, dev loop5, sector 7 [ 138.894025] Buffer I/O error on dev loop5, logical block 7, async page read [ 138.920826] overlayfs: workdir and upperdir must reside under the same mount 05:16:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000900)={0x0, 0x0, 0xf}) 05:16:57 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x200b41) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) ptrace(0x10, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) setpgid(0x0, 0xffffffffffffffff) sendmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000540)=@abs={0x1}, 0x6e, &(0x7f0000000b40), 0x0, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYRES32=r1, @ANYBLOB, @ANYRES32, @ANYRES32=r1, @ANYRES32], 0x50, 0x24004080}, 0x0) syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={0x0, 0x54}, 0x1, 0x0, 0x0, 0x24000045}, 0x0) link(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)='./file1\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {0x0, 0x0, 0x10e00}, {&(0x7f0000000900)="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", 0x447, 0xe7}], 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="756e695f786c6174653d302c757466383d3100001bff25c244c4d4f8334d472dd79381fb5d06e5dd03a89854272ae90e1ad3279ffadeca430862cf633449044c74834113d7c02fe9becef4f419aa1ea67bbe9a299575726b9ebc960800"]) mknodat(r2, &(0x7f0000000140)='./file0\x00', 0x0, 0xf0ffff) r3 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {0x0, 0x0, 0x10e00}, {&(0x7f0000000900)="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", 0x447, 0xe7}], 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="756e695f786c6174653d302c757466383d3100001bff25c244c4d4f8334d472dd79381fb5d06e5dd03a89854272ae90e1ad3279ffadeca430862cf633449044c74834113d7c02fe9becef4f419aa1ea67bbe9a299575726b9ebc960800"]) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="0200040000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYRESDEC=r2, @ANYRES32=0x0, @ANYBLOB="08000000a01dc698fede08686629a874adac0e3b1f520889ef7b8b3934009f68d8ab20ea031b26fae8e7949858a4cb05b31eebea11a596a2d7b8e70fe209937a881fefa520fe524c34be10941da7dd146265732603e3e23ec1000000000000e008ebac3de9272105771badf32e75f0e11ba3ca572182", @ANYRESDEC=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB="100000000000000020"], 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) keyctl$set_reqkey_keyring(0xe, 0x2) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 05:16:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000900)={0x0, 0x0, 0xf}) 05:16:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000200)=""/4096, 0x41, 0x1000, 0x1}, 0x20) 05:16:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000900)={0x0, 0x0, 0xf}) 05:16:57 executing program 1: sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) dup(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff00000000000000", 0x1e5) recvmmsg(r1, &(0x7f0000002ec0), 0x2a8, 0x880e, &(0x7f00000001c0)={0x77359400}) 05:16:57 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}, {&(0x7f0000011900)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x404fe0}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x405fe0}], 0x0, &(0x7f0000014900)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1}, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x8, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 05:16:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) 05:16:57 executing program 0: sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) dup(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff00000000000000", 0x1e5) recvmmsg(r1, &(0x7f0000002ec0), 0x2a8, 0x880e, &(0x7f00000001c0)={0x77359400}) 05:16:57 executing program 4: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r0) [ 139.383214] FAT-fs (loop5): bogus number of FAT sectors [ 139.419991] FAT-fs (loop5): Can't find a valid FAT filesystem 05:16:57 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x72841) [ 139.436855] WARNING: can't dereference registers at 000000000000084c for ip entry_SYSCALL_64_after_hwframe+0x46/0xbb 05:16:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x44, 0x3, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}]}]}, 0x44}}, 0x0) 05:16:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}}, &(0x7f0000000200)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 05:16:57 executing program 3: r0 = socket(0x18, 0x0, 0x2) recvmmsg(r0, &(0x7f0000008780)=[{{&(0x7f0000000000)=@un=@abs, 0x80, 0x0}}], 0x1, 0x0, &(0x7f00000089c0)) 05:16:57 executing program 1: clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) 05:16:57 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x200b41) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) ptrace(0x10, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) setpgid(0x0, 0xffffffffffffffff) sendmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000540)=@abs={0x1}, 0x6e, &(0x7f0000000b40), 0x0, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYRES32=r1, @ANYBLOB, @ANYRES32, @ANYRES32=r1, @ANYRES32], 0x50, 0x24004080}, 0x0) syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={0x0, 0x54}, 0x1, 0x0, 0x0, 0x24000045}, 0x0) link(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)='./file1\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {0x0, 0x0, 0x10e00}, {&(0x7f0000000900)="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", 0x447, 0xe7}], 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="756e695f786c6174653d302c757466383d3100001bff25c244c4d4f8334d472dd79381fb5d06e5dd03a89854272ae90e1ad3279ffadeca430862cf633449044c74834113d7c02fe9becef4f419aa1ea67bbe9a299575726b9ebc960800"]) mknodat(r2, &(0x7f0000000140)='./file0\x00', 0x0, 0xf0ffff) r3 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {0x0, 0x0, 