[ 36.512867] audit: type=1800 audit(1539211932.839:22): pid=5694 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0 [ 36.540515] audit: type=1800 audit(1539211932.839:23): pid=5694 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rsyslog" dev="sda1" ino=2442 res=0 [ 36.564580] audit: type=1800 audit(1539211932.839:24): pid=5694 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="sudo" dev="sda1" ino=2454 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.48' (ECDSA) to the list of known hosts. 2018/10/10 22:52:24 fuzzer started 2018/10/10 22:52:27 dialing manager at 10.128.0.26:42895 2018/10/10 22:52:27 syscalls: 1 2018/10/10 22:52:27 code coverage: enabled 2018/10/10 22:52:27 comparison tracing: enabled 2018/10/10 22:52:27 setuid sandbox: enabled 2018/10/10 22:52:27 namespace sandbox: enabled 2018/10/10 22:52:27 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/10 22:52:27 fault injection: enabled 2018/10/10 22:52:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/10 22:52:27 net packed injection: enabled 2018/10/10 22:52:27 net device setup: enabled 22:53:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x1c, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x0, @dev}}}, 0x1cb) syzkaller login: [ 99.357663] IPVS: ftp: loaded support on port[0] = 21 22:53:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000080)=0xfffffffffffffeb2, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)='\n', 0x1) sendmmsg(r1, &(0x7f0000001600)=[{{&(0x7f0000000140)=@sco, 0x80, &(0x7f00000006c0)}}, {{&(0x7f0000000740)=@rc, 0x80, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)}}], 0x2, 0x0) [ 99.588719] IPVS: ftp: loaded support on port[0] = 21 22:53:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{&(0x7f0000000000)=@in={0x2, 0x4e22, @dev}, 0x80, &(0x7f0000001180), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1400000000000000000000000100000047e04087"], 0x14}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) [ 99.821414] IPVS: ftp: loaded support on port[0] = 21 22:53:16 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/177, 0xb1}, {&(0x7f0000000280)=""/160, 0xa0}, {&(0x7f0000000100)=""/91, 0x5b}, {&(0x7f0000000340)=""/177, 0xb1}, {&(0x7f00000018c0)=""/4096, 0x1000}], 0x5}, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000006fc0), 0x264, 0x2002, 0x0) [ 100.286728] IPVS: ftp: loaded support on port[0] = 21 22:53:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={"6e6174000000000000000300", 0x19, 0x1, 0x238, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, &(0x7f0000000240), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x800, 'ifb0\x00', 'dummy0\x00', 'ip_vti0\x00', 'ip6tnl0\x00', @remote, [], @link_local, [], 0xf0, 0x170, 0x1a8, [@ip={'ip\x00', 0x20, {{@loopback, @dev, 0x0, 0x0, 0x0, 0x84}}}, @realm={'realm\x00', 0x2f}]}, [@arpreply={'arpreply\x00', 0x10, {{@local}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}]}, 0x2b0) [ 100.555267] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.576099] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.593710] device bridge_slave_0 entered promiscuous mode [ 100.686305] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.706643] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.720589] device bridge_slave_1 entered promiscuous mode [ 100.821104] IPVS: ftp: loaded support on port[0] = 21 [ 100.849062] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 100.980560] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 101.007585] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.029041] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.048997] device bridge_slave_0 entered promiscuous mode 22:53:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa}]}}}]}, 0x3c}}, 0x0) [ 101.136074] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.164486] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.176725] device bridge_slave_1 entered promiscuous mode [ 101.303400] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 101.325835] IPVS: ftp: loaded support on port[0] = 21 [ 101.344773] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 101.450315] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 101.458288] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 101.571822] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.588892] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.596128] device bridge_slave_0 entered promiscuous mode [ 101.617724] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 101.660031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 101.691004] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.697421] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.718055] device bridge_slave_1 entered promiscuous mode [ 101.806758] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 101.859779] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 101.930632] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 101.959721] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 101.986764] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 101.999520] team0: Port device team_slave_0 added [ 102.055906] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.074098] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.087834] device bridge_slave_0 entered promiscuous mode [ 102.100329] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 102.113789] team0: Port device team_slave_1 added [ 102.193795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 102.234329] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.245645] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.253502] device bridge_slave_1 entered promiscuous mode [ 102.261319] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 102.270633] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 102.293499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 102.306112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 102.336791] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 102.349706] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 102.359518] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 102.368195] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 102.407018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.421080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 102.442607] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 102.464962] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 102.499033] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 102.509176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.523798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 102.550934] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 102.565702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 102.697781] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 102.711914] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 102.729707] team0: Port device team_slave_0 added [ 102.737589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 102.781851] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 102.833427] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 102.841843] team0: Port device team_slave_1 added [ 102.884515] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.898923] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.908553] device bridge_slave_0 entered promiscuous mode [ 