[   36.512867] audit: type=1800 audit(1539211932.839:22): pid=5694 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0
[   36.540515] audit: type=1800 audit(1539211932.839:23): pid=5694 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rsyslog" dev="sda1" ino=2442 res=0
[   36.564580] audit: type=1800 audit(1539211932.839:24): pid=5694 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="sudo" dev="sda1" ino=2454 res=0
[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.0.48' (ECDSA) to the list of known hosts.
2018/10/10 22:52:24 fuzzer started
2018/10/10 22:52:27 dialing manager at 10.128.0.26:42895
2018/10/10 22:52:27 syscalls: 1
2018/10/10 22:52:27 code coverage: enabled
2018/10/10 22:52:27 comparison tracing: enabled
2018/10/10 22:52:27 setuid sandbox: enabled
2018/10/10 22:52:27 namespace sandbox: enabled
2018/10/10 22:52:27 Android sandbox: /sys/fs/selinux/policy does not exist
2018/10/10 22:52:27 fault injection: enabled
2018/10/10 22:52:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2018/10/10 22:52:27 net packed injection: enabled
2018/10/10 22:52:27 net device setup: enabled
22:53:15 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070")
r1 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0)
setsockopt$inet6_group_source_req(r1, 0x29, 0x1c, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x0, @dev}}}, 0x1cb)

syzkaller login: [   99.357663] IPVS: ftp: loaded support on port[0] = 21
22:53:15 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58)
r1 = accept4(r0, 0x0, &(0x7f0000000080)=0xfffffffffffffeb2, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)='\n', 0x1)
sendmmsg(r1, &(0x7f0000001600)=[{{&(0x7f0000000140)=@sco, 0x80, &(0x7f00000006c0)}}, {{&(0x7f0000000740)=@rc, 0x80, &(0x7f00000009c0), 0x0, &(0x7f0000000a00)}}], 0x2, 0x0)

[   99.588719] IPVS: ftp: loaded support on port[0] = 21
22:53:16 executing program 2:
r0 = socket$inet6(0xa, 0x2, 0x0)
sendmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{&(0x7f0000000000)=@in={0x2, 0x4e22, @dev}, 0x80, &(0x7f0000001180), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1400000000000000000000000100000047e04087"], 0x14}}], 0x1, 0x0)
connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x0)

[   99.821414] IPVS: ftp: loaded support on port[0] = 21
22:53:16 executing program 3:
r0 = socket$inet(0x10, 0x3, 0x0)
recvmsg(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/177, 0xb1}, {&(0x7f0000000280)=""/160, 0xa0}, {&(0x7f0000000100)=""/91, 0x5b}, {&(0x7f0000000340)=""/177, 0xb1}, {&(0x7f00000018c0)=""/4096, 0x1000}], 0x5}, 0x0)
sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0)
recvmmsg(r0, &(0x7f0000006fc0), 0x264, 0x2002, 0x0)

[  100.286728] IPVS: ftp: loaded support on port[0] = 21
22:53:16 executing program 4:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={"6e6174000000000000000300", 0x19, 0x1, 0x238, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, &(0x7f0000000240), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x800, 'ifb0\x00', 'dummy0\x00', 'ip_vti0\x00', 'ip6tnl0\x00', @remote, [], @link_local, [], 0xf0, 0x170, 0x1a8, [@ip={'ip\x00', 0x20, {{@loopback, @dev, 0x0, 0x0, 0x0, 0x84}}}, @realm={'realm\x00', 0x2f}]}, [@arpreply={'arpreply\x00', 0x10, {{@local}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}]}, 0x2b0)