0x10e00}, {&(0x7f0000000900)="5692ea964dcf82b5fb3b3f3d98b4e5c301fbee222990d95c3bfedb600cbebbbaba0b97f3767b60c7c558521581d5b44b1a8f2f81aefc21ee8bb9268b4d258eb03d5702cd6be320a525976c04cb86ca80fc457d1dcf9c4728ccd95ee3b6ca03db68041b16a2f863c4d9bb358a97b842d920e217e69b7bd24c5d620467630ce56fe8822f92e57d9f77ba8bd978aebbccf612ab94575354a0dd8cf2cfdcbc7be0e3ffc7c283a2c713c0b9437c59cae8989fbf43d3cd574dff35d3d59a2e8afedfdb556f935bbc316e143be3acdadd51ed3db28524fef288e8d51fd04c0d13a4318a8a1bbfce9d017f01c50b6af357984442d8046ec473343753994932fd93d565fe98ee1bfdf0f0e77190024f68130ff34b7b25091b205eb42f16f9c90c2481a68de0c8f8bf8dfb7de56c5969203e949bedb3bd5450f9c30c0f60ae552f17d1ae327a3bffba1b08a5f456145b4c01ec352d0579321dcb9a767af4f10a21a1175e28008dc1df91b72c72905d78e57181a315fde0d1b847a41131506d219d7fad497b46a0930ec3cf6b649af203fecca08a042bbfb6a7bfc2af3d5774a9172f5da422860830e69587addea8a4477270e3df29bc87d5869aca11fe41f5a8dd1c5526d56639208bc04cb34566704da90564e7ed266b66bf3c1e0a08884fae2b321e73bdab5697eeb000ec958dc3f924b29956f602e5e1eb548f17476a0fc77f1ea466ab10ddf555e1bb7fdc7b80f29c9b703b48f1b39ba17b1ea34a618dcb982ca54000a314d6d72f51207992fda93428bbcd506ad7c87136c8219691dcf11c87e94035d4875bfa9dc8456bf959993b12b7786385a026fb048f61b923f9477ddd450e2a9c27ccad36023657d5b1eef32b0739b4baeb240eae136d27adcf9b10995644a411ec02fb4920004d2f2cce2e5b3a670487de94098a239731bcec0784d381eca5935b4165a3e0b03bf77dfff63dbe0de27989d69bc9b62cd27614a813f83b64dc6e3aa4a423e1f2ded79fd85fa71f308fd98250c38424108c009bfbe561483e08d03e52013b0e6b686a8cb61238178e5c3fdae87d6b4f77a720663ca8e07f8f68a1973c3440f56ca33a39eb83faff876573d360971cf57c391ff7dabd853410fb8cc580f2ee7b537720fbbb55970c809570366f92099d655b5d3ed8878515f97fd68fd5baf91f9e4067ddea04c0b873ca519355f8fc1cc90b76644df0d357fa5068f4659a303be3fb0273625a8cd090894fa543ec0bea314c509fbd1275d195197db3aab2092cf8d98117f0d9a43444f862653cfcbe563061fc845be6ff0a6de13f8698af122f18ed451739097109aff11ec5780dff1a5ba52c019fa10e9be60d703a686753f628bd30eef91a949c5162bc3ff2eb493412424cf93c580cf19a772f6d911392f088ab7e049ac885ec4c69c786e512c4eb4cc2dc13a4e56fdd3a15656fc07e05192e204b68d8ac8bc0a84bef771ed6fe51f3ad99e21607d921d5ee9f935e21e3cf3be2a96da1e0216d213667f384bd10f983dcc7ce26ee740bc92beb08252092fc64", 0x447, 0xe7}], 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="756e695f786c6174653d302c757466383d3100001bff25c244c4d4f8334d472dd79381fb5d06e5dd03a89854272ae90e1ad3279ffadeca430862cf633449044c74834113d7c02fe9becef4f419aa1ea67bbe9a299575726b9ebc960800"]) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="0200040000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYRESDEC=r2, @ANYRES32=0x0, @ANYBLOB="08000000a01dc698fede08686629a874adac0e3b1f520889ef7b8b3934009f68d8ab20ea031b26fae8e7949858a4cb05b31eebea11a596a2d7b8e70fe209937a881fefa520fe524c34be10941da7dd146265732603e3e23ec1000000000000e008ebac3de9272105771badf32e75f0e11ba3ca572182", @ANYRESDEC=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB="100000000000000020"], 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) keyctl$set_reqkey_keyring(0xe, 0x2) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 05:16:57 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0020000000fc6af01a1ac700ec00720e13"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000800001300"}) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000003c0)=0x4) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 05:16:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x14, r1, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 05:16:58 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x890b, &(0x7f0000000340)={'sit0\x00', 0x0}) 05:16:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xe) 05:16:58 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}, {&(0x7f0000011900)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x404fe0}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x405fe0}], 0x0, &(0x7f0000014900)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1}, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x8, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 05:16:58 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000140)='fuse\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@fsuuid={'fsuuid', 0x3d, {[0x32]}}}]}}) [ 139.770795] FAT-fs (loop5): bogus number of FAT sectors [ 139.809204] FAT-fs (loop5): Can't find a valid FAT filesystem 05:16:58 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0020000000fc6af01a1ac700ec00720e13"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000800001300"}) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000003c0)=0x4) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 05:16:58 executing program 1: r0 = eventfd2(0x401, 0x80001) read$eventfd(r0, &(0x7f0000000000), 0x8) 05:16:58 executing program 0: socket$inet(0x2, 0xd, 0x0) 05:16:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x58, 0x2, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x44, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) 05:16:58 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x200b41) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) ptrace(0x10, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) setpgid(0x0, 0xffffffffffffffff) sendmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000540)=@abs={0x1}, 0x6e, &(0x7f0000000b40), 0x0, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYRES32=r1, @ANYBLOB, @ANYRES32, @ANYRES32=r1, @ANYRES32], 0x50, 0x24004080}, 0x0) syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={0x0, 0x54}, 0x1, 0x0, 0x0, 0x24000045}, 0x0) link(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)='./file1\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {0x0, 0x0, 0x10e00}, {&(0x7f0000000900)="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", 0x447, 0xe7}], 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="756e695f786c6174653d302c757466383d3100001bff25c244c4d4f8334d472dd79381fb5d06e5dd03a89854272ae90e1ad3279ffadeca430862cf633449044c74834113d7c02fe9becef4f419aa1ea67bbe9a299575726b9ebc960800"]) mknodat(r2, &(0x7f0000000140)='./file0\x00', 0x0, 0xf0ffff) r3 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {0x0, 0x0, 0x10e00}, {&(0x7f0000000900)="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", 0x447, 0xe7}], 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="756e695f786c6174653d302c757466383d3100001bff25c244c4d4f8334d472dd79381fb5d06e5dd03a89854272ae90e1ad3279ffadeca430862cf633449044c74834113d7c02fe9becef4f419aa1ea67bbe9a299575726b9ebc960800"]) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="0200040000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYRESDEC=r2, @ANYRES32=0x0, @ANYBLOB="08000000a01dc698fede08686629a874adac0e3b1f520889ef7b8b3934009f68d8ab20ea031b26fae8e7949858a4cb05b31eebea11a596a2d7b8e70fe209937a881fefa520fe524c34be10941da7dd146265732603e3e23ec1000000000000e008ebac3de9272105771badf32e75f0e11ba3ca572182", @ANYRESDEC=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB="100000000000000020"], 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) keyctl$set_reqkey_keyring(0xe, 