[ 62.990798][ T27] audit: type=1800 audit(1579256974.046:27): pid=7825 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 63.011533][ T27] audit: type=1800 audit(1579256974.056:28): pid=7825 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 63.838782][ T27] audit: type=1800 audit(1579256974.966:29): pid=7825 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 63.858761][ T27] audit: type=1800 audit(1579256974.966:30): pid=7825 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.56' (ECDSA) to the list of known hosts. 2020/01/17 10:29:44 fuzzer started 2020/01/17 10:29:46 dialing manager at 10.128.0.105:44889 2020/01/17 10:29:46 syscalls: 2836 2020/01/17 10:29:46 code coverage: enabled 2020/01/17 10:29:46 comparison tracing: enabled 2020/01/17 10:29:46 extra coverage: enabled 2020/01/17 10:29:46 setuid sandbox: enabled 2020/01/17 10:29:46 namespace sandbox: enabled 2020/01/17 10:29:46 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/17 10:29:46 fault injection: enabled 2020/01/17 10:29:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/17 10:29:46 net packet injection: enabled 2020/01/17 10:29:46 net device setup: enabled 2020/01/17 10:29:46 concurrency sanitizer: enabled 2020/01/17 10:29:46 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 83.069767][ T7991] KCSAN: could not find function: 'poll_schedule_timeout' 2020/01/17 10:30:01 adding functions to KCSAN blacklist: 'blk_mq_dispatch_rq_list' 'copy_process' 'kvm_mmu_notifier_change_pte' 'audit_log_start' 'blk_mq_run_hw_queue' 'queue_access_lock' '__writeback_single_inode' 'generic_write_end' 'has_bh_in_lru' 'xas_clear_mark' '__delete_from_page_cache' 'ext4_has_free_clusters' 'inode_sync_complete' 'complete_signal' 'blk_mq_sched_dispatch_requests' 'wbt_issue' 'ktime_get_real_seconds' 'ext4_nonda_switch' 'vm_area_dup' 'delete_from_page_cache_batch' '__add_to_page_cache_locked' 'wbt_wait' 'find_next_bit' 'filemap_map_pages' '__d_lookup_done' 'shmem_file_read_iter' 'lruvec_lru_size' 'do_signal_stop' 'shmem_getpage_gfp' 'bio_endio' 'do_syslog' 'page_counter_charge' 'kcm_rfree' 'd_instantiate_new' 'ext4_journal_check_start' 'futex_wait_queue_me' '__lru_cache_add' 'ip_tunnel_xmit' 'ext4_setattr' 'do_nanosleep' 'ext4_mb_good_group' '__ext4_new_inode' 'tick_do_update_jiffies64' 'file_update_time' 'dd_has_work' 'wbc_detach_inode' 'tomoyo_supervisor' '__snd_rawmidi_transmit_ack' 'smpboot_thread_fn' 'poll_schedule_timeout' 'echo_char' '__perf_event_overflow' 'tick_nohz_idle_stop_tick' 'n_tty_receive_buf_common' '__hrtimer_run_queues' '__remove_assoc_queue' 'find_get_pages_range_tag' 'ext4_free_inodes_count' 'tick_sched_do_timer' 'generic_fillattr' 'sit_tunnel_xmit' 'page_counter_try_charge' 'blk_stat_add' 'ext4_free_inode' 'get_cpu_idle_time_us' 'mod_timer' 'd_delete' 'rcu_gp_fqs_loop' 'process_srcu' '__mark_inode_dirty' 'pid_update_inode' 'atime_needs_update' '__find_get_block' 'xprt_clear_locked' 'iomap_dio_bio_actor' 'run_timer_softirq' 'rcu_gp_fqs_check_wake' 'common_perm_cond' 'blk_mq_free_request' 'ep_poll' 'kauditd_thread' '__skb_try_recv_from_queue' 'yama_ptracer_del' 'snd_seq_prioq_cell_out' 'fib6_ifup' 'del_timer' 'add_timer' 'mm_update_next_owner' 'install_new_memslots' 'snd_seq_check_queue' 'ext4_writepages' 'dput' 'iput' 'ext4_mark_iloc_dirty' 'blk_mq_get_request' 'lookup_fast' 'commit_echoes' 'mark_buffer_dirty_inode' 'xas_find_marked' 'pcpu_alloc' 'timer_clear_idle' 'taskstats_exit' 10:34:04 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x19c, 0x0) 10:34:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 333.306758][ T7994] IPVS: ftp: loaded support on port[0] = 21 [ 333.459360][ T7994] chnl_net:caif_netlink_parms(): no params data found [ 333.504559][ T7994] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.511976][ T7994] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.520168][ T7994] device bridge_slave_0 entered promiscuous mode [ 333.532993][ T7997] IPVS: ftp: loaded support on port[0] = 21 [ 333.536032][ T7994] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.565423][ T7994] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.573164][ T7994] device bridge_slave_1 entered promiscuous mode 10:34:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8000}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) write$cgroup_subtree(r2, 0x0, 0x0) [ 333.613757][ T7994] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 333.632074][ T7994] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 333.691422][ T7994] team0: Port device team_slave_0 added [ 333.698434][ T7994] team0: Port device team_slave_1 added [ 333.706384][ T7997] chnl_net:caif_netlink_parms(): no params data found [ 333.777975][ T7994] device hsr_slave_0 entered promiscuous mode [ 333.815996][ T7994] device hsr_slave_1 entered promiscuous mode 10:34:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"/614], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffd6f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff00004000636c77fbac141411e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 333.925134][ T8002] IPVS: ftp: loaded support on port[0] = 21 [ 333.969468][ T7997] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.977864][ T7997] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.996565][ T7997] device bridge_slave_0 entered promiscuous mode [ 334.010470][ T7997] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.035387][ T7997] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.046487][ T7997] device bridge_slave_1 entered promiscuous mode [ 334.104476][ T7997] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 334.126672][ T7997] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 10:34:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x42, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x5ee, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) [ 334.154014][ T8005] IPVS: ftp: loaded support on port[0] = 21 [ 334.192074][ T7994] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 334.239907][ T7997] team0: Port device team_slave_0 added [ 334.260514][ T7994] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 334.310197][ T7994] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 334.357460][ T7994] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 334.399403][ T7997] team0: Port device team_slave_1 added [ 334.417570][ T8007] IPVS: ftp: loaded support on port[0] = 21 10:34:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x20000) [ 334.476687][ T7994] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.483775][ T7994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.491135][ T7994] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.498208][ T7994] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.558632][ T7997] device hsr_slave_0 entered promiscuous mode [ 334.615743][ T7997] device hsr_slave_1 entered promiscuous mode [ 334.645430][ T7997] debugfs: Directory 'hsr0' with parent '/' already present! [ 334.671950][ T8008] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.680030][ T8008] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.697970][ T8012] IPVS: ftp: loaded support on port[0] = 21 [ 334.744483][ T8002] chnl_net:caif_netlink_parms(): no params data found [ 334.822628][ T8007] chnl_net:caif_netlink_parms(): no params data found [ 334.861805][ T8005] chnl_net:caif_netlink_parms(): no params data found [ 334.877645][ T8007] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.886591][ T8007] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.894289][ T8007] device bridge_slave_0 entered promiscuous mode [ 334.918030][ T7997] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 334.972796][ T7997] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 335.027410][ T8007] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.034552][ T8007] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.044419][ T8007] device bridge_slave_1 entered promiscuous mode [ 335.063126][ T8002] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.070393][ T8002] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.078497][ T8002] device bridge_slave_0 entered promiscuous mode [ 335.103254][ T7997] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 335.166193][ T8002] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.173282][ T8002] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.181308][ T8002] device bridge_slave_1 entered promiscuous mode [ 335.194921][ T8007] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 335.205615][ T7997] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 335.274130][ T8002] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 335.288700][ T8007] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 335.304784][ T7994] 8021q: adding VLAN 0 to HW filter on device bond0 [ 335.317030][ T8005] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.324172][ T8005] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.331887][ T8005] device bridge_slave_0 entered promiscuous mode [ 335.341857][ T8002] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 335.362699][ T8007] team0: Port device team_slave_0 added [ 335.370928][ T8005] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.378201][ T8005] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.386606][ T8005] device bridge_slave_1 entered promiscuous mode [ 335.397772][ T8012] chnl_net:caif_netlink_parms(): no params data found [ 335.409083][ T8007] team0: Port device team_slave_1 added [ 335.419573][ T7994] 8021q: adding VLAN 0 to HW filter on device team0 [ 335.449289][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 335.457593][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 335.481819][ T8002] team0: Port device team_slave_0 added [ 335.488722][ T8005] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 335.527156][ T8007] device hsr_slave_0 entered promiscuous mode [ 335.575694][ T8007] device hsr_slave_1 entered promiscuous mode [ 335.625447][ T8007] debugfs: Directory 'hsr0' with parent '/' already present! [ 335.634030][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 335.642845][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 335.651735][ T7998] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.659015][ T7998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.667047][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 335.675882][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 335.684378][ T7998] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.691449][ T7998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 335.699342][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 335.711722][ T8002] team0: Port device team_slave_1 added [ 335.721593][ T8005] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 335.770429][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 335.786608][ T8005] team0: Port device team_slave_0 added [ 335.797386][ T8012] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.804519][ T8012] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.812288][ T8012] device bridge_slave_0 entered promiscuous mode [ 335.821120][ T8012] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.828306][ T8012] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.836202][ T8012] device bridge_slave_1 entered promiscuous mode [ 335.846490][ T8005] team0: Port device team_slave_1 added [ 335.907622][ T8002] device hsr_slave_0 entered promiscuous mode [ 335.945899][ T8002] device hsr_slave_1 entered promiscuous mode [ 336.015423][ T8002] debugfs: Directory 'hsr0' with parent '/' already present! [ 336.023376][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 336.034632][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 336.043340][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 336.063319][ T8012] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 336.075075][ T8012] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 336.157775][ T8005] device hsr_slave_0 entered promiscuous mode [ 336.215769][ T8005] device hsr_slave_1 entered promiscuous mode [ 336.265446][ T8005] debugfs: Directory 'hsr0' with parent '/' already present! [ 336.274064][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 336.282688][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 336.293614][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 336.302314][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 336.323800][ T8012] team0: Port device team_slave_0 added [ 336.333193][ T8012] team0: Port device team_slave_1 added [ 336.339646][ T7994] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 336.350488][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 336.359230][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 336.367825][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 336.400332][ T8007] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 336.468990][ T7997] 8021q: adding VLAN 0 to HW filter on device bond0 [ 336.491271][ T8007] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 336.577610][ T8007] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 336.697731][ T8012] device hsr_slave_0 entered promiscuous mode [ 336.735872][ T8012] device hsr_slave_1 entered promiscuous mode [ 336.775454][ T8012] debugfs: Directory 'hsr0' with parent '/' already present! [ 336.790093][ T8007] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 336.855494][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 336.863309][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.902446][ T7997] 8021q: adding VLAN 0 to HW filter on device team0 [ 336.909546][ T8002] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 336.967361][ T8002] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 337.042734][ T8005] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 337.097335][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 337.104781][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 337.113609][ T8002] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 337.157807][ T8002] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 337.217633][ T8005] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 337.285193][ T8005] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 337.357457][ T8012] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 337.428751][ T8012] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 337.493697][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 337.502933][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 337.512314][ T7999] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.519527][ T7999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.528445][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 337.539167][ T7994] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 337.547137][ T8005] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 337.617479][ T8012] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 337.677624][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 337.686459][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 337.694851][ T7999] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.702004][ T7999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.717383][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 337.727109][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 337.747168][ T8012] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 337.784733][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 337.793712][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 