102.936999] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 102.956988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 103.009339] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 103.017775] team0: Port device team_slave_0 added [ 103.036896] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.058840] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.069818] device bridge_slave_1 entered promiscuous mode [ 103.109073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 103.142161] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 103.157051] team0: Port device team_slave_1 added [ 103.172657] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 103.184977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.199973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 103.209676] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 103.216825] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.249245] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.256468] device bridge_slave_0 entered promiscuous mode [ 103.271239] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 103.283268] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 103.305660] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 103.325127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.335925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 103.351365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 103.375998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 103.390108] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 103.413636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 103.424089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 103.447565] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.468915] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.480484] device bridge_slave_1 entered promiscuous mode [ 103.517905] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 103.541545] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 103.550551] team0: Port device team_slave_0 added [ 103.555921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.565237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 103.581098] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 103.602025] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 103.619182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.634424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 103.662772] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 103.672766] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 103.681476] team0: Port device team_slave_1 added [ 103.688365] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 103.768627] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.775082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.781759] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.788119] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.801708] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 103.840281] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 103.849394] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 103.945449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 104.033991] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 104.041394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 104.051969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 104.067744] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 104.106965] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 104.139079] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 104.149524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 104.183523] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 104.280102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 104.362256] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 104.374052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 104.406593] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 104.416910] team0: Port device team_slave_0 added [ 104.538573] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 104.559505] team0: Port device team_slave_1 added [ 104.574939] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.581353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.587994] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.594396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.602626] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 104.625513] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 104.672567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 104.691814] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 104.729979] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 104.737752] team0: Port device team_slave_0 added [ 104.761860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 104.808996] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 104.816167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 104.824341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 104.866239] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.872634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.879308] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.885662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.905109] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 104.916662] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 104.924631] team0: Port device team_slave_1 added [ 104.932364] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 104.981770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.007697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.029399] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 105.070876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 105.158447] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 105.173114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.192672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.267357] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 105.275556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.285219] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.293391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 105.301226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 105.404191] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.410650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.417299] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.423701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.441693] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 106.074650] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.081070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.087702] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.094102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.115303] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 106.354581] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.361006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.367641] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.374047] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.390363] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 106.398289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.406160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.413657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 107.953780] 8021q: adding VLAN 0 to HW filter on device bond0 [ 