0x2) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 05:16:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x64, 0x0, &(0x7f0000000800)) 05:16:58 executing program 3: syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x242) 05:16:58 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0020000000fc6af01a1ac700ec00720e13"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000800001300"}) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000003c0)=0x4) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) [ 139.973057] f2fs_msg: 140 callbacks suppressed [ 139.973101] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 140.006562] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 05:16:58 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc", 0xa5, 0x400000}, {0x0, 0x0, 0x404fe0}], 0x0, &(0x7f0000014900)) [ 140.049783] F2FS-fs (loop2): invalid crc value 05:16:58 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) [ 140.095360] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 140.100760] F2FS-fs (loop2): SIT is corrupted node# 0 vs 7 [ 140.128655] F2FS-fs (loop2): Failed to initialize F2FS segment manager [ 140.140659] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 140.144296] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 140.162140] F2FS-fs (loop1): invalid crc value [ 140.170442] FAT-fs (loop5): bogus number of FAT sectors [ 140.177352] FAT-fs (loop5): Can't find a valid FAT filesystem [ 140.178017] F2FS-fs (loop1): invalid crc value 05:16:58 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x19, 0x4, 0x0, 0x14}, 0x40) 05:16:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) 05:16:58 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0020000000fc6af01a1ac700ec00720e13"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000800001300"}) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000003c0)=0x4) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 05:16:58 executing program 1: bpf$MAP_CREATE(0x9, &(0x7f00000000c0)={0x8}, 0xf) 05:16:58 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)) 05:16:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000040)="7f", 0x1) 05:16:58 executing program 0: r0 = epoll_create(0xb2e) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000000)) 05:16:58 executing program 2: remap_file_pages(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0) 05:16:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x2, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {0x1}, {}]}, @typedef]}}, &(0x7f0000000200)=""/4096, 0x52, 0x1000, 0x1}, 0x20) 05:16:58 executing program 3: r0 = socket(0x18, 0x0, 0x2) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000001040)=0xd988, 0x4) 05:16:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2400) 05:16:58 executing program 0: perf_event_open(&(0x7f0000000340)={0xd4d0076c3cc6e0d, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 140.478369] mmap: syz-executor.2 (10220) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 05:16:58 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x81}, 0x103, 0x1, 0x9d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000400)={0x30, 0x5, 0x0, {0x0, 0x3, 0x3, 0x3}}, 0x30) r1 = getpgrp(0x0) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x80, 0x40000) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x404, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, r2, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CHAR_RAW_SECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x36) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg0\x00'}) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x42}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="094a29bf7000001f0006000b000b0006000000e1c8d9d737060000933752c771d48918ffb94f6a55efe79a17cebbe578c3bef3f148e978ca3ebc88005aa058ec78e8cbbbcb53ebbb8ee84b8f8cff0a1dea2bae0851020065da846b5be9c1fa4ab02d5172dc"], 0x1c}}, 0x40) exit_group(0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') r4 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r4, &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) 05:16:58 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000180)=0x1) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x808000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}}) socket$packet(0x11, 0x0, 0x300) setresgid(0x0, 0x0, 0x0) 05:16:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x9, 0x3, 0x260, 0x0, 0x0, 0xb0, 0x0, 0xb0, 0x1c8, 0x1a8, 0x1a8, 0x1c8, 0x1a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x5, 0x6bc4}}}, {{@uncond, 0x0, 0xa0, 0x110, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "83d3c6270bdf26ca2f96536bc2e40697482f29dd6fa05cd0bdcfdde72a55c3c8bca70dae763e01370171a0fd5ff281216297c717f200"}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r1, &(0x7f0000000640)={&(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10, 0x0}, 0x0) 05:16:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000140)=""/136, 0x32, 0x88, 0x1}, 0x20) 05:16:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2400) 05:16:58 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) r1 = dup(r0) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={0x0}}, 0x0) 05:16:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @private}, {0x0, @local}, 0x78, {0x2, 0x0, @dev}, 'lo\x00'}) 05:16:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2400) [ 140.607156] ip_tables: iptables: counters copy to user failed while replacing table [ 140.623331] ip_tables: iptables: counters copy to user failed while replacing table 05:16:58 executing program 3: socketpair(0x3d, 0x0, 0x0, &(0x7f0000000000)) 05:16:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x1}, {}]}]}}, &(0x7f0000001200)=""/4101, 0x36, 0x1005, 0x1}, 0x20) 05:16:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2400) 05:16:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @private}, {0x0, @local}, 0x78, {0x2, 0x0, @dev}, 'lo\x00'}) 05:16:58 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, 0xffffffffffffffff) 05:16:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @private}, {0x0, @local}, 0x78, {0x2, 0x0, @dev}, 'lo\x00'}) 05:16:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4}, {}, {0x8, 0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000200)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 05:16:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x100000001) 