337.802807][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 337.812109][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 337.821343][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 337.845865][ T8007] 8021q: adding VLAN 0 to HW filter on device bond0 [ 337.858221][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 337.867435][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.881328][ T7997] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 337.895522][ T7997] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 337.916765][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 337.925285][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.939962][ T8007] 8021q: adding VLAN 0 to HW filter on device team0 [ 337.960809][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 337.968759][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 337.978741][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 337.987790][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 337.997969][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.006821][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.015178][ T7999] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.022246][ T7999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.050604][ T8002] 8021q: adding VLAN 0 to HW filter on device bond0 [ 338.060139][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 338.068787][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 338.077605][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.086595][ T2411] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.093636][ T2411] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.107864][ T7994] device veth0_vlan entered promiscuous mode [ 338.121392][ T8005] 8021q: adding VLAN 0 to HW filter on device bond0 [ 338.130209][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 338.139127][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.154259][ T7997] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 338.168401][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 338.178591][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 338.186918][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 338.194475][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 338.203901][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 338.213250][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 338.224209][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 338.232377][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 338.244244][ T8002] 8021q: adding VLAN 0 to HW filter on device team0 [ 338.261449][ T7994] device veth1_vlan entered promiscuous mode [ 338.270394][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 338.280416][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 338.289164][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 338.300340][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 338.308679][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 338.316364][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 338.324847][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 338.333726][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 338.344155][ T8005] 8021q: adding VLAN 0 to HW filter on device team0 [ 338.363997][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 338.372853][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.381595][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.390394][ T7998] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.397469][ T7998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.405689][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 338.414098][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 338.422531][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.431098][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.439632][ T7998] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.446806][ T7998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.482026][ T8007] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 338.494441][ T8007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 338.507688][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 338.519306][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 338.530576][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 338.543262][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.554800][ T8008] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.561900][ T8008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.574038][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 338.583058][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 338.594528][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 338.603346][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 338.608109][ C0] hrtimer: interrupt took 34826 ns [ 338.612631][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 338.625202][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 338.634359][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 338.643093][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 338.651940][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 338.661181][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.670040][ T8008] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.677145][ T8008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.685117][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 338.701673][ T8005] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 338.713596][ T8005] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 338.732498][ T8012] 8021q: adding VLAN 0 to HW filter on device bond0 [ 338.748570][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 338.757416][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 338.770778][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 338.779675][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 338.791490][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 338.800282][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 338.812851][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 338.821890][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 338.851479][ T8005] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 338.894794][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 338.902413][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 338.910299][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 338.926845][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 338.935689][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 338.944585][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 338.955541][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 338.964855][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 338.972976][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 338.995122][ T8007] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 339.023437][ T8002] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 10:34:10 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x19c, 0x0) [ 339.042227][ T8002] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 339.071117][ T7997] device veth0_vlan entered promiscuous mode [ 339.081812][ T8012] 8021q: adding VLAN 0 to HW filter on device team0 [ 339.099632][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 339.112288][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 339.135655][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 339.143237][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 339.152094][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 339.161154][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 339.172809][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 