[  100.555267] bridge0: port 1(bridge_slave_0) entered blocking state
[  100.576099] bridge0: port 1(bridge_slave_0) entered disabled state
[  100.593710] device bridge_slave_0 entered promiscuous mode
[  100.686305] bridge0: port 2(bridge_slave_1) entered blocking state
[  100.706643] bridge0: port 2(bridge_slave_1) entered disabled state
[  100.720589] device bridge_slave_1 entered promiscuous mode
[  100.821104] IPVS: ftp: loaded support on port[0] = 21
[  100.849062] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  100.980560] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  101.007585] bridge0: port 1(bridge_slave_0) entered blocking state
[  101.029041] bridge0: port 1(bridge_slave_0) entered disabled state
[  101.048997] device bridge_slave_0 entered promiscuous mode
22:53:17 executing program 5:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa}]}}}]}, 0x3c}}, 0x0)

[  101.136074] bridge0: port 2(bridge_slave_1) entered blocking state
[  101.164486] bridge0: port 2(bridge_slave_1) entered disabled state
[  101.176725] device bridge_slave_1 entered promiscuous mode
[  101.303400] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  101.325835] IPVS: ftp: loaded support on port[0] = 21
[  101.344773] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  101.450315] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  101.458288] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  101.571822] bridge0: port 1(bridge_slave_0) entered blocking state
[  101.588892] bridge0: port 1(bridge_slave_0) entered disabled state
[  101.596128] device bridge_slave_0 entered promiscuous mode
[  101.617724] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  101.660031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  101.691004] bridge0: port 2(bridge_slave_1) entered blocking state
[  101.697421] bridge0: port 2(bridge_slave_1) entered disabled state
[  101.718055] device bridge_slave_1 entered promiscuous mode
[  101.806758] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  101.859779] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  101.930632] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  101.959721] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  101.986764] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  101.999520] team0: Port device team_slave_0 added
[  102.055906] bridge0: port 1(bridge_slave_0) entered blocking state
[  102.074098] bridge0: port 1(bridge_slave_0) entered disabled state
[  102.087834] device bridge_slave_0 entered promiscuous mode
[  102.100329] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  102.113789] team0: Port device team_slave_1 added
[  102.193795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  102.234329] bridge0: port 2(bridge_slave_1) entered blocking state
[  102.245645] bridge0: port 2(bridge_slave_1) entered disabled state
[  102.253502] device bridge_slave_1 entered promiscuous mode
[  102.261319] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  102.270633] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  102.293499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  102.306112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  102.336791] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  102.349706] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  102.359518] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  102.368195] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  102.407018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  102.421080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  102.442607] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  102.464962] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  102.499033] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  102.509176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  102.523798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  102.550934] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  102.565702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  102.697781] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  102.711914] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  102.729707] team0: Port device team_slave_0 added
[  102.737589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  102.781851] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  102.833427] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  102.841843] team0: Port device team_slave_1 added
[  102.884515] bridge0: port 1(bridge_slave_0) entered blocking state
[  102.898923] bridge0: port 1(bridge_slave_0) entered disabled state
[  102.908553] device bridge_slave_0 entered promiscuous mode
[  102.936999] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  102.956988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  103.009339] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  103.017775] team0: Port device team_slave_0 added
[  103.036896] bridge0: port 2(bridge_slave_1) entered blocking state
[  103.058840] bridge0: port 2(bridge_slave_1) entered disabled state
[  103.069818] device bridge_slave_1 entered promiscuous mode
[  103.109073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  103.142161] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  103.157051] team0: Port device team_slave_1 added
[  103.172657] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  103.184977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  103.199973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  103.209676] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  103.216825] bridge0: port 1(bridge_slave_0) entered blocking state
[  103.249245] bridge0: port 1(bridge_slave_0) entered disabled state
[  103.256468] device bridge_slave_0 entered promiscuous mode
[  103.271239] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  103.283268] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  103.305660] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  103.325127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  103.335925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  103.351365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  103.375998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  103.390108] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  103.413636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  103.424089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  103.447565] bridge0: port 2(bridge_slave_1) entered blocking state
[  103.468915] bridge0: port 2(bridge_slave_1) entered disabled state
[  103.480484] device bridge_slave_1 entered promiscuous mode
[  103.517905] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  103.541545] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  103.550551] team0: Port device team_slave_0 added
[  103.555921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  103.565237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  103.581098] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  103.602025] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  103.619182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  103.634424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  103.662772] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  103.672766] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  103.681476] team0: Port device team_slave_1 added
[  103.688365] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  103.768627] bridge0: port 2(bridge_slave_1) entered blocking state
[  103.775082] bridge0: port 2(bridge_slave_1) entered forwarding state