05:16:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x300}, {}]}]}}, &(0x7f0000000200)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 05:16:59 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8901, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 05:16:59 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x2000) 05:16:59 executing program 2: ioperm(0x7f, 0x1, 0x4) 05:16:59 executing program 4: clock_nanosleep(0xd7df70238ab6e60c, 0x0, &(0x7f0000000200), 0x0) 05:16:59 executing program 1: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:16:59 executing program 3: epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={[0x7]}, 0x8) 05:16:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @private}, {0x0, @local}, 0x78, {0x2, 0x0, @dev}, 'lo\x00'}) 05:16:59 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}, {&(0x7f0000011900)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x404fe0}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x405fe0}], 0x0, &(0x7f0000014900)) 05:16:59 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8913, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 05:16:59 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0xfffffffffffffdc0) 05:16:59 executing program 3: io_setup(0x5ff, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000840)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff00000000}, 0x0]) 05:16:59 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) 05:16:59 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 05:16:59 executing program 0: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000980)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, 0x0}, 0x68) 05:16:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, 0x0) 05:16:59 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 05:16:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x19, 0x0, &(0x7f0000000040)) 05:16:59 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 05:16:59 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 05:16:59 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}, {&(0x7f0000011900)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x404fe0}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x405fe0}], 0x0, &(0x7f0000014900)) 05:16:59 executing program 2: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x454603) 05:16:59 executing program 3: r0 = socket$inet(0x2, 0x3, 0x5) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x8982, 0x0) 05:16:59 executing program 0: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0xffffffffffffffff) 05:16:59 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 05:16:59 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8924, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 05:16:59 executing program 3: socket$inet(0x2, 0xa, 0x0) socketpair(0x2, 0xa, 0x0, &(0x7f00000000c0)) 05:16:59 executing program 2: socket(0x5, 0x0, 0x0) 05:16:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33b, 0x36, 0x0) 05:16:59 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000900)='/dev/kvm\x00', 0x0, 0x0) 05:16:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@private2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@loopback}, 0x0, @in=@dev}}, 0xe8) 05:16:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x428, 0xffffffff, 0x0, 0x128, 0x1f8, 0xffffffff, 0xffffffff, 0x390, 0x390, 0x390, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ah={{0x30, 'ah\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="0b883458e3ed"}}}, {{@ip={@local, @dev, 0x0, 0x0, 'veth0_to_batadv\x00', 'macvlan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:devicekit_disk_exec_t:s0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x488) [ 141.870136] x_tables: ip_tables: ah match: only valid for protocol 51 05:17:00 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}, {&(0x7f0000011900)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x404fe0}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x405fe0}], 0x0, &(0x7f0000014900)) 05:17:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}) 05:17:00 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33b, 0x36, 0x0) 05:17:00 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xbc6, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 05:17:00 executing program 5: r0 = socket(0x18, 0x0, 0x2) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000540), 0x4) 05:17:00 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000240)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0x314aaee635b9c1b6, 0x0, 0x0, 0xfffffffffffffeeb) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/190, 0x0, 0xbe}, 0x20) 05:17:00 executing program 5: pipe(&(0x7f0000002180)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000600)='/dev/full\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 05:17:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x14, r1, 0x1}, 0x14}}, 0x0) 05:17:00 executing program 2: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1002) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) mlock(&(0x7f0000ffa000/0x5000)=nil, 0x5000) 05:17:00 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33b, 0x36, 0x0) 05:17:00 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000140)={0x1}) 05:17:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x2710, 0x0, &(0x7f0000fed000/0x11000)=nil}) 05:17:00 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}, {&(0x7f0000011900)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x404fe0}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x405fe0}], 0x0, &(0x7f0000014900)) 05:17:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xd}, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de8}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/netlink\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x605400, 0x0) 05:17:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000003900)={0x0, 0x0, &(0x7f0000003880)=[{&(0x7f0000002380)={0x14, 0x30, 0x1, 0x0, 0x0, "", [@nested={0x4}]}, 0x14}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000003540)={&(0x7f0000001200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, 0x0}, 0x0) 05:17:00 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33b, 0x36, 0x0) 05:17:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x2a}]}}, &(0x7f0000000200)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 