339.182115][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 339.193843][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 339.214725][ T8005] device veth0_vlan entered promiscuous mode [ 339.234602][ T8002] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 339.249610][ T7997] device veth1_vlan entered promiscuous mode [ 339.265681][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 339.274049][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 339.282695][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 339.293893][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 339.302297][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 339.314816][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 339.324184][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 339.336313][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 339.344837][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 339.356471][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 339.364021][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 339.376486][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 339.384865][ T8008] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.391960][ T8008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.403622][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 339.413024][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 339.425050][ T8008] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.432148][ T8008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.444434][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 339.454235][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 339.470278][ T8005] device veth1_vlan entered promiscuous mode [ 339.511521][ T8002] device veth0_vlan entered promiscuous mode [ 339.520904][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 339.529662][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 339.541142][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 339.549475][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 10:34:10 executing program 0: [ 339.561095][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 339.569348][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 339.578927][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 339.588154][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 339.597064][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 10:34:10 executing program 0: [ 339.628667][ T8002] device veth1_vlan entered promiscuous mode [ 339.660480][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 339.672201][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 339.680682][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 339.695988][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 339.716010][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 10:34:10 executing program 0: [ 339.724593][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 339.744461][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 339.762377][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 10:34:10 executing program 0: [ 339.781940][ T8012] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 339.810026][ T8012] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 10:34:11 executing program 0: [ 339.838865][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 339.850939][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 339.871726][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 339.884227][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 339.907717][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 339.927399][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 10:34:11 executing program 0: [ 339.938288][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 339.956633][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 339.981771][ T8007] device veth0_vlan entered promiscuous mode [ 340.003926][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 340.035988][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 340.044776][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 340.088501][ T8007] device veth1_vlan entered promiscuous mode [ 340.112433][ T8012] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 340.159030][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 340.174202][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.218793][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 340.245640][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 10:34:11 executing program 1: [ 340.420526][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 340.438221][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 340.472302][ T8012] device veth0_vlan entered promiscuous mode [ 340.486839][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 340.495050][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 340.529252][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 340.543397][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.567544][ T8012] device veth1_vlan entered promiscuous mode 10:34:11 executing program 2: 10:34:11 executing program 0: 10:34:11 executing program 4: 10:34:12 executing program 1: 10:34:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a43e11c5960609488d5e2ce7db68f3688751ca711fcd0cdfa146ed3d09a6175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f6eade32f3b340000b3185b310efd4989147a0f000000f110026e6d2ef831ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b86684e151719c477c21476619f28d9961b63e1a9cf6c2a693be656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e6ea09c346dfebd31a08b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61cecc4408b8e47c228008fa63a38d2fd50117b89a9a0500b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceafd07ed00b1000002cab5ebf8aad34732181feb215d818dc8fa40f916fb6f593dec1fdea9c20ddb6c3c7412b59af5b0a8b7669ba358dc218a21ad0cd7a1e7dee3bf9f1ed62c8a0205caefaa88e378193ba036ac588971a682259b35207061a6db54200"/614], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffd6f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff00004000636c77fbac141411e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 10:34:12 executing program 2: 10:34:12 executing program 0: 10:34:12 executing program 5: 10:34:12 executing program 4: [ 341.009864][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 341.022615][ T7999] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 10:34:12 executing program 1: 10:34:12 executing program 2: 10:34:12 executing program 4: 10:34:12 executing program 0: 10:34:12 executing program 5: 10:34:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"/614], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffd6f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff00004000636c77fbac141411e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 10:34:12 executing program 4: 10:34:12 executing program 1: 10:34:12 executing program 2: 10:34:12 executing program 5: 10:34:12 executing program 0: 10:34:12 executing program 2: 10:34:12 executing program 1: 10:34:12 executing program 5: 10:34:12 executing program 4: 10:34:12 executing program 0: 10:34:12 executing program 3: 10:34:13 executing program 2: 10:34:13 executing program 5: 10:34:13 executing program 4: 10:34:13 executing program 1: 10:34:13 executing program 3: 10:34:13 executing program 0: 10:34:13 executing program 5: 10:34:13 executing program 4: 10:34:13 executing program 1: 10:34:13 executing program 2: 10:34:13 executing program 0: 10:34:13 executing program 3: 10:34:13 executing program 4: 10:34:13 executing program 3: 10:34:13 executing program 0: 10:34:13 executing program 2: 10:34:13 executing program 5: 10:34:13 executing program 1: 10:34:13 executing program 2: 10:34:13 executing program 0: 10:34:13 executing program 4: 10:34:13 