[  103.781759] bridge0: port 1(bridge_slave_0) entered blocking state
[  103.788119] bridge0: port 1(bridge_slave_0) entered forwarding state
[  103.801708] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  103.840281] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  103.849394] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  103.945449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  104.033991] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  104.041394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  104.051969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  104.067744] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  104.106965] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  104.139079] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  104.149524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  104.183523] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  104.280102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  104.362256] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  104.374052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  104.406593] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  104.416910] team0: Port device team_slave_0 added
[  104.538573] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  104.559505] team0: Port device team_slave_1 added
[  104.574939] bridge0: port 2(bridge_slave_1) entered blocking state
[  104.581353] bridge0: port 2(bridge_slave_1) entered forwarding state
[  104.587994] bridge0: port 1(bridge_slave_0) entered blocking state
[  104.594396] bridge0: port 1(bridge_slave_0) entered forwarding state
[  104.602626] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  104.625513] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  104.672567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  104.691814] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  104.729979] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  104.737752] team0: Port device team_slave_0 added
[  104.761860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  104.808996] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  104.816167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  104.824341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  104.866239] bridge0: port 2(bridge_slave_1) entered blocking state
[  104.872634] bridge0: port 2(bridge_slave_1) entered forwarding state
[  104.879308] bridge0: port 1(bridge_slave_0) entered blocking state
[  104.885662] bridge0: port 1(bridge_slave_0) entered forwarding state
[  104.905109] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  104.916662] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  104.924631] team0: Port device team_slave_1 added
[  104.932364] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  104.981770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  105.007697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  105.029399] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  105.070876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  105.158447] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  105.173114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  105.192672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  105.267357] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  105.275556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  105.285219] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  105.293391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  105.301226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  105.404191] bridge0: port 2(bridge_slave_1) entered blocking state
[  105.410650] bridge0: port 2(bridge_slave_1) entered forwarding state
[  105.417299] bridge0: port 1(bridge_slave_0) entered blocking state
[  105.423701] bridge0: port 1(bridge_slave_0) entered forwarding state
[  105.441693] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  106.074650] bridge0: port 2(bridge_slave_1) entered blocking state
[  106.081070] bridge0: port 2(bridge_slave_1) entered forwarding state
[  106.087702] bridge0: port 1(bridge_slave_0) entered blocking state
[  106.094102] bridge0: port 1(bridge_slave_0) entered forwarding state
[  106.115303] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  106.354581] bridge0: port 2(bridge_slave_1) entered blocking state
[  106.361006] bridge0: port 2(bridge_slave_1) entered forwarding state
[  106.367641] bridge0: port 1(bridge_slave_0) entered blocking state
[  106.374047] bridge0: port 1(bridge_slave_0) entered forwarding state
[  106.390363] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  106.398289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  106.406160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  106.413657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  107.953780] 8021q: adding VLAN 0 to HW filter on device bond0
[  108.303454] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  108.693996] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  108.709587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  108.718081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  108.742013] 8021q: adding VLAN 0 to HW filter on device bond0
[  109.067478] 8021q: adding VLAN 0 to HW filter on device team0
[  109.119139] 8021q: adding VLAN 0 to HW filter on device bond0
[  109.156740] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  109.477866] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  109.612552] 8021q: adding VLAN 0 to HW filter on device bond0
[  109.634833] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  109.641984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  109.660210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  109.879907] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  109.886622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  109.902843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  109.982739] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  110.045579] 8021q: adding VLAN 0 to HW filter on device team0
[  110.229279] 8021q: adding VLAN 0 to HW filter on device team0
[  110.339623] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  110.345886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  110.357210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  110.371724] 8021q: adding VLAN 0 to HW filter on device bond0
[  110.481364] 8021q: adding VLAN 0 to HW filter on device bond0
[  110.759115] 8021q: adding VLAN 0 to HW filter on device team0
[  110.811523] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  110.896301] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  111.190047] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  111.196194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  111.204311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  111.262944] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  111.276504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  111.291079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  111.610380] 8021q: adding VLAN 0 to HW filter on device team0
[  111.672865] 8021q: adding VLAN 0 to HW filter on device team0
22:53:28 executing program 0:
r0 = socket$inet6(0xa, 0x80003, 0x800000000000006)
ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070")
r1 = socket(0x10, 0x80002, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000001c0), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=@ipv6_newroute={0x30, 0x18, 0xa21, 0x0, 0x0, {}, [@RTA_GATEWAY={0x14, 0x5, @loopback}]}, 0x30}}, 0x0)
sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x492492492492861, 0x0)