108.303454] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 108.693996] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 108.709587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 108.718081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.742013] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.067478] 8021q: adding VLAN 0 to HW filter on device team0 [ 109.119139] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.156740] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 109.477866] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 109.612552] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.634833] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 109.641984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.660210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.879907] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 109.886622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.902843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.982739] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 110.045579] 8021q: adding VLAN 0 to HW filter on device team0 [ 110.229279] 8021q: adding VLAN 0 to HW filter on device team0 [ 110.339623] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 110.345886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 110.357210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.371724] 8021q: adding VLAN 0 to HW filter on device bond0 [ 110.481364] 8021q: adding VLAN 0 to HW filter on device bond0 [ 110.759115] 8021q: adding VLAN 0 to HW filter on device team0 [ 110.811523] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 110.896301] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 111.190047] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 111.196194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.204311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.262944] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 111.276504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.291079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.610380] 8021q: adding VLAN 0 to HW filter on device team0 [ 111.672865] 8021q: adding VLAN 0 to HW filter on device team0 22:53:28 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000001c0), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=@ipv6_newroute={0x30, 0x18, 0xa21, 0x0, 0x0, {}, [@RTA_GATEWAY={0x14, 0x5, @loopback}]}, 0x30}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x492492492492861, 0x0) 22:53:28 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60) r2 = epoll_create(0x6) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:53:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x10, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @remote}}}, 0x7a) 22:53:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000015c0)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001200)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000001640)=""/4096, 0x12c1}], 0x1, &(0x7f0000fb3fa9)=""/87, 0xffffffffffffffea}, 0x0) 22:53:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmmsg(r1, &(0x7f000000ac80)=[{{&(0x7f0000001240)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001600), 0x0, &(0x7f0000000400)}}, {{0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000140)=[{0x18, 0x29, 0x3b, 'hv'}], 0x18}}], 0x2, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000340)='%', 0x1}], 0x1, &(0x7f0000000480)=ANY=[]}, 0x5) recvmmsg(r0, &(0x7f0000000800)=[{{&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000640)=""/238, 0xee}], 0x1, &(0x7f0000000740)=""/190, 0xbe}}], 0x1, 0x141, &(0x7f0000000400)) 22:53:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000015c0)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001200)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000001640)=""/4096, 0x12c1}], 0x1, &(0x7f0000fb3fa9)=""/87, 0xffffffffffffffea}, 0x0) 22:53:29 executing program 0: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) bind(r0, &(0x7f0000d01ff0)=ANY=[], 0x0) close(r0) [ 112.941533] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 112.958656] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 112.980927] netlink: 'syz-executor3': attribute type 29 has an invalid length. 22:53:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000015c0)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001200)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000001640)=""/4096, 0x12c1}], 0x1, &(0x7f0000fb3fa9)=""/87, 0xffffffffffffffea}, 0x0) 22:53:29 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x5c}, 0x8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000100)="a1", 0x1, 0x8dffffff, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 113.002711] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 113.015288] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 113.024274] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 113.043292] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 113.067857] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 113.078090] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 113.085883] netlink: 'syz-executor3': attribute type 29 has an invalid length. 22:53:29 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/177, 0xb1}, {&(0x7f0000000280)=""/160, 0xa0}, {&(0x7f0000000100)=""/91, 0x5b}, {&(0x7f0000000340)=""/177, 0xb1}, {&(0x7f00000018c0)=""/4096, 0x1000}], 0x5}, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000006fc0), 0x264, 0x2002, 0x0) 22:53:29 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60) r2 = epoll_create(0x6) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:53:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa}]}}}]}, 0x3c}}, 0x0) 22:53:29 executing program 0: r0 = socket(0x100000000a, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) 22:53:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000015c0)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001200)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000001640)=""/4096, 0x12c1}], 0x1, &(0x7f0000fb3fa9)=""/87, 0xffffffffffffffea}, 0x0) 22:53:29 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/177, 0xb1}, {&(0x7f0000000280)=""/160, 0xa0}, {&(0x7f0000000100)=""/91, 0x5b}, {&(0x7f0000000340)=""/177, 0xb1}, {&(0x7f00000018c0)=""/4096, 0x1000}], 0x5}, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000006fc0), 0x264, 0x2002, 0x0) 22:53:29 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60) r2 = epoll_create(0x6) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:53:29 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60) r2 = epoll_create(0x6) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:53:30 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/177, 0xb1}, {&(0x7f0000000280)=""/160, 0xa0}, {&(0x7f0000000100)=""/91, 0x5b}, {&(0x7f0000000340)=""/177, 0xb1}, {&(0x7f00000018c0)=""/4096, 0x1000}], 0x5}, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000006fc0), 0x264, 0x2002, 0x0) 22:53:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 22:53:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa}]}}}]}, 0x3c}}, 0x0) 22:53:30 executing program 2: syz_emit_ethernet(0x158, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x2b, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000100)) 22:53:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa}]}}}]}, 0x3c}}, 0x0) 22:53:30 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60) r2 = epoll_create(0x6) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:53:30 executing program 3: socket(0xf, 0x3, 0x0) 22:53:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000280)='\a\x00\x00\x00', 0x4) 22:53:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000000c0), 0x0) 22:53:30 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60) r2 = epoll_create(0x6) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:53:30 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000000040)={&(0x7f0000004fb8)={0x5, 0x1, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}}, 0x0) 22:53:30 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60) r2 = epoll_create(0x6) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:53:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000280)='\a\x00\x00\x00', 0x4) 22:53:30 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0xe2e4, 0x20000fff}) 22:53:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000280)='\a\x00\x00\x00', 0x4) 22:53:30 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000000040)={&(0x7f0000004fb8)={0x5, 0x1, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}}, 0x0) 22:53:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000280)='\a\x00\x00\x00', 0x4) 22:53:31 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60) r2 = epoll_create(0x6) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:53:31 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000000040)={&(0x7f0000004fb8)={0x5, 0x1, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}}, 0x0) 22:53:31 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0xe2e4, 0x20000fff}) 22:53:31 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000000040)={&(0x7f0000004fb8)={0x5, 0x1, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}}, 0x0) 22:53:31 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60) r2 = epoll_create(0x6) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:53:31 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000000040)={&(0x7f0000004fb8)={0x5, 0x1, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}}, 0x0) 22:53:31 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60) r2 = epoll_create(0x6) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:53:31 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000000040)={&(0x7f0000004fb8)={0x5, 0x1, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}}, 0x0) 22:53:31 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x9, &(0x7f0000000100)=@req3, 0x3) 22:53:31 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0xe2e4, 0x20000fff}) 22:53:31 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000000040)={&(0x7f0000004fb8)={0x5, 0x1, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}}, 0x0) 22:53:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)="2f02726f75702e7374617000a3c3afd2dbb9fd60b1275d6051e52992391deefbc7830340a7d12baee4e138a9e729281793d907002f5147ceb3c2e99d6cb0bd00cfd55a660b2d3e8cab6a2fd907c8c9c210eaeccfca1d4899493ab60eb3e6e6317d05ee1e6543bd92ada18b7b8b6597e86b41f587283e3baa7c42a6814bf4775c9b23e40b8174e9eca285c0f5891c7f719850aac708054611f8e585bc4a400b9dc5918273e4dba4eb00eacaa039161a4cee106ecd46856f", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0xffffffff}) [ 115.213248] syz-executor5 (7585) used greatest stack depth: 14992 bytes left 22:53:31 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}, 0xb) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f0000000140), &(0x7f0000000180), 0x8) 22:53:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0xfffff029}]}, 0x10) 22:53:31 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0xe2e4, 0x20000fff}) 22:53:31 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x1) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000001c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_opts(r1, 0x0, 0x800000000000003, &(0x7f00000000c0), 0x0) 22:53:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)="2f02726f75702e7374617000a3c3afd2dbb9fd60b1275d6051e52992391deefbc7830340a7d12baee4e138a9e729281793d907002f5147ceb3c2e99d6cb0bd00cfd55a660b2d3e8cab6a2fd907c8c9c210eaeccfca1d4899493ab60eb3e6e6317d05ee1e6543bd92ada18b7b8b6597e86b41f587283e3baa7c42a6814bf4775c9b23e40b8174e9eca285c0f5891c7f719850aac708054611f8e585bc4a400b9dc5918273e4dba4eb00eacaa039161a4cee106ecd46856f", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0xffffffff}) 22:53:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)="2f02726f75702e7374617000a3c3afd2dbb9fd60b1275d6051e52992391deefbc7830340a7d12baee4e138a9e729281793d907002f5147ceb3c2e99d6cb0bd00cfd55a660b2d3e8cab6a2fd907c8c9c210eaeccfca1d4899493ab60eb3e6e6317d05ee1e6543bd92ada18b7b8b6597e86b41f587283e3baa7c42a6814bf4775c9b23e40b8174e9eca285c0f5891c7f719850aac708054611f8e585bc4a400b9dc5918273e4dba4eb00eacaa039161a4cee106ecd46856f", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0xffffffff}) 22:53:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x4) 22:53:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7e228e36d99e2f0265df5dc7b581280cd556138d5f0e0658d18fb7c", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYRESDEC], 0xffffff18) recvmmsg(r1, &(0x7f0000008e80)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x34010}], 0x1, &(0x7f0000001680)=""/72, 0x48}}], 0x1, 0x0, &(0x7f0000002240)) 22:53:32 executing program 3: socketpair$unix(0x1, 0x801, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x100000001) ioctl(r2, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") sendmmsg(0xffffffffffffffff, &(0x7f000000d8c0), 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB='s'], 0x1) recvfrom(r1, &(0x7f0000003540)=""/68, 0x44, 0x0, &(0x7f0000003640)=@hci, 0x705000) 22:53:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)="2f02726f75702e7374617000a3c3afd2dbb9fd60b1275d6051e52992391deefbc7830340a7d12baee4e138a9e729281793d907002f5147ceb3c2e99d6cb0bd00cfd55a660b2d3e8cab6a2fd907c8c9c210eaeccfca1d4899493ab60eb3e6e6317d05ee1e6543bd92ada18b7b8b6597e86b41f587283e3baa7c42a6814bf4775c9b23e40b8174e9eca285c0f5891c7f719850aac708054611f8e585bc4a400b9dc5918273e4dba4eb00eacaa039161a4cee106ecd46856f", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0xffffffff}) 22:53:32 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000480)={'team0\x00', 0x820dedf80ded09bd}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = socket$inet(0x15, 0x5, 0x0) r3 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004500005800000000002f9078ac14ffaaffffffffb4018c0b0009000000000000000086dd000000210000000010000000e1404fa20100000000000000080022eb00000000200046140200000000000000000000000800655800"], 0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f00000002c0)=""/195, &(0x7f0000000040)=0xc3) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x5}, 0x10) sendto$inet(r2, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x5, 0x100, &(0x7f0000000200)={0xffffffffffffffff}) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000240)=0x2, 0x4) close(r2) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000440)={0xc, @local, 0x4e20, 0x4, 'nq\x00', 0x0, 0x0, 0xb5}, 0x2c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e22, 0x7ff, @mcast1}, @in={0x2, 0x0, @broadcast}, @in6={0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x793f}, 0x5}, @in6={0xa, 0x4e20, 0x9, @dev={0xfe, 0x80, [], 0x21}, 0x2eb}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}, @in={0x2, 0x4e20}, @in6={0xa, 