executing program 5: 10:34:13 executing program 1: 10:34:14 executing program 0: 10:34:14 executing program 3: 10:34:14 executing program 2: 10:34:14 executing program 5: 10:34:14 executing program 4: 10:34:14 executing program 1: 10:34:14 executing program 3: 10:34:14 executing program 0: 10:34:14 executing program 5: 10:34:14 executing program 4: 10:34:14 executing program 2: 10:34:14 executing program 3: 10:34:14 executing program 1: 10:34:14 executing program 0: 10:34:14 executing program 5: 10:34:14 executing program 4: 10:34:14 executing program 1: 10:34:14 executing program 2: 10:34:14 executing program 3: 10:34:14 executing program 0: 10:34:15 executing program 5: 10:34:15 executing program 4: 10:34:15 executing program 1: 10:34:15 executing program 2: 10:34:15 executing program 3: 10:34:15 executing program 0: 10:34:15 executing program 5: 10:34:15 executing program 4: 10:34:15 executing program 1: 10:34:15 executing program 2: 10:34:15 executing program 3: 10:34:15 executing program 0: 10:34:15 executing program 4: 10:34:15 executing program 5: 10:34:15 executing program 2: 10:34:15 executing program 1: 10:34:15 executing program 3: 10:34:15 executing program 4: 10:34:15 executing program 1: 10:34:15 executing program 2: 10:34:15 executing program 0: 10:34:15 executing program 5: 10:34:16 executing program 3: 10:34:16 executing program 4: 10:34:16 executing program 2: 10:34:16 executing program 0: 10:34:16 executing program 1: 10:34:16 executing program 5: 10:34:16 executing program 3: 10:34:16 executing program 4: 10:34:16 executing program 2: 10:34:16 executing program 0: 10:34:16 executing program 1: 10:34:16 executing program 5: 10:34:16 executing program 4: 10:34:16 executing program 2: 10:34:16 executing program 3: 10:34:16 executing program 1: 10:34:16 executing program 5: 10:34:16 executing program 0: 10:34:16 executing program 4: 10:34:16 executing program 1: 10:34:16 executing program 2: 10:34:16 executing program 3: 10:34:16 executing program 5: 10:34:17 executing program 0: 10:34:17 executing program 4: 10:34:17 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$cont(0x420a, r0, 0x0, 0x3) 10:34:17 executing program 2: socket$inet(0x2, 0x4000000805, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "fe83038335d25338", "e40621467d98643f3c259bccdd4c8cb809432a388a90aa7d19da66b1008cf9cf", "29e140b1", "69da2fc71746a2f5"}, 0x38) recvmmsg(r1, 0x0, 0x0, 0x0, &(0x7f0000004dc0)={0x77359400}) shutdown(r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_sctp(0x2, 0x0, 0x84) dup3(0xffffffffffffffff, r2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) socket$inet(0x2, 0x0, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x0, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, 0x0, 0x0) 10:34:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x6) 10:34:17 executing program 5: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000540), 0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) ftruncate(r4, 0x208200) openat$sequencer(0xffffffffffffff9c, 0x0, 0x3a5900, 0x0) sendfile(r0, r3, 0x0, 0x8000fffffffe) 10:34:17 executing program 0: 10:34:17 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$cont(0x420a, r0, 0x0, 0x3) 10:34:17 executing program 4: 10:34:17 executing program 3: setregid(0x0, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0xea93da205ce5e287, 0x800}, 0x18) 10:34:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000080)) 10:34:17 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@statfs_quantum={'statfs_quantum'}}]}) 10:34:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200002a000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400090000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000f00000095000000000000003b1c38312c8021431088eccfb0dc47421e7af7c71d8255e61cc1bc3fa2d3974f5205000000d2596bab1c6b60c2bdfbf2cfd77c29b7097491e182cd24dc8f9b2fce787d745202ba97c99a477cd778ff7f96861e449addb5df4266a90f71e0e4cf8a9c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f00a009e0ff043051fffffe100001b00633a77fb892f1414e0004001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) [ 346.684595][ T8359] gfs2: not a GFS2 filesystem 10:34:17 executing program 3: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r0, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "fe83038335d25338", "e40621467d98643f3c259bccdd4c8cb809432a388a90aa7d19da66b1008cf9cf", "29e140b1", "69da2fc71746a2f5"}, 0x38) recvmmsg(r2, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x59, &(0x7f0000004ac0)=""/197, 0x495}}], 0x4000000000001d0, 0x0, &(0x7f0000004dc0)={0x77359400}) shutdown(r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r3, r4, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) r6 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(0xffffffffffffffff, r6, 0x0) [ 346.783348][ T8359] gfs2: not a GFS2 filesystem 10:34:18 executing program 2: socket$inet(0x10, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$cont(0x20, r0, 0x0, 0x3) 10:34:18 executing program 1: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 10:34:18 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0xea93da205ce5e287, 0x800}, 0x18) 10:34:18 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000000)={0x8, {0x6, 0x0, 0x4, 0x9}}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$UI_SET_MSCBIT(r4, 0x40045568, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r6 = socket(0x29, 0x80002, 0x0) sendfile(r6, r5, 0x0, 0x6000002000b00) 10:34:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xfffffee6, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x8, 0x1, @local}]}, 0x20}}, 0x0) 10:34:18 executing program 3: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r0, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "fe83038335d25338", "e40621467d98643f3c259bccdd4c8cb809432a388a90aa7d19da66b1008cf9cf", "29e140b1", "69da2fc71746a2f5"}, 0x38) recvmmsg(r2, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x59, &(0x7f0000004ac0)=""/197, 0x495}}], 0x4000000000001d0, 0x0, &(0x7f0000004dc0)={0x77359400}) shutdown(r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r3, r4, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) r6 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(0xffffffffffffffff, r6, 0x0) 10:34:18 executing program 2: socket$inet(0x10, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$cont(0x20, r0, 0x0, 0x3) 10:34:18 executing program 0: socket$inet(0x2, 0x4000000805, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "fe83038335d25338", "e40621467d98643f3c259bccdd4c8cb809432a388a90aa7d19da66b1008cf9cf", "29e140b1", "69da2fc71746a2f5"}, 0x38) recvmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, &(0x7f0000004a80)}}], 0x1, 0x0, &(0x7f0000004dc0)={0x77359400}) shutdown(r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x0, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @dev}, 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) socket$inet_sctp(0x2, 0x1, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(0xffffffffffffffff, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) 10:34:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x703, 0xe, 0x4d2f, &(0x7f0000000080)="1c04ff01de6da9725f90c5a06d0f9f2400844d0044a98db225a47ecb10b429441dec77009050d9560e58f2e162226d4fe467a890b6c4c556c6894acf3d4cd49c4dd5a2d05d6ce642e3abc0e0cb0a7de568fb3f30013c74eb73383ebaf4257042ec5277fa18a9b201882996c7b8de5080c75756094ac8e258ff1673c27fb2f2bffc290edbc5dec9e44b6fab8d5fcbd12ae8339b04701b316bd5eccc3961ce80", 0x0, 0xf0, 0x0, 0x0, 0xfffffffffffffe19}, 0x28) 10:34:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$dh_compute(0x17, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)={'sha224-arm64\x00'}}) 10:34:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0xfffffffffffffe64, 