22:53:28 executing program 1:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60)
r2 = epoll_create(0x6)
clock_gettime(0x0, &(0x7f00000000c0)={0x0, <r3=>0x0})
ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008})
epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

22:53:28 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x10, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @remote}}}, 0x7a)

22:53:28 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f00000015c0)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0)
recvmsg(r1, &(0x7f0000001200)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000001640)=""/4096, 0x12c1}], 0x1, &(0x7f0000fb3fa9)=""/87, 0xffffffffffffffea}, 0x0)

22:53:28 executing program 0:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c)
sendmmsg(r1, &(0x7f000000ac80)=[{{&(0x7f0000001240)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001600), 0x0, &(0x7f0000000400)}}, {{0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000140)=[{0x18, 0x29, 0x3b, 'hv'}], 0x18}}], 0x2, 0x0)
bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10)
sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000340)='%', 0x1}], 0x1, &(0x7f0000000480)=ANY=[]}, 0x5)
recvmmsg(r0, &(0x7f0000000800)=[{{&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000640)=""/238, 0xee}], 0x1, &(0x7f0000000740)=""/190, 0xbe}}], 0x1, 0x141, &(0x7f0000000400))

22:53:29 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f00000015c0)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0)
recvmsg(r1, &(0x7f0000001200)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000001640)=""/4096, 0x12c1}], 0x1, &(0x7f0000fb3fa9)=""/87, 0xffffffffffffffea}, 0x0)

22:53:29 executing program 0:
r0 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10)
bind(r0, &(0x7f0000d01ff0)=ANY=[], 0x0)
close(r0)

[  112.941533] netlink: 'syz-executor3': attribute type 29 has an invalid length.
[  112.958656] netlink: 'syz-executor3': attribute type 29 has an invalid length.
[  112.980927] netlink: 'syz-executor3': attribute type 29 has an invalid length.
22:53:29 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f00000015c0)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0)
recvmsg(r1, &(0x7f0000001200)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000001640)=""/4096, 0x12c1}], 0x1, &(0x7f0000fb3fa9)=""/87, 0xffffffffffffffea}, 0x0)

22:53:29 executing program 0:
r0 = socket$inet6(0xa, 0x5, 0x0)
setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x5c}, 0x8)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
sendto$inet6(r0, &(0x7f0000000100)="a1", 0x1, 0x8dffffff, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  113.002711] netlink: 'syz-executor3': attribute type 29 has an invalid length.
[  113.015288] netlink: 'syz-executor3': attribute type 29 has an invalid length.
[  113.024274] netlink: 'syz-executor3': attribute type 29 has an invalid length.
[  113.043292] netlink: 'syz-executor3': attribute type 29 has an invalid length.
[  113.067857] netlink: 'syz-executor3': attribute type 29 has an invalid length.
[  113.078090] netlink: 'syz-executor3': attribute type 29 has an invalid length.
[  113.085883] netlink: 'syz-executor3': attribute type 29 has an invalid length.
22:53:29 executing program 3:
r0 = socket$inet(0x10, 0x3, 0x0)
recvmsg(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/177, 0xb1}, {&(0x7f0000000280)=""/160, 0xa0}, {&(0x7f0000000100)=""/91, 0x5b}, {&(0x7f0000000340)=""/177, 0xb1}, {&(0x7f00000018c0)=""/4096, 0x1000}], 0x5}, 0x0)
sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0)
recvmmsg(r0, &(0x7f0000006fc0), 0x264, 0x2002, 0x0)