05:17:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x2710, 0x0, &(0x7f0000fed000/0x11000)=nil}) [ 142.404777] tc_ctl_action: received NO action attribs 05:17:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000000)=@raw=[@jmp, @map], &(0x7f0000000040)='GPL\x00', 0x4, 0xf1, &(0x7f0000000140)=""/241, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:17:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x2710, 0x0, &(0x7f0000fed000/0x11000)=nil}) [ 142.454453] tc_ctl_action: received NO action attribs 05:17:00 executing program 3: mount$9p_fd(0x0, 0x0, 0x0, 0xb86fe17dbfdc8a2b, 0x0) 05:17:00 executing program 1: add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) 05:17:00 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/190, 0x0, 0xbe}, 0x20) 05:17:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x2710, 0x0, &(0x7f0000fed000/0x11000)=nil}) 05:17:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x18, 0x0, &(0x7f0000000040)) 05:17:01 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 05:17:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae03, 0x6) ioctl$KVM_GET_DIRTY_LOG(r1, 0x40049409, 0x0) 05:17:01 executing program 0: r0 = socket$inet(0x2, 0x3, 0x5) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x8953, 0x0) 05:17:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) 05:17:01 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[], 0x8) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 05:17:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}], 0x0, &(0x7f0000014900)) 05:17:01 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000040)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) 05:17:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0x10, 0x1, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000200)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 143.177054] audit: type=1804 audit(1608095821.340:6): pid=10509 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir633741783/syzkaller.3ScMU6/40/bus" dev="sda1" ino=15900 res=1 05:17:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @link_local}, 0x50, {0x2, 0x0, @remote}, 'team_slave_0\x00'}) [ 143.228360] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a002c018, mo2=0006] [ 143.235643] System zones: 1-2, 19-19, 35-38, 46-46 [ 143.248968] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 05:17:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) 05:17:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}], 0x0, &(0x7f0000014900)) 05:17:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x1, 0x5, 0x8, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 05:17:01 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[], 0x8) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 05:17:01 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:17:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x50, 0x2, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x50}}, 0x0) [ 143.263428] audit: type=1804 audit(1608095821.420:7): pid=10525 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir633741783/syzkaller.3ScMU6/40/bus" dev="sda1" ino=15900 res=1 05:17:01 executing program 0: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 05:17:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000540)=0x41401, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000340)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0x1fd, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r3}, 0x14) sendto$inet6(r1, &(0x7f0000000280)="0503092c1116480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 05:17:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x50, 0x2, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x50}}, 0x0) 05:17:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x7, 0x0, &(0x7f0000000040)) 05:17:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x1, &(0x7f0000000180)=@raw=[@call], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:17:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}], 0x0, &(0x7f0000014900)) [ 143.439929] audit: type=1804 audit(1608095821.600:8): pid=10552 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir633741783/syzkaller.3ScMU6/41/bus" dev="sda1" ino=15888 res=1 05:17:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x12, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:17:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x50, 0x2, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x50}}, 0x0) 05:17:01 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0xc0189436, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) [ 143.492113] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a002c018, mo2=0006] [ 143.512711] System zones: 1-2, 19-19, 35-38, 46-46 [ 143.561765] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 05:17:01 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[], 0x8) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 05:17:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000000000000000000000000005"], 0x78) 05:17:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x50, 0x2, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x50}}, 0x0) 05:17:01 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x894a, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 05:17:01 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0x8e8, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_IE={0x8cc}]}, 0x8e8}}, 0x0) 05:17:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}], 0x0, &(0x7f0000014900)) 05:17:01 executing program 1: epoll_create(0x3) 05:17:01 executing program 0: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) 05:17:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xf}]}]}}, &(0x7f0000001200)=""/4088, 0x32, 0xff8, 0x1}, 0x20) 05:17:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x65, 0x0, &(0x7f0000000800)) [ 143.746306] audit: type=1804 audit(1608095821.910:9): pid=10604 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir633741783/syzkaller.3ScMU6/42/bus" dev="sda1" ino=15890 res=1 [ 143.778694] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a002c018, mo2=0006] 05:17:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000900)={0x0, 0x0, 0x1, r2}) 05:17:01 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 143.804906] System zones: 1-2, 19-19, 35-38, 46-46 [ 143.824040] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 05:17:02 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[], 