0x0}}], 0x1, 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r4, &(0x7f0000000c40)=[{0x0}, {&(0x7f0000000b40)=""/195, 0xc3}], 0x2, 0x0) 10:34:18 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "fe83038335d25338", "e40621467d98643f3c259bccdd4c8cb809432a388a90aa7d19da66b1008cf9cf", "29e140b1", "69da2fc71746a2f5"}, 0x38) recvmmsg(r3, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x59, &(0x7f0000004ac0)=""/197, 0x495}}], 0x4000000000001d0, 0x0, &(0x7f0000004dc0)={0x77359400}) shutdown(r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff), 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @dev}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r4, r5, 0x0) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r6, r7, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r8, r9, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) 10:34:18 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 347.879394][ T8435] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) 10:34:19 executing program 1: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 10:34:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = socket(0x10, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32, @ANYBLOB="01000000e0ff00001c0012000c000100626f6e64000000000c00020008000100060000006b7e198ce2e0eafd12712725216c5de3fd38c2080000000000000000046aa106df20e457e8344673460d34d5837a7a5b83a7b440a66fdb53c657a59e2ae7c0c3fc9b35ab643f48200df5ce87f074602a02b575ad5a32c1bbcead140e44c398b3eae621d257390839ca7170c78692c5aedbe296d638d2cb4e6eb874a1f005aacfb82e152db0714287efec2a8a94502ca9c06df4273f4afc3744ff4902a9b65657aaa665bb7646404a3217f1f155e640ed7a5f158950bc1138d9821e763624695f96e6026df01bb2af11fceec3409da2cedb"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000b00010067726574617000000c00020008000100", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="8ce9458bd7e42692bcc57e4e156b7824fd248a081853ff8e6f99ae32acbb2b866aa228798ac540a2dfa46bba928978d25f56cce5e46e17dad4d38a2ee455c96a73a587869ee9ff08370df3dce84899a60e0943dc4b38f299bd8e9baf5662b7bb4ad595a03d0143dbd9913b6b3f15d9bd7962ffce59a5ba81558bece3003da3b9b8ba631f678630bedb67559106527e46048cbade5e"], 0x44}}, 0x0) 10:34:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair(0x29, 0x5, 0x0, &(0x7f00000000c0)) [ 347.941604][ T8430] could not allocate digest TFM handle sha224-arm64 [ 347.957797][ T8443] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 347.995553][ T8435] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 347.996105][ T8443] bond1: (slave gretap1): making interface the new active one [ 348.013070][ T8443] bond1: (slave gretap1): Enslaving as an active interface with an up link [ 348.024801][ T8449] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 348.044593][ T8449] bond2 (uninitialized): Released all slaves 10:34:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29e81d26aa7eff367ec3e89f4a4c20de9619e37f2f84b0d398c27cbd8bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f398e6a3d5d936f0b95a5"], 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfffffee6, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_ADDRESS={0x8, 0x1, @local}]}, 0x20}}, 0x0) 10:34:19 executing program 5: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) [ 348.080813][ T8435] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) 10:34:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 10:34:19 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "fe83038335d25338", "e40621467d98643f3c259bccdd4c8cb809432a388a90aa7d19da66b1008cf9cf", "29e140b1", "69da2fc71746a2f5"}, 0x38) recvmmsg(r3, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x59, &(0x7f0000004ac0)=""/197, 0x495}}], 0x4000000000001d0, 0x0, &(0x7f0000004dc0)={0x77359400}) shutdown(r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff), 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @dev}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r4, r5, 0x0) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r6, r7, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r8, r9, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) [ 348.165423][ T8435] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 10:34:19 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f636b70726f746f3d6c6f636b5f6e6f1807636b2c6c6f636b7461626c653d2f"]) [ 348.291834][ T8462] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 348.400939][ T8472] gfs2: can't find protocol lock_nock [ 348.407190][ T8462] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 348.416065][ T8462] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 348.423955][ T8462] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 348.456815][ T8472] gfs2: can't find protocol lock_nock 10:34:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget(0x0, 0x2000, 0x54000492, &(0x7f0000ffc000/0x2000)=nil) 10:34:19 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f636b70726f746f3d6c6f636b5f6e6f1807636b2c6c6f636b7461626c653d2f"]) 10:34:19 executing program 5: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f00000095c0)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f00000007c0)=""/198, 0xc6}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) setuid(r2) preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 10:34:19 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "fe83038335d25338", "e40621467d98643f3c259bccdd4c8cb809432a388a90aa7d19da66b1008cf9cf", "29e140b1", "69da2fc71746a2f5"}, 0x38) recvmmsg(r3, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x59, &(0x7f0000004ac0)=""/197, 0x495}}], 0x4000000000001d0, 0x0, &(0x7f0000004dc0)={0x77359400}) shutdown(r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff), 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @dev}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r4, r5, 0x0) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r6, r7, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r8, r9, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) 10:34:19 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000007000/0x2000)=nil) futex(&(0x7f00000004c0)=0x2, 0x8c, 0x1, 0x0, &(0x7f0000001680), 0x2) 10:34:20 executing program 2: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0xa0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 10:34:20 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$cont(0x420d, r0, 0x0, 0x3) [ 348.940714][ T8498] gfs2: can't find protocol lock_nock 10:34:20 executing program 0: shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x0) shmctl$SHM_LOCK(0x0, 0xb) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) 10:34:20 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "fe83038335d25338", "e40621467d98643f3c259bccdd4c8cb809432a388a90aa7d19da66b1008cf9cf", "29e140b1", "69da2fc71746a2f5"}, 0x38) recvmmsg(r3, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x59, &(0x7f0000004ac0)=""/197, 0x495}}], 0x4000000000001d0, 0x0, &(0x7f0000004dc0)={0x77359400}) shutdown(r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r4 = socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) dup3(r4, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(0xffffffffffffffff, r5, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) 10:34:20 executing program 1: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "fe83038335d25338", "e40621467d98643f3c259bccdd4c8cb809432a388a90aa7d19da66b1008cf9cf", "29e140b1", "69da2fc71746a2f5"}, 0x38) recvmmsg(r3, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x59, &(0x7f0000004ac0)=""/197, 0x495}}], 0x4000000000001d0, 0x0, &(0x7f0000004dc0)={0x77359400}) shutdown(r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(0xffffffffffffffff, r4, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) 