0x4e23, 0x6, @loopback, 0x2}], 0xb0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000000)={0x3, 0x200, 0x40}) sendfile(r3, r4, 0x0, 0x8) 22:53:32 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000040), 0xe) listen(r0, 0x0) shutdown(r0, 0x0) 22:53:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4, 0x0, 0xf6250100}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x10, 0x11, [@generic="e2abb4ec7645192056d52f"]}]}, 0x24}}, 0x0) 22:53:32 executing program 3: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0xfff, 0x4) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r1, 0x8912, &(0x7f00000005c0)="153f6234488dd25d5c6070") setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_emit_ethernet(0x3e, &(0x7f0000001180)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b7e720", 0x8, 0x11, 0x0, @local, @local, {[], @icmpv6=@echo_request}}}}}, &(0x7f0000000180)) 22:53:32 executing program 5: syz_emit_ethernet(0x6a, &(0x7f0000000140)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80, 0x2c00000000000000}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0xf, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local, @dev, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f00000000c0)) [ 115.980840] sysfs: cannot create duplicate filename '/class/ieee80211/â«´ìvE VÕ!' [ 116.013280] CPU: 0 PID: 7644 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #136 [ 116.020591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.029944] Call Trace: [ 116.032561] dump_stack+0x1c4/0x2b4 [ 116.036209] ? dump_stack_print_info.cold.2+0x52/0x52 [ 116.041814] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 116.046932] sysfs_warn_dup.cold.3+0x1c/0x2b [ 116.051360] sysfs_do_create_link_sd.isra.2+0x116/0x130 [ 116.056730] sysfs_create_link+0x65/0xc0 [ 116.060803] device_add+0x5d0/0x17b0 [ 116.064518] ? genl_rcv_msg+0xc6/0x168 [ 116.068411] ? netlink_rcv_skb+0x172/0x440 [ 116.072671] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 116.078304] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 116.084195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 116.089747] wiphy_register+0x1a5e/0x2770 [ 116.093933] ? wiphy_unregister+0x1380/0x1380 [ 116.098457] ? kasan_unpoison_shadow+0x35/0x50 [ 116.103675] ? kasan_kmalloc+0xc7/0xe0 [ 116.107919] ? __kmalloc+0x31c/0x760 [ 116.111635] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 116.117179] ? ieee80211_cs_list_valid+0x7c/0x440 [ 116.122035] ? ieee80211_register_hw+0xcf5/0x3b00 [ 116.126892] ieee80211_register_hw+0x15a7/0x3b00 [ 116.131660] ? ieee80211_ifa_changed+0xed0/0xed0 [ 116.136422] mac80211_hwsim_new_radio+0x1e49/0x3460 [ 116.141452] ? __rhashtable_insert_fast.constprop.53+0xf00/0xf00 [ 116.147600] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 116.153134] ? vsnprintf+0x20d/0x1b60 [ 116.156949] ? pointer+0x990/0x990 [ 116.160531] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 116.165556] ? kvasprintf+0xee/0x150 [ 116.169277] ? bust_spinlocks+0xe0/0xe0 [ 116.173263] ? kasprintf+0xab/0xe0 [ 116.176806] ? kvasprintf_const+0x190/0x190 [ 116.181139] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 116.186689] hwsim_new_radio_nl+0x7dc/0xb20 [ 116.191014] ? nla_parse+0x2f9/0x480 [ 116.194733] ? mac80211_hwsim_new_radio+0x3460/0x3460 [ 116.199956] ? __netlink_ns_capable+0x100/0x130 [ 116.204672] genl_family_rcv_msg+0x8a9/0x1140 [ 116.209614] ? genl_unregister_family+0x8a0/0x8a0 [ 116.215334] ? __radix_tree_insert+0x8f0/0x8f0 [ 116.219928] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 116.225746] ? lock_acquire+0x1ed/0x520 [ 116.229729] ? genl_rcv+0x19/0x40 [ 116.233195] genl_rcv_msg+0xc6/0x168 [ 116.236917] netlink_rcv_skb+0x172/0x440 [ 116.240991] ? genl_family_rcv_msg+0x1140/0x1140 [ 116.245750] ? netlink_ack+0xb80/0xb80 [ 116.249648] genl_rcv+0x28/0x40 [ 116.252930] netlink_unicast+0x5a5/0x760 [ 116.257006] ? netlink_attachskb+0x9a0/0x9a0 [ 116.261413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 116.266952] netlink_sendmsg+0xa18/0xfc0 [ 116.271027] ? netlink_unicast+0x760/0x760 [ 116.275263] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 116.280197] ? apparmor_socket_sendmsg+0x29/0x30 [ 116.284952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 116.290503] ? security_socket_sendmsg+0x94/0xc0 [ 116.295265] ? netlink_unicast+0x760/0x760 [ 116.299502] sock_sendmsg+0xd5/0x120 [ 116.303214] ___sys_sendmsg+0x7fd/0x930 [ 116.307196] ? copy_msghdr_from_user+0x580/0x580 [ 116.311954] ? __fd_install+0x2b5/0x8f0 [ 116.315947] ? __fget_light+0x2e9/0x430 [ 116.319931] ? fget_raw+0x20/0x20 [ 116.323396] ? lock_downgrade+0x900/0x900 [ 116.327553] ? lock_release+0x970/0x970 [ 116.331529] ? arch_local_save_flags+0x40/0x40 [ 116.336115] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 116.341572] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 116.347117] ? sockfd_lookup_light+0xc5/0x160 [ 116.351619] __sys_sendmsg+0x11d/0x280 [ 116.355533] ? __ia32_sys_shutdown+0x80/0x80 [ 116.360305] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 116.365847] ? put_timespec64+0x10f/0x1b0 [ 116.370007] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 116.375473] __x64_sys_sendmsg+0x78/0xb0 [ 116.379535] do_syscall_64+0x1b9/0x820 [ 116.383421] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 116.388787] ? syscall_return_slowpath+0x5e0/0x5e0 [ 116.393717] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 116.398571] ? trace_hardirqs_on_caller+0x310/0x310 [ 116.403598] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 116.408623] ? prepare_exit_to_usermode+0x291/0x3b0 [ 116.413648] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 116.418501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 116.423695] RIP: 0033:0x457519 [ 116.426890] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 116.445787] RSP: 002b:00007f4f03b7bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 116.453498] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 116.460766] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 116.468033] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 116.475300] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f03b7c6d4 22:53:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000080)={0x6, @empty, 0x4e20, 0x0, 'lblcr\x00'}, 0x2c) 22:53:32 executing program 2: syz_emit_ethernet(0x2a, &(0x7f00000005c0)={@broadcast, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @broadcast, @empty, @local}}}}, &(0x7f0000001740)) 22:53:32 executing program 5: syz_emit_ethernet(0x6a, &(0x7f0000000140)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80, 0x2c00000000000000}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0xf, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local, @dev, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f00000000c0)) [ 116.482567] R13: 00000000004c3830 R14: 00000000004d5670 R15: 00000000ffffffff 22:53:32 executing program 1: setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000140)={0x0, 0x2000000000007ffd, 0x20000000001}, 0xc) pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000), 0x282, 0x0) 22:53:32 executing program 5: syz_emit_ethernet(0x6a, &(0x7f0000000140)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80, 0x2c00000000000000}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0xf, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local, @dev, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f00000000c0)) 