22:53:29 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60)
r2 = epoll_create(0x6)
clock_gettime(0x0, &(0x7f00000000c0)={0x0, <r3=>0x0})
ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008})
epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

22:53:29 executing program 5:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa}]}}}]}, 0x3c}}, 0x0)

22:53:29 executing program 0:
r0 = socket(0x100000000a, 0x1, 0x0)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108)

22:53:29 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f00000015c0)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0)
recvmsg(r1, &(0x7f0000001200)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000001640)=""/4096, 0x12c1}], 0x1, &(0x7f0000fb3fa9)=""/87, 0xffffffffffffffea}, 0x0)

22:53:29 executing program 3:
r0 = socket$inet(0x10, 0x3, 0x0)
recvmsg(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/177, 0xb1}, {&(0x7f0000000280)=""/160, 0xa0}, {&(0x7f0000000100)=""/91, 0x5b}, {&(0x7f0000000340)=""/177, 0xb1}, {&(0x7f00000018c0)=""/4096, 0x1000}], 0x5}, 0x0)
sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0)
recvmmsg(r0, &(0x7f0000006fc0), 0x264, 0x2002, 0x0)

22:53:29 executing program 1:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60)
r2 = epoll_create(0x6)
clock_gettime(0x0, &(0x7f00000000c0)={0x0, <r3=>0x0})
ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008})
epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

22:53:29 executing program 0:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60)
r2 = epoll_create(0x6)
clock_gettime(0x0, &(0x7f00000000c0)={0x0, <r3=>0x0})
ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008})
epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

22:53:30 executing program 3:
r0 = socket$inet(0x10, 0x3, 0x0)
recvmsg(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/177, 0xb1}, {&(0x7f0000000280)=""/160, 0xa0}, {&(0x7f0000000100)=""/91, 0x5b}, {&(0x7f0000000340)=""/177, 0xb1}, {&(0x7f00000018c0)=""/4096, 0x1000}], 0x5}, 0x0)
sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0)
recvmmsg(r0, &(0x7f0000006fc0), 0x264, 0x2002, 0x0)

22:53:30 executing program 2:
bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1)
bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14)

22:53:30 executing program 5:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa}]}}}]}, 0x3c}}, 0x0)

22:53:30 executing program 2:
syz_emit_ethernet(0x158, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x2b, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000100))

22:53:30 executing program 5:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa}]}}}]}, 0x3c}}, 0x0)

22:53:30 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60)
r2 = epoll_create(0x6)
clock_gettime(0x0, &(0x7f00000000c0)={0x0, <r3=>0x0})
ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008})
epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

22:53:30 executing program 3:
socket(0xf, 0x3, 0x0)

22:53:30 executing program 2:
r0 = socket$inet_dccp(0x2, 0x6, 0x0)
listen(r0, 0x0)
setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000280)='\a\x00\x00\x00', 0x4)

22:53:30 executing program 5:
r0 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000000c0), 0x0)

22:53:30 executing program 1:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60)
r2 = epoll_create(0x6)
clock_gettime(0x0, &(0x7f00000000c0)={0x0, <r3=>0x0})
ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008})
epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

22:53:30 executing program 3:
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
connect(r0, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000000040)={&(0x7f0000004fb8)={0x5, 0x1, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0)
sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}}, 0x0)

22:53:30 executing program 0:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60)
r2 = epoll_create(0x6)
clock_gettime(0x0, &(0x7f00000000c0)={0x0, <r3=>0x0})
ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008})
epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