10:34:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) listen(0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000003d80), 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) recvmmsg(r4, &(0x7f0000002ec0), 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r4, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0xbb8) r6 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0xbb8) r7 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r7, &(0x7f00000092c0), 0x4ff, 0xbb8) r8 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r8, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r8, &(0x7f00000092c0), 0x4ff, 0xbb8) r9 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r9, &(0x7f00000092c0), 0x4ff, 0xbb8) r10 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, 0x0) 10:34:20 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x0, 0x2) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') sched_setattr(0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='auxv\x00') getpeername$packet(r4, 0x0, 0x0) ioctl$UI_END_FF_ERASE(r4, 0x400c55cb, &(0x7f00000000c0)={0x9, 0xba, 0x1}) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket(0x840000000002, 0x3, 0x200000000000ff) r6 = socket$unix(0x1, 0x0, 0x0) connect(r6, &(0x7f0000000000)=@rc={0x1f, {0x0, 0x4, 0x0, 0x0, 0x1, 0x9f}, 0x6}, 0x80) r7 = socket$inet(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r7, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r7, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r7, &(0x7f0000003c80), 0x38e, 0x62, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000340)={@remote}, &(0x7f0000000700)=0xc) accept(r1, &(0x7f0000001b80)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000240)=0xffffffffffffff97) syz_open_procfs(0x0, &(0x7f0000000140)='status\x00') sendmmsg$inet(r5, &(0x7f0000002440)=[{{&(0x7f0000000100)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001a40), 0x0, &(0x7f0000001c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9a}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @multicast2, @loopback}}}, @ip_tos_int={{0x14}}], 0xa0}}, {{0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000001d00)="6e86192b3fadbbb74663e482d44f10dd67341f5360ba5284fd02713f7393ffbbb664acdf32eae6ac83347a80645a84e5c1041e2d9e37ad21c232856c810913be9ca0a483d1f86851488a8109ec20d2153c34d0ebaaf97c2215f984a769fce1ba9128afcb76f1b1a5224c5f8754fc2313b7528cd1fbd4ccffb73e57511470c097fd2bf6582d0fa521430979fd513febd07b1405ef1a8f14328594a56b69", 0x9d}, {&(0x7f0000001dc0)="6b657b5f784f6a8d3f204d59a2db49760c5472cd325e2b65871fb2a15899555c", 0x20}, {&(0x7f0000001e00)="2a3dbd05bf4cb07e2438073d32b019040ce1216e3dbe7d201d687924b842ed2e39add49f48894b79020b40e24e62889419def1e7438794b52d60ce5ef7d4f32317afd3fe9a452e2745686dd1825b16c692c8b3bf5ce325b05f011993e443bcd3b0562c38970b99f3aa3cd9ad966946e2a01e23aefc9fd6dd4a5e1feb1ec4", 0x7e}, {&(0x7f0000001e80)="f3be3bb62ed6d05e87404d89b26a3faf0ad980e0bdcbfdb620167ff5d72cf58a5e05f3768ca65a27cf5e3d4ae5663d653b28c5cbffde164378915a68846452e01daebdff4676ee664474e74956d984a14d8471d919efa4f603850d70b3eedbe69e274a57ad1430", 0x67}], 0x4, &(0x7f0000001f40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @loopback}}}, @ip_tos_int={{0x14}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x50}}, {{&(0x7f0000000380)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002200)=[{&(0x7f0000000580)="0164bb1b3cee91d2d23fd07164e71a7801f5084d8bbddc585359319c5af5ff173d56777cbbacaf7a2230a3decfd93551c04a6802ecc89b510747e5a0a2386a08d8adcb6d093332537d945054cbe7622106975a139d6ea1d907c98abd45fd30b082028e3bbd7f4297240740d6e94e6b58f7c9702fed673cfc90a7d126ffefbb22168cda7311efeef208809a6d6f621c0fa2067af03ce38f8205e9988f461be9c70b7d59ff93ff09decf74a9e55430468f15e22cd1fd56879a2f20ab8f1fd80135e9ac1e61f7e87fd6", 0xc8}, {0x0}, {&(0x7f0000002180)="6209ed67941216fdf598146857a68b5a81019042838b95e9512b2b0641e40e569df37b073c12353fc2b901", 0x2b}, {&(0x7f00000021c0)="857bc0bd4d221353bcdbb9b4ffc9fc825e79ab2508b87a902028f0b971dee8b8180b46629feb2882", 0x28}], 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1ce}}, {{&(0x7f0000002280)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002400)=[{&(0x7f00000022c0)="247badb355c651b14744280a13c3b8ffcb44beacbfe5f126189e667bcf69a0bc7cb25e2358332fb486915eec8cce7775876b447a45deb35e5b3f8c346e1b008cd8f583159970ca105cd1389d417e87c3383a2b893230e3635eb35502a705832a2d", 0x61}, {&(0x7f0000002380)="98c45fb1f9d40f", 0x7}, {&(0x7f00000023c0)}], 0x3}}], 0x4, 0x14006081) getsockname(0xffffffffffffffff, &(0x7f0000000400)=@tipc=@id, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r9, 0x40086602, &(0x7f0000000000)=0xaa850ab34c804c98) io_setup(0x105, &(0x7f00000001c0)=0x0) io_submit(r10, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r9, &(0x7f0000000000), 0x10000}]) r11 = getpid() ptrace(0x11, r11) [ 349.685576][ T8537] Route cache is full: consider increasing sysctl net.ipv[4|6].route.max_size. [ 349.685784][ T8541] Route cache is full: consider increasing sysctl net.ipv[4|6].route.max_size. [ 349.696630][ T8537] Route cache is full: consider increasing sysctl net.ipv[4|6].route.max_size. 10:34:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000002000)) dup3(r0, r1, 0x0) 10:34:20 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "fe83038335d25338", "e40621467d98643f3c259bccdd4c8cb809432a388a90aa7d19da66b1008cf9cf", "29e140b1", "69da2fc71746a2f5"}, 0x38) recvmmsg(r3, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x59, &(0x7f0000004ac0)=""/197, 0x495}}], 0x4000000000001d0, 0x0, &(0x7f0000004dc0)={0x77359400}) shutdown(r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r4 = socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) dup3(r4, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(0xffffffffffffffff, r5, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) [ 349.755531][ T8548] Route cache is full: consider increasing sysctl net.ipv[4|6].route.max_size. [ 349.755926][ T8542] Route cache is full: consider increasing sysctl net.ipv[4|6].route.max_size. [ 349.765677][ T8547] Route cache is full: consider increasing sysctl net.ipv[4|6].route.max_size. 10:34:20 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)={0x14, 0x26, 0x3fd}, 0x14}}, 0x0) 10:34:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) listen(0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000003d80), 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) recvmmsg(r4, &(0x7f0000002ec0), 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r4, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0xbb8) r6 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0xbb8) r7 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r7, &(0x7f00000092c0), 0x4ff, 0xbb8) r8 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r8, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r8, &(0x7f00000092c0), 0x4ff, 0xbb8) r9 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r9, &(0x7f00000092c0), 0x4ff, 0xbb8) r10 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, 0x0) [ 349.903745][ T8555] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:34:21 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) listen(0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000003d80), 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) recvmmsg(r4, &(0x7f0000002ec0), 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r4, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0xbb8) r6 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0xbb8) r7 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r7, &(0x7f00000092c0), 0x4ff, 0xbb8) r8 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r8, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r8, &(0x7f00000092c0), 0x4ff, 0xbb8) r9 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r9, &(0x7f00000092c0), 