22:53:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000006000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x5, &(0x7f0000006000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0xffffffc5, 0x1}]}, &(0x7f0000000400)="73797a6b6aaea4500183f4f69a28b4a9135eec9746a7656c6c65720080f470791ee2351469e29e9b0800000000000000ae6bc61296dd", 0x4, 0x1000, &(0x7f0000008000)=""/4096}, 0x48) 22:53:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4, 0x0, 0xf6250100}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x10, 0x11, [@generic="e2abb4ec7645192056d52f"]}]}, 0x24}}, 0x0) [ 116.712941] sysfs: cannot create duplicate filename '/class/ieee80211/â«´ìvE VÕ!' [ 116.744131] CPU: 0 PID: 7686 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #136 [ 116.751437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.760788] Call Trace: [ 116.763428] dump_stack+0x1c4/0x2b4 [ 116.767101] ? dump_stack_print_info.cold.2+0x52/0x52 [ 116.772303] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 116.777427] sysfs_warn_dup.cold.3+0x1c/0x2b [ 116.781856] sysfs_do_create_link_sd.isra.2+0x116/0x130 [ 116.787243] sysfs_create_link+0x65/0xc0 [ 116.791308] device_add+0x5d0/0x17b0 [ 116.795019] ? genl_rcv_msg+0xc6/0x168 [ 116.798909] ? netlink_rcv_skb+0x172/0x440 [ 116.803148] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 116.808256] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 116.813451] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 116.819006] wiphy_register+0x1a5e/0x2770 [ 116.823162] ? wiphy_unregister+0x1380/0x1380 [ 116.827654] ? kasan_unpoison_shadow+0x35/0x50 [ 116.832233] ? kasan_kmalloc+0xc7/0xe0 [ 116.836133] ? __kmalloc+0x31c/0x760 [ 116.839847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 116.845388] ? ieee80211_cs_list_valid+0x7c/0x440 [ 116.850232] ? ieee80211_register_hw+0xcf5/0x3b00 [ 116.855604] ieee80211_register_hw+0x15a7/0x3b00 [ 116.860371] ? ieee80211_ifa_changed+0xed0/0xed0 [ 116.865134] mac80211_hwsim_new_radio+0x1e49/0x3460 [ 116.870593] ? __rhashtable_insert_fast.constprop.53+0xf00/0xf00 [ 116.876737] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 116.882273] ? vsnprintf+0x20d/0x1b60 [ 116.886230] ? pointer+0x990/0x990 [ 116.889981] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 116.895000] ? kvasprintf+0xee/0x150 [ 116.898710] ? bust_spinlocks+0xe0/0xe0 [ 116.902696] ? kasprintf+0xab/0xe0 [ 116.906243] ? kvasprintf_const+0x190/0x190 [ 116.910570] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 116.916109] hwsim_new_radio_nl+0x7dc/0xb20 [ 116.920431] ? nla_parse+0x2f9/0x480 [ 116.924146] ? mac80211_hwsim_new_radio+0x3460/0x3460 [ 116.929338] ? __netlink_ns_capable+0x100/0x130 [ 116.934007] genl_family_rcv_msg+0x8a9/0x1140 [ 116.938507] ? genl_unregister_family+0x8a0/0x8a0 [ 116.943363] ? __radix_tree_insert+0x8f0/0x8f0 [ 116.947953] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 116.953763] ? lock_acquire+0x1ed/0x520 [ 116.957737] ? genl_rcv+0x19/0x40 [ 116.961200] genl_rcv_msg+0xc6/0x168 [ 116.964926] netlink_rcv_skb+0x172/0x440 [ 116.968990] ? genl_family_rcv_msg+0x1140/0x1140 [ 116.973757] ? netlink_ack+0xb80/0xb80 [ 116.977651] genl_rcv+0x28/0x40 [ 116.980931] netlink_unicast+0x5a5/0x760 [ 116.985005] ? netlink_attachskb+0x9a0/0x9a0 [ 116.989412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 116.994956] netlink_sendmsg+0xa18/0xfc0 [ 116.999037] ? netlink_unicast+0x760/0x760 [ 117.003270] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 117.008199] ? apparmor_socket_sendmsg+0x29/0x30 [ 117.013304] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 117.019708] ? security_socket_sendmsg+0x94/0xc0 [ 117.025418] ? netlink_unicast+0x760/0x760 [ 117.030443] sock_sendmsg+0xd5/0x120 [ 117.034768] ___sys_sendmsg+0x7fd/0x930 [ 117.039273] ? copy_msghdr_from_user+0x580/0x580 [ 117.044028] ? __fd_install+0x2b5/0x8f0 [ 117.048007] ? __fget_light+0x2e9/0x430 [ 117.051989] ? fget_raw+0x20/0x20 [ 117.055444] ? lock_downgrade+0x900/0x900 [ 117.059594] ? lock_release+0x970/0x970 [ 117.063568] ? arch_local_save_flags+0x40/0x40 [ 117.068150] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 117.073603] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 117.079139] ? sockfd_lookup_light+0xc5/0x160 [ 117.083634] __sys_sendmsg+0x11d/0x280 [ 117.087533] ? __ia32_sys_shutdown+0x80/0x80 [ 117.091946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 117.097493] ? put_timespec64+0x10f/0x1b0 [ 117.101654] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 117.107108] __x64_sys_sendmsg+0x78/0xb0 [ 117.111176] do_syscall_64+0x1b9/0x820 [ 117.115062] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 117.120425] ? syscall_return_slowpath+0x5e0/0x5e0 [ 117.125349] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 117.130208] ? trace_hardirqs_on_caller+0x310/0x310 [ 117.135250] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 117.140271] ? prepare_exit_to_usermode+0x291/0x3b0 [ 117.145288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 117.150138] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 117.155325] RIP: 0033:0x457519 [ 117.158518] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 117.179249] RSP: 002b:00007f4f03b7bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 117.187568] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 117.194837] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 117.202105] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 22:53:33 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000002cc0), 0x8) 22:53:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) poll(&(0x7f0000000040)=[{r0, 0x120}, {r0}, {r0, 0x18}, {r0, 0x4060}, {r0, 0x5000}, {r0, 0x1000}], 0x6, 0x400000) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x507000, 0x1000007, 0x2013, r0, 0x0) getuid() accept$alg(r0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 22:53:33 executing program 5: syz_emit_ethernet(0x6a, &(0x7f0000000140)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80, 0x2c00000000000000}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0xf, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local, @dev, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f00000000c0)) 22:53:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 117.209370] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f03b7c6d4 [ 117.216634] R13: 00000000004c3830 R14: 00000000004d5670 R15: 00000000ffffffff 22:53:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000006000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x5, &(0x7f0000006000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0xffffffc5, 0x1}]}, &(0x7f0000000400)="73797a6b6aaea4500183f4f69a28b4a9135eec9746a7656c6c65720080f470791ee2351469e29e9b0800000000000000ae6bc61296dd", 0x4, 0x1000, &(0x7f0000008000)=""/4096}, 0x48) [ 117.274897] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 22:53:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000002c0)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, &(0x7f0000000040), &(0x7f0000000340)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bond_slave_0\x00', 'veth1_to_bond\x00', 'veth0_to_team\x00', 'bridge_slave_0\x00', @random="3f11b4a13efe", [], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [], 0xe0, 0xe0, 0x118, [@stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @random="9f68e070940f", [], 0x0, 0x0, 0x0, 