0x8) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 05:17:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x8916, &(0x7f0000000340)={'sit0\x00', 0x0}) 05:17:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:17:02 executing program 4: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1002) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) mlock(&(0x7f0000ffa000/0x5000)=nil, 0x5000) 05:17:02 executing program 3: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$clear(0x7, r0) 05:17:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000900)={0x0, 0x0, 0x1, r2}) 05:17:02 executing program 0: perf_event_open(&(0x7f0000000340)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:17:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xa7) 05:17:02 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x8983, 0x0) 05:17:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000140)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r4, r4, 0x0, 0x0) 05:17:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000900)={0x0, 0x0, 0x1, r2}) 05:17:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x5000}, 0x0) [ 144.060204] audit: type=1804 audit(1608095822.220:10): pid=10645 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir633741783/syzkaller.3ScMU6/43/bus" dev="sda1" ino=15915 res=1 [ 144.097526] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 05:17:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000140)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r4, r4, 0x0, 0x0) 05:17:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x79) 05:17:02 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:17:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x16, 0x0, &(0x7f0000000280)) 05:17:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000900)={0x0, 0x0, 0x1, r2}) 05:17:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x1, 0x301}, 0x14}}, 0x0) 05:17:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x25) 05:17:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000140)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r4, r4, 0x0, 0x0) 05:17:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000140)=""/142, &(0x7f00000000c0)=0x8e) 05:17:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000040), 0x4) 05:17:02 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, 0x0) 05:17:02 executing program 3: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000080), 0x0, &(0x7f0000000200)={0x0, r0+10000000}, 0x8) 05:17:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil}) 05:17:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x48) 05:17:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000140)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r4, r4, 0x0, 0x0) 05:17:02 executing program 2: r0 = socket$inet(0x2, 0x3, 0x5) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x89a1, 0x0) 05:17:02 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x8918, 0x0) 05:17:02 executing program 5: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:17:02 executing program 2: io_setup(0x5ff, &(0x7f0000000040)=0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000840)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, 0x0]) 05:17:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x14, r1, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 05:17:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x16) 05:17:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x0) 05:17:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 05:17:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x438, 0x130, 0x240, 0x240, 0x350, 0x350, 0x350, 0x4, 0x0, {[{{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@random="52cf53bcfbfd"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 'veth0\x00', 'syzkaller0\x00'}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "ce689f490de309c1e1778be0c1ca0aa0e8d0d6c8f42c3abe1f19bc49e75f7f85e6d6fdae8ab6045edbad87e8fb49f4aece73afd4d6fe7e633279c5936697c3cf"}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @multicast1}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@local, @multicast1, @empty}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x488) 05:17:03 executing program 4: futex(&(0x7f0000000240), 0x1, 0x0, 0x0, 0x0, 0x0) 05:17:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0xa5a}, 0x40) 05:17:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000480)={0x14, r1, 0x301}, 0x14}}, 0x0) 05:17:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x9a) 05:17:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, 0x3, 0x1, 0x201, 0x0, 0x0, {0xa}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 05:17:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x8, 0x0, 0x0, 0x0, 0x88eae038280280cd}, 0x40) 05:17:03 executing program 2: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000000)=0x3f) 05:17:03 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) 05:17:03 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000100)={0x420}, 0x420}}, 0x0) 05:17:03 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x10) 05:17:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0xa, 0x0, &(0x7f0000000800)) 05:17:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x7, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4}, {0x0, 0x5}]}, @ptr]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f0000000200)=""/4096, 0x47, 0x1000, 0x1}, 0x20) 05:17:03 executing program 1: r0 = socket(0x18, 0x0, 0x2) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, 0x0, 0x0) 05:17:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@private2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@loopback, 0x0, 0x2b}, 0x0, @in=@dev}}, 0xe8) 05:17:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x99) 05:17:03 executing program 0: socketpair(0xa, 0x2, 0x3, &(0x7f0000000000)) 05:17:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) 05:17:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@updpolicy={0x108, 0x19, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @dev}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x0, 0x1}, [@address_filter={0x28, 0x1a, {@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@local, 0xa, 0x95, 0x3}}, @mark={0xc, 0x15, {0x35075a, 0x4}}, @replay_esn_val={0x1c}]}, 0x108}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 05:17:03 