0x4ff, 0xbb8) r10 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, 0x0) 10:34:21 executing program 2: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0xa0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 10:34:21 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$uid(0x3, 0x0) 10:34:21 executing program 4: io_submit(0x0, 0x30b, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000080), 0x10}]) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 350.257883][ T8573] ================================================================== [ 350.266079][ T8573] BUG: KCSAN: data-race in ip6_dst_gc / ip6_dst_gc [ 350.272589][ T8573] [ 350.274957][ T8573] read to 0xffff8880a45b298c of 4 bytes by task 8579 on cpu 0: [ 350.282514][ T8573] ip6_dst_gc+0xf6/0x220 [ 350.286812][ T8573] dst_alloc+0x104/0x149 [ 350.291074][ T8573] ip6_dst_alloc+0x3d/0x80 [ 350.295491][ T8573] ip6_rt_cache_alloc+0x12b/0x480 [ 350.300535][ T8573] ip6_pol_route+0x5d2/0x730 [ 350.305139][ T8573] ip6_pol_route_output+0x48/0x60 [ 350.310187][ T8573] fib6_rule_lookup+0x3d6/0x470 [ 350.315067][ T8573] ip6_route_output_flags_noref+0x16b/0x230 [ 350.320978][ T8573] ip6_route_output_flags+0x50/0x1a0 [ 350.326276][ T8573] ip6_dst_lookup_tail+0x25d/0xc50 [ 350.331399][ T8573] ip6_dst_lookup_flow+0x5c/0x110 [ 350.336434][ T8573] rawv6_sendmsg+0x9be/0x2340 [ 350.341238][ T8573] inet_sendmsg+0x6d/0x90 [ 350.345632][ T8573] sock_sendmsg+0x9f/0xc0 [ 350.349987][ T8573] ____sys_sendmsg+0x212/0x4d0 [ 350.354768][ T8573] ___sys_sendmsg+0xb5/0x100 [ 350.359371][ T8573] __sys_sendmmsg+0x123/0x350 [ 350.364072][ T8573] __x64_sys_sendmmsg+0x64/0x80 [ 350.368936][ T8573] do_syscall_64+0xcc/0x3a0 [ 350.373463][ T8573] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 350.379350][ T8573] [ 350.381695][ T8573] write to 0xffff8880a45b298c of 4 bytes by task 8573 on cpu 1: [ 350.389337][ T8573] ip6_dst_gc+0x19f/0x220 [ 350.393687][ T8573] dst_alloc+0x104/0x149 [ 350.397961][ T8573] ip6_dst_alloc+0x3d/0x80 [ 350.402384][ T8573] ip6_rt_cache_alloc+0x12b/0x480 [ 350.407410][ T8573] ip6_pol_route+0x5d2/0x730 [ 350.412009][ T8573] ip6_pol_route_output+0x48/0x60 [ 350.417043][ T8573] fib6_rule_lookup+0x3d6/0x470 [ 350.421919][ T8573] ip6_route_output_flags_noref+0x16b/0x230 [ 350.427832][ T8573] ip6_route_output_flags+0x50/0x1a0 [ 350.433145][ T8573] ip6_dst_lookup_tail+0x25d/0xc50 [ 350.438257][ T8573] ip6_dst_lookup_flow+0x5c/0x110 [ 350.439076][ T8579] Route cache is full: consider increasing sysctl net.ipv[4|6].route.max_size. [ 350.443422][ T8573] rawv6_sendmsg+0x9be/0x2340 [ 350.457036][ T8573] inet_sendmsg+0x6d/0x90 [ 350.461390][ T8573] sock_sendmsg+0x9f/0xc0 [ 350.463746][ T8579] Route cache is full: consider increasing sysctl net.ipv[4|6].route.max_size. [ 350.465735][ T8573] ____sys_sendmsg+0x212/0x4d0 [ 350.465751][ T8573] ___sys_sendmsg+0xb5/0x100 [ 350.465779][ T8573] __sys_sendmmsg+0x123/0x350 [ 350.488824][ T8573] __x64_sys_sendmmsg+0x64/0x80 [ 350.493784][ T8573] do_syscall_64+0xcc/0x3a0 [ 350.494272][ T8570] Route cache is full: consider increasing sysctl net.ipv[4|6].route.max_size. [ 350.498306][ T8573] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 350.498311][ T8573] [ 350.498316][ T8573] Reported by Kernel Concurrency Sanitizer on: [ 350.498335][ T8573] CPU: 1 PID: 8573 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 350.498397][ T8573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.540292][ T8573] ================================================================== [ 350.548359][ T8573] Kernel panic - not syncing: panic_on_warn set ... [ 350.554964][ T8573] CPU: 1 PID: 8573 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 350.563544][ T8573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.573729][ T8573] Call Trace: [ 350.577035][ T8573] dump_stack+0x11d/0x181 [ 350.581385][ T8573] panic+0x210/0x640 [ 350.585301][ T8573] ? vprintk_func+0x8d/0x140 [ 350.589913][ T8573] kcsan_report.cold+0xc/0xd [ 350.594526][ T8573] kcsan_setup_watchpoint+0x3fe/0x460 [ 350.599914][ T8573] __tsan_unaligned_write4+0xc7/0x110 [ 350.605297][ T8573] ip6_dst_gc+0x19f/0x220 [ 350.609641][ T8573] dst_alloc+0x104/0x149 [ 350.613900][ T8573] ip6_dst_alloc+0x3d/0x80 [ 350.618326][ T8573] ip6_rt_cache_alloc+0x12b/0x480 [ 350.623367][ T8573] ip6_pol_route+0x5d2/0x730 [ 350.627980][ T8573] ? __const_udelay+0x36/0x40 [ 350.632672][ T8573] ip6_pol_route_output+0x48/0x60 [ 350.637718][ T8573] fib6_rule_lookup+0x3d6/0x470 [ 350.642584][ T8573] ? ip6_pol_route_input+0x70/0x70 [ 350.647704][ T8573] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 350.653436][ T8573] ? dev_get_by_index_rcu+0xbe/0xe0 [ 350.658658][ T8573] ip6_route_output_flags_noref+0x16b/0x230 [ 350.664575][ T8573] ip6_route_output_flags+0x50/0x1a0 [ 350.669873][ T8573] ? ksoftirqd_running+0x39/0x40 [ 350.674835][ T8573] ip6_dst_lookup_tail+0x25d/0xc50 [ 350.679970][ T8573] ? debug_smp_processor_id+0x43/0x137 [ 350.685449][ T8573] ? dst_destroy+0x210/0x210 [ 350.690055][ T8573] ? debug_smp_processor_id+0x43/0x137 [ 350.695533][ T8573] ? dst_destroy+0x210/0x210 [ 350.700240][ T8573] ? __call_rcu+0x153/0x390 [ 350.704850][ T8573] ip6_dst_lookup_flow+0x5c/0x110 [ 350.709899][ T8573] rawv6_sendmsg+0x9be/0x2340 [ 350.714586][ T8573] ? __ipv6_dev_get_saddr+0x217/0x2d0 [ 350.720097][ T8573] ? __rcu_read_unlock+0x66/0x3d0 [ 350.725142][ T8573] ? __const_udelay+0x36/0x40 [ 350.729847][ T8573] ? __udelay+0x10/0x20 [ 350.734140][ T8573] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 350.740405][ T8573] ? aa_label_sk_perm+0x89/0xe0 [ 350.745284][ T8573] ? aa_sk_perm+0x1d3/0x590 [ 350.749813][ T8573] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 10:34:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$key(0xf, 0x3, 0x2) fcntl$lock(r1, 0x7, &(0x7f0000000040)={0x1}) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x3}) dup3(r0, r1, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfff) [ 350.756180][ T8573] inet_sendmsg+0x6d/0x90 [ 350.760547][ T8573] ? inet_sendmsg+0x6d/0x90 [ 350.765069][ T8573] ? inet_send_prepare+0x200/0x200 [ 350.770195][ T8573] sock_sendmsg+0x9f/0xc0 [ 350.774543][ T8573] ____sys_sendmsg+0x212/0x4d0 [ 350.779325][ T8573] ___sys_sendmsg+0xb5/0x100 [ 350.783947][ T8573] ? __fget+0xb8/0x1d0 [ 350.788048][ T8573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 350.794428][ T8573] ? debug_smp_processor_id+0x43/0x137 [ 350.800611][ T8573] ? delay_tsc+0x8f/0xc0 [ 350.805401][ T8573] ? __const_udelay+0x36/0x40 [ 350.810616][ T8573] ? __udelay+0x10/0x20 [ 350.814789][ T8573] __sys_sendmmsg+0x123/0x350 [ 350.819613][ T8573] ? __read_once_size+0x5a/0xe0 [ 350.824488][ T8573] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 350.830518][ T8573] ? _copy_to_user+0x84/0xb0 [ 350.835128][ T8573] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 350.841384][ T8573] ? put_timespec64+0x94/0xc0 [ 350.846085][ T8573] __x64_sys_sendmmsg+0x64/0x80 [ 350.851090][ T8573] do_syscall_64+0xcc/0x3a0 [ 350.855903][ T8573] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 350.861817][ T8573] RIP: 0033:0x45aff9 [ 350.865735][ T8573] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 350.885443][ T8573] RSP: 002b:00007fa2722b5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 350.894065][ T8573] RAX: ffffffffffffffda RBX: 00007fa2722b66d4 RCX: 000000000045aff9 [ 350.902051][ T8573] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000007 [ 350.910042][ T8573] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 350.918039][ T8573] R10: 0000000000000bb8 R11: 0000000000000246 R12: 00000000ffffffff [ 350.926024][ T8573] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000075bfd4 [ 350.935550][ T8573] Kernel Offset: disabled [ 350.939899][ T8573] Rebooting in 86400 seconds..