0x0, @link_local}, 0x840}}}]}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, "00000000000000000000000200", 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x220) 22:53:33 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000060107031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 22:53:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4, 0x0, 0xf6250100}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x10, 0x11, [@generic="e2abb4ec7645192056d52f"]}]}, 0x24}}, 0x0) 22:53:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000006000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x5, &(0x7f0000006000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0xffffffc5, 0x1}]}, &(0x7f0000000400)="73797a6b6aaea4500183f4f69a28b4a9135eec9746a7656c6c65720080f470791ee2351469e29e9b0800000000000000ae6bc61296dd", 0x4, 0x1000, &(0x7f0000008000)=""/4096}, 0x48) [ 117.404175] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. [ 117.428732] sysfs: cannot create duplicate filename '/class/ieee80211/â«´ìvE VÕ!' [ 117.452566] CPU: 1 PID: 7715 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #136 [ 117.459870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.469231] Call Trace: [ 117.471842] dump_stack+0x1c4/0x2b4 [ 117.475492] ? dump_stack_print_info.cold.2+0x52/0x52 [ 117.480707] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 117.485834] sysfs_warn_dup.cold.3+0x1c/0x2b [ 117.490256] sysfs_do_create_link_sd.isra.2+0x116/0x130 [ 117.495633] sysfs_create_link+0x65/0xc0 [ 117.499706] device_add+0x5d0/0x17b0 [ 117.503437] ? genl_rcv_msg+0xc6/0x168 [ 117.507336] ? netlink_rcv_skb+0x172/0x440 [ 117.511587] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 117.516705] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 117.521911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 117.527468] wiphy_register+0x1a5e/0x2770 [ 117.531634] ? wiphy_unregister+0x1380/0x1380 [ 117.536138] ? kasan_unpoison_shadow+0x35/0x50 [ 117.540728] ? kasan_kmalloc+0xc7/0xe0 [ 117.544638] ? __kmalloc+0x31c/0x760 [ 117.548362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 117.553910] ? ieee80211_cs_list_valid+0x7c/0x440 [ 117.558788] ? ieee80211_register_hw+0xcf5/0x3b00 [ 117.563812] ieee80211_register_hw+0x15a7/0x3b00 [ 117.568583] ? ieee80211_ifa_changed+0xed0/0xed0 [ 117.573356] mac80211_hwsim_new_radio+0x1e49/0x3460 [ 117.578400] ? __rhashtable_insert_fast.constprop.53+0xf00/0xf00 [ 117.584553] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 117.590099] ? vsnprintf+0x20d/0x1b60 [ 117.593921] ? pointer+0x990/0x990 [ 117.597484] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 117.602513] ? kvasprintf+0xee/0x150 [ 117.606236] ? bust_spinlocks+0xe0/0xe0 [ 117.610226] ? kasprintf+0xab/0xe0 [ 117.613776] ? kvasprintf_const+0x190/0x190 [ 117.618112] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 117.623664] hwsim_new_radio_nl+0x7dc/0xb20 [ 117.628218] ? nla_parse+0x2f9/0x480 [ 117.631945] ? mac80211_hwsim_new_radio+0x3460/0x3460 [ 117.637159] ? __netlink_ns_capable+0x100/0x130 [ 117.641844] genl_family_rcv_msg+0x8a9/0x1140 [ 117.646357] ? genl_unregister_family+0x8a0/0x8a0 [ 117.651212] ? __radix_tree_insert+0x8f0/0x8f0 [ 117.655811] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 117.661625] ? lock_acquire+0x1ed/0x520 [ 117.665979] ? genl_rcv+0x19/0x40 [ 117.669451] genl_rcv_msg+0xc6/0x168 [ 117.673182] netlink_rcv_skb+0x172/0x440 [ 117.677255] ? genl_family_rcv_msg+0x1140/0x1140 [ 117.682033] ? netlink_ack+0xb80/0xb80 [ 117.685938] genl_rcv+0x28/0x40 [ 117.689238] netlink_unicast+0x5a5/0x760 [ 117.693316] ? netlink_attachskb+0x9a0/0x9a0 [ 117.697772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 117.703334] netlink_sendmsg+0xa18/0xfc0 [ 117.707445] ? netlink_unicast+0x760/0x760 [ 117.712217] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 117.717166] ? apparmor_socket_sendmsg+0x29/0x30 [ 117.721940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 117.727510] ? security_socket_sendmsg+0x94/0xc0 [ 117.732285] ? netlink_unicast+0x760/0x760 [ 117.737026] sock_sendmsg+0xd5/0x120 [ 117.740758] ___sys_sendmsg+0x7fd/0x930 [ 117.744757] ? copy_msghdr_from_user+0x580/0x580 [ 117.749525] ? __fd_install+0x2b5/0x8f0 [ 117.753515] ? __fget_light+0x2e9/0x430 [ 117.757499] ? fget_raw+0x20/0x20 [ 117.760974] ? lock_downgrade+0x900/0x900 [ 117.765137] ? lock_release+0x970/0x970 [ 117.769148] ? arch_local_save_flags+0x40/0x40 [ 117.773747] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 117.779214] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 117.784779] ? sockfd_lookup_light+0xc5/0x160 [ 117.789292] __sys_sendmsg+0x11d/0x280 [ 117.793196] ? __ia32_sys_shutdown+0x80/0x80 [ 117.797624] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 117.803180] ? put_timespec64+0x10f/0x1b0 [ 117.807358] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 117.812829] __x64_sys_sendmsg+0x78/0xb0 [ 117.816902] do_syscall_64+0x1b9/0x820 [ 117.820798] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 117.826175] ? syscall_return_slowpath+0x5e0/0x5e0 [ 117.831115] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 117.832547] kasan: CONFIG_KASAN_INLINE enabled [ 117.835975] ? trace_hardirqs_on_caller+0x310/0x310 [ 117.835993] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 117.836013] ? prepare_exit_to_usermode+0x291/0x3b0 [ 117.840616] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 117.845603] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 117.850664] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 117.855613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 117.862968] CPU: 0 PID: 7708 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #136 [ 117.867792] RIP: 0033:0x457519 [ 117.874006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.879185] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 117.886451] RIP: 0010:rb_erase+0x306/0x3710 [ 117.889624] RSP: 002b:00007f4f03b7bc78 EFLAGS: 00000246 [ 117.898983] Code: c7 81 28 01 00 00 f2 f2 f2 f2 c7 81 2c 01 00 00 00 f2 f2 f2 48 89 f9 65 48 8b 1c 25 28 00 00 00 48 89 5d d0 31 db 48 c1 e9 03 <42> 80 3c 01 00 0f 85 41 1c 00 00 4c 8d 48 10 4c 8b 78 08 48 b9 00 [ 117.917863] ORIG_RAX: 000000000000002e [ 117.917878] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 117.922192] RSP: 0018:ffff8801bd146918 EFLAGS: 00010202 [ 117.927544] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 117.950418] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 117.957730] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 117.963104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f03b7c6d4 [ 117.970380] RDX: 1ffff10037a28d2b RSI: ffffffff8afbc8a0 RDI: 0000000000000008 [ 117.970395] RBP: ffff8801bd147320 R08: dffffc0000000000 R09: fffffbfff12d69b0 [ 117.977663] R13: 00000000004c3830 R14: 00000000004d5670 R15: 00000000ffffffff [ 117.982138] kobject: 'loop3' (0000000026520684): kobject_uevent_env [ 117.984942] R10: fffffbfff12d69b0 R11: ffffffff896b4d83 R12: ffff8801c47fa3b0 [ 118.015421] kobject: 'loop3' (0000000026520684): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 118.020400] R13: dffffc0000000000 R14: ffff8801bd1472f8 R15: ffff8801bd147438 [ 118.020414] FS: 00007f442bc35700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 118.020423] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 118.020432] CR2: 0000001b3272c000 CR3: 00000001c4e59000 CR4: 00000000001406f0 [ 118.020448] Call Trace: [ 118.038514] kobject: 'loop4' (00000000be6edc9a): kobject_uevent_env [ 118.044603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 118.044624] ? rb_insert_color+0x1460/0x1460 [ 118.044648] ? add_to_page_cache_lru+0x10b0/0x10b0 [ 118.044668] ? radix_tree_tag_get+0x350/0x350 [ 118.094921] ? lock_downgrade+0x900/0x900 [ 118.099072] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 118.104870] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 118.110403] ? mark_held_locks+0x130/0x130 [ 118.114635] ? mark_page_accessed+0xcb0/0x2040 [ 118.119212] ? activate_page+0x1040/0x1040 [ 118.123452] ? rb_insert_color+0x1460/0x1460 [ 118.127856] ? lock_downgrade+0x900/0x900 [ 118.132003] ? filemap_fault+0x25f0/0x25f0 [ 118.136236] ? mark_held_locks+0x130/0x130 [ 118.140472] ? count_shadow_nodes+0x270/0x270 [ 118.144977] ? pagecache_get_page+0x2d8/0xf00 [ 118.149473] ? mark_held_locks+0x130/0x130 [ 118.153702] ? find_get_pages_contig+0x15b0/0x15b0 [ 118.158629] ? trace_hardirqs_on+0xbd/0x310 [ 118.162940] ? __getblk_gfp+0xf4/0xd50 [ 118.166838] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 118.172282] ? mark_held_locks+0x130/0x130 [ 118.176517] ? mark_held_locks+0x130/0x130 [ 118.180750] ? ext4_discard_preallocations+0x9b9/0x13c0 [ 118.186107] ? lock_downgrade+0x900/0x900 [ 118.190281] ? kasan_check_read+0x11/0x20 [ 118.194425] ? do_raw_spin_unlock+0xa7/0x2f0 [ 118.198830] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 118.203410] ? mark_held_locks+0x130/0x130 [ 118.207645] ? mark_held_locks+0x130/0x130 [ 118.211881] ? ext4_exit_mballoc+0xc0/0xc0 [ 118.216114] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 118.221127] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 118.225878] ? modules_open+0xa0/0xa0 [ 118.229676] ? __es_tree_search.isra.12+0x1ba/0x220 [ 118.234691] ? __es_remove_extent+0x9a3/0xba0 [ 118.239181] ? mark_held_locks+0x130/0x130 [ 118.243411] ? lock_downgrade+0x900/0x900 [ 118.247556] ? ext4_es_scan+0x960/0x960 [ 118.251527] ? lock_release+0x970/0x970 [ 118.256281] ? trace_hardirqs_on+0xbd/0x310 [ 118.261641] ? kasan_check_read+0x11/0x20 [ 118.266568] ? clear_inode+0x114/0x3a0 [ 118.271253] ? do_raw_write_trylock+0x1c0/0x1c0 [ 118.276792] ? kasan_check_write+0x14/0x20 [ 118.281544] ? lock_acquire+0x1ed/0x520 [ 118.285538] ? integrity_inode_free+0x77/0x320 [ 118.290116] ? ext4_es_remove_extent+0x151/0x500 [ 118.294870] ? lock_release+0x970/0x970 [ 118.298837] ? __destroy_inode+0x2ae/0x820 [ 118.303068] ? lock_downgrade+0x900/0x900 [ 118.307210] ? kasan_check_write+0x14/0x20 [ 118.311457] ? do_raw_write_lock+0xbd/0x1b0 [ 118.315778] integrity_inode_free+0x12f/0x320 [ 118.320277] security_inode_free+0x19/0x90 [ 118.324512] __destroy_inode+0x328/0x820 [ 118.328568] ? generic_update_time+0x450/0x450 [ 118.333146] ? evict+0x5d8/0x980 [ 118.336513] ? lock_downgrade+0x900/0x900 [ 118.340658] ? __inode_wait_for_writeback+0x2cf/0x380 [ 118.345851] destroy_inode+0xda/0x200 [ 118.349646] ? __destroy_inode+0x820/0x820 [ 118.353888] ? kasan_check_write+0x14/0x20 [ 118.358293] ? do_raw_spin_lock+0xc1/0x200 [ 118.362524] evict+0x5e0/0x980 [ 118.365712] ? jbd2_journal_stop+0x430/0x15d0 [ 118.370206] ? destroy_inode+0x200/0x200 [ 118.374272] ? do_raw_spin_lock+0xc1/0x200 [ 118.378500] ? iput+0x671/0xa90 [ 118.381785] ? lock_downgrade+0x900/0x900 [ 118.385930] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 118.391487] ? kasan_check_read+0x11/0x20 [ 118.395654] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 118.400230] ? lock_downgrade+0x900/0x900 [ 118.404414] ? ext4_ioctl+0x231b/0x4210 [ 118.408390] iput+0x679/0xa90 [ 118.411496] ? inode_add_lru+0x2a0/0x2a0 [ 118.415551] ? up_write+0x7b/0x220 [ 118.419083] ? up_read+0x110/0x110 [ 118.422618] ? up_read+0x110/0x110 [ 118.426344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 118.432661] ? check_preemption_disabled+0x48/0x200 [ 118.438026] ext4_ioctl+0x236f/0x4210 [ 118.441832] ? lock_downgrade+0x900/0x900 [ 118.445985] ? ext4_ioctl_group_add+0x560/0x560 [ 118.450652] ? mark_held_locks+0x130/0x130 [ 118.454887] ? do_futex+0x249/0x26d0 [ 118.458598] ? trace_hardirqs_on+0xbd/0x310 [ 118.462924] ? __fget+0x4d1/0x740 [ 118.466382] ? exit_robust_list+0x280/0x280 [ 118.470700] ? __fget+0x4aa/0x740 [ 118.474151] ? lock_downgrade+0x900/0x900 [ 118.478300] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 118.484102] ? __fget+0x4d1/0x740 [ 118.487553] ? ksys_dup3+0x680/0x680 [ 118.491269] ? __might_fault+0x12b/0x1e0 [ 118.495325] ? lock_downgrade+0x900/0x900 [ 118.499474] ? lock_release+0x970/0x970 [ 118.503456] ? arch_local_save_flags+0x40/0x40 [ 118.508056] ? ext4_ioctl_group_add+0x560/0x560 [ 118.512721] do_vfs_ioctl+0x1de/0x1720 [ 118.516620] ? ioctl_preallocate+0x300/0x300 [ 118.521033] ? __fget_light+0x2e9/0x430 [ 118.524999] ? fget_raw+0x20/0x20 [ 118.528442] ? _copy_to_user+0xc8/0x110 [ 118.532412] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 118.537948] ? put_timespec64+0x10f/0x1b0 [ 118.542104] ? nsecs_to_jiffies+0x30/0x30 [ 118.546513] ? security_file_ioctl+0x94/0xc0 [ 118.550917] ksys_ioctl+0xa9/0xd0 [ 118.554367] __x64_sys_ioctl+0x73/0xb0 [ 118.558261] do_syscall_64+0x1b9/0x820 [ 118.562144] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 118.567509] ? syscall_return_slowpath+0x5e0/0x5e0 [ 118.572433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 118.577275] ? trace_hardirqs_on_caller+0x310/0x310 [ 118.582296] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 118.587308] ? prepare_exit_to_usermode+0x291/0x3b0 [ 118.592326] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 118.597175] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 118.602355] RIP: 0033:0x457519 [ 118.605542] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 118.624435] RSP: 002b:00007f442bc34c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 118.632354] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000457519 [ 118.639618] RDX: 0000000000000000 RSI: 0000000000006611 RDI: 0000000000000003 [ 118.646880] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 118.654140] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f442bc356d4 [ 118.661400] R13: 00000000004bf5c5 R14: 00000000004cf460 R15: 00000000ffffffff [ 118.668665] Modules linked in: [ 118.673022] ---[ end trace feb47f4e1e46ff18 ]--- [ 118.677806] RIP: 0010:rb_erase+0x306/0x3710 [ 118.682158] Code: c7 81 28 01 00 00 f2 f2 f2 f2 c7 81 2c 01 00 00 00 f2 f2 f2 48 89 f9 65 48 8b 1c 25 28 00 00 00 48 89 5d d0 31 db 48 c1 e9 03 <42> 80 3c 01 00 0f 85 41 1c 00 00 4c 8d 48 10 4c 8b 78 08 48 b9 00 [ 118.701083] RSP: 0018:ffff8801bd146918 EFLAGS: 00010202 [ 118.706445] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 118.713730] RDX: 1ffff10037a28d2b RSI: ffffffff8afbc8a0 RDI: 0000000000000008 [ 118.721018] RBP: ffff8801bd147320 R08: dffffc0000000000 R09: fffffbfff12d69b0 [ 118.728282] R10: fffffbfff12d69b0 R11: ffffffff896b4d83 R12: ffff8801c47fa3b0 [ 118.735853] R13: dffffc0000000000 R14: ffff8801bd1472f8 R15: ffff8801bd147438 [ 118.743145] FS: 00007f442bc35700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 118.751388] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 118.757268] CR2: 0000001b3272c000 CR3: 00000001c4e59000 CR4: 00000000001406f0 [ 118.764575] Kernel panic - not syncing: Fatal exception [ 118.770939] Kernel Offset: disabled [ 118.774570] Rebooting in 86400 seconds..