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:17:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', 0x0}) 05:17:03 executing program 5: mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000580)=""/129) 05:17:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x301, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 05:17:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x18, 0x2, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4, 0xb}]}, 0x18}}, 0x0) 05:17:03 executing program 4: prctl$PR_SET_PDEATHSIG(0x1, 0xffffffff00200000) 05:17:03 executing program 5: perf_event_open(&(0x7f0000000000)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:17:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x1c, 0x3, 0x1, 0x301, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}]}, 0x1c}}, 0x0) 05:17:03 executing program 3: perf_event_open(&(0x7f0000000000)={0x8, 0x70, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:17:03 executing program 0: keyctl$get_security(0x5, 0x0, 0x0, 0x0) 05:17:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8923, &(0x7f0000004940)={'ip6gre0\x00', &(0x7f00000048c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @mcast1}}) 05:17:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x2c, 0x0, 0x0) 05:17:03 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), 0x4) 05:17:03 executing program 0: r0 = socket(0x11, 0x3, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) 05:17:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)={0x188, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x78, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @empty}}, {0x14, 0x2, @in={0x2, 0x0, @loopback}}}}]}, @TIPC_NLA_MEDIA={0x4c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_SOCK={0x25, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}]}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8}]}]}, 0x188}}, 0x0) 05:17:03 executing program 2: socket$inet(0x2, 0x1, 0x3) 05:17:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, &(0x7f0000000140)) 05:17:03 executing program 1: syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f00000000c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}}) 05:17:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xc) 05:17:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x3b) 05:17:03 executing program 1: add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffd9f, 0xffffffffffffffff) 05:17:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1}) [ 145.433331] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.4'. [ 145.460974] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.4'. 05:17:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, 0x0, &(0x7f0000000080)) 05:17:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 05:17:03 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') readv(r2, &(0x7f0000000380)=[{&(0x7f0000000100)=""/253, 0xfd}], 0x600) 05:17:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x15) 05:17:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x14, 0x0, &(0x7f0000000040)) 05:17:03 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc", 0xa5, 0x400000}], 0x0, &(0x7f0000014900)) 05:17:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1}) 05:17:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x32) 05:17:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000040)="7fc4813c", 0x4) 05:17:03 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}, {&(0x7f0000011900)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x404fe0}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x405fe0}], 0x0, &(0x7f0000014900)) [ 145.654637] f2fs_msg: 90 callbacks suppressed [ 145.654646] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 05:17:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1}) 05:17:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) getsockopt$inet6_udp_int(r1, 0x10e, 0x0, 0x0, 0x0) 05:17:03 executing program 2: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000000)={0x0, &(0x7f0000000200)=""/4096, 0x0, 0x1000}, 0x20) [ 145.704255] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 05:17:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x2, 0x0, 0x0, 0xe0d, 0x0, 0x1}, 0x40) 05:17:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x31, 0x0, 0x6) 05:17:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x2d) [ 145.754415] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 145.782945] F2FS-fs (loop1): invalid crc value [ 145.792921] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 05:17:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000580)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x20}}, 0x0) [ 145.827801] F2FS-fs (loop1): invalid crc value [ 145.845831] F2FS-fs (loop1): Failed to get valid F2FS checkpoint [ 145.861891] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 145.874601] F2FS-fs (loop4): invalid crc value [ 145.881751] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 05:17:04 executing program 1: munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) socketpair(0x0, 0x0, 0x0, &(0x7f0000001000)) 05:17:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x44, 0x2, 0x2, 0x3, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @dev}}}]}]}, 0x44}}, 0x0) 05:17:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1}) 05:17:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{}, {0x1, @broadcast}, 0x8, {0x2, 0x0, @private}, 'ip_vti0\x00'}) 05:17:04 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}, {&(0x7f0000011900)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x404fe0}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x405fe0}], 0x0, &(0x7f0000014900)) 05:17:04 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000600)='/dev/full\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x300002c0) 05:17:04 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x10}, 0x10}}, 0x0) 05:17:04 executing program 5: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1002) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 05:17:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x5}, 0x14}}, 0x0) 05:17:04 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 05:17:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f00000026c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40012100, 0x0) 05:17:04 executing program 1: sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x10000040) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, &(0x7f0000000280)=""/217, 0xfffffd0e, 0xbe}, 0x20) getpgid(0x0) 05:17:04 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8931, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 05:17:04 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_INPUT(r0, &(0x7f0000000340)={0x8, {"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", 0x1000}}, 0x1006) 05:17:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2c, 0x2, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_CFG_FLAGS={0x8}, @NFQA_CFG_MASK={0x8}, @NFQA_CFG_CMD={0x8}]}, 0x2c}}, 0x0) 05:17:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x11, 0x0, &(0x7f0000000040)) 05:17:04 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}, {&(0x7f0000011900)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x404fe0}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x405fe0}], 0x0, &(0x7f0000014900)) 05:17:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x5, 0x0, [{}]}]}}, &(0x7f0000000200)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 05:17:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc200b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x758f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:17:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) connect$nfc_raw(r1, &(0x7f0000000040), 0x20000050) 05:17:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x78}]}) 05:17:04 executing program 2: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000002880)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f00000028c0)=0x10) 05:17:04 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8907, 0x0) 05:17:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, &(0x7f0000000040)) 05:17:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x37, 0x0, 0x0, 0x0) 05:17:04 executing program 1: mincore(&(0x7f0000ff5000/0x4000)=nil, 0x4000, 0x0) mincore(&(0x7f0000ff4000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/92) 05:17:04 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0xffffffffffffffff, 0x0}, 0x20) 05:17:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x2e, 0x0, 0x0) 05:17:04 executing program 4: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000002000000010000000000000000400000000000000b0000001e0000000200000002000000020000000200000016000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x400}, {&(0x7f0000010c00)="d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xa6, 0x400000}, {&(0x7f0000010d00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x400fe0}, {&(0x7f0000011900)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000020000000000000b00000000000000150000001500000010000000140000001200000010000000ffffffffffffffffffffffffffffffffffffffff030006000000000000000000000000000e0000000200000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x404fe0}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000000000000000000ae8bfed7", 0x20, 0x405fe0}], 0x0, &(0x7f0000014900)) 05:17:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x33) 05:17:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f00000006c0)='-', 0x1) 05:17:04 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 05:17:04 executing program 3: futex(0x0, 0x8b, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000080), 0x0) 05:17:04 executing program 0: socketpair(0x10, 0x0, 0x7, &(0x7f0000000280)) 05:17:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x9) 05:17:04 executing program 5: clock_gettime(0x6, &(0x7f0000000380)) 05:17:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_cred(r0, 0x6, 0x11, 0x0, 0x0) 05:17:04 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:17:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x21, 0x0, &(0x7f0000000040)) 05:17:05 executing program 3: accept4(0xffffffffffffffff, 0x0, 0x0, 0x81000) 05:17:05 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) mmap$usbfs(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x8052, r0, 0x0) 05:17:05 executing program 1: prctl$PR_GET_NAME(0x10, &(0x7f00000001c0)=""/201) 05:17:05 executing program 2: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000000000000000000000400000000000000000000000000000000000000000000000042000000000000000100000000000000000000115cc36d4470c4a65599be254d4c737a549dd4e2da47945b0332a3188d58049c16f6b09e05a0d1c29cf12309fad0ff6d0296dc117ba27bd7132ba90b66"]) open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000002c2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0054f) dup(0xffffffffffffffff) 05:17:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0xc}, {}]}]}}, &(0x7f0000000200)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 05:17:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:17:05 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8932, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 05:17:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) syz_mount_image$fuse(&(0x7f00000001c0)='fuse\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@dont_measure='dont_measure'}]}}) 05:17:05 executing program 3: r0 = socket$inet(0x2, 0x3, 0x5) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x8941, 0x0) 05:17:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) 05:17:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) 05:17:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x2, 0x0, &(0x7f0000000040)) 05:17:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000005880)={'nat\x00', 0x2, [{}, {}]}, 0x48) 05:17:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x1, 0x5, 0x8}, 0x40) 05:17:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xd7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:17:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x42) 05:17:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chroot(&(0x7f00000000c0)='./file0\x00') chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) 05:17:06 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/84, 0x54}], 0x1) 05:17:06 executing program 4: keyctl$reject(0x13, 0x0, 0x0, 0xfff, 0x0) 05:17:06 executing program 0: r0 = socket(0x18, 0x0, 0x2) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f00000089c0)) 05:17:06 executing program 3: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 05:17:06 executing program 0: r0 = socket$inet(0x2, 0x3, 0x5) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x8917, 0x0) 05:17:06 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f00