22:53:30 executing program 2:
r0 = socket$inet_dccp(0x2, 0x6, 0x0)
listen(r0, 0x0)
setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000280)='\a\x00\x00\x00', 0x4)

22:53:30 executing program 5:
r0 = socket$inet6(0xa, 0x3, 0x800000000000004)
ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070")
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0xe2e4, 0x20000fff})

22:53:30 executing program 2:
r0 = socket$inet_dccp(0x2, 0x6, 0x0)
listen(r0, 0x0)
setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000280)='\a\x00\x00\x00', 0x4)

22:53:30 executing program 3:
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
connect(r0, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000000040)={&(0x7f0000004fb8)={0x5, 0x1, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0)
sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}}, 0x0)

22:53:30 executing program 2:
r0 = socket$inet_dccp(0x2, 0x6, 0x0)
listen(r0, 0x0)
setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000280)='\a\x00\x00\x00', 0x4)

22:53:31 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60)
r2 = epoll_create(0x6)
clock_gettime(0x0, &(0x7f00000000c0)={0x0, <r3=>0x0})
ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008})
epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

22:53:31 executing program 3:
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
connect(r0, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000000040)={&(0x7f0000004fb8)={0x5, 0x1, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0)
sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}}, 0x0)

22:53:31 executing program 5:
r0 = socket$inet6(0xa, 0x3, 0x800000000000004)
ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070")
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0xe2e4, 0x20000fff})

22:53:31 executing program 2:
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
connect(r0, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000000040)={&(0x7f0000004fb8)={0x5, 0x1, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0)
sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}}, 0x0)

22:53:31 executing program 1:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60)
r2 = epoll_create(0x6)
clock_gettime(0x0, &(0x7f00000000c0)={0x0, <r3=>0x0})
ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008})
epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

22:53:31 executing program 3:
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
connect(r0, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000000040)={&(0x7f0000004fb8)={0x5, 0x1, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0)
sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}}, 0x0)

22:53:31 executing program 0:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x1, 0x2, 0x5, 0x81, 0x0, "289415a6ab0158bcfc796a1efc2041006ec63049ade51a093f3212d5cf18057f080de58338671e093f4159a9a623b314a740eb6015c2be40b17e7511dbfc7b", 0x34}, 0x60)
r2 = epoll_create(0x6)
clock_gettime(0x0, &(0x7f00000000c0)={0x0, <r3=>0x0})
ppoll(&(0x7f0000000040)=[{r0}, {r2}], 0x2, &(0x7f0000000180)={0x0, r3+30000000}, &(0x7f00000001c0), 0x8)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008})
epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

22:53:31 executing program 2:
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
connect(r0, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000000040)={&(0x7f0000004fb8)={0x5, 0x1, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0)
sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}}, 0x0)

22:53:31 executing program 3:
r0 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_tx_ring(r0, 0x107, 0x9, &(0x7f0000000100)=@req3, 0x3)

22:53:31 executing program 5:
r0 = socket$inet6(0xa, 0x3, 0x800000000000004)
ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070")
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0xe2e4, 0x20000fff})

22:53:31 executing program 2:
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
connect(r0, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000000040)={&(0x7f0000004fb8)={0x5, 0x1, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0)
sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000200), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}}, 0x0)

22:53:31 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)="2f02726f75702e7374617000a3c3afd2dbb9fd60b1275d6051e52992391deefbc7830340a7d12baee4e138a9e729281793d907002f5147ceb3c2e99d6cb0bd00cfd55a660b2d3e8cab6a2fd907c8c9c210eaeccfca1d4899493ab60eb3e6e6317d05ee1e6543bd92ada18b7b8b6597e86b41f587283e3baa7c42a6814bf4775c9b23e40b8174e9eca285c0f5891c7f719850aac708054611f8e585bc4a400b9dc5918273e4dba4eb00eacaa039161a4cee106ecd46856f", 0x2761, 0x0)
ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0xffffffff})

[  115.213248] syz-executor5 (7585) used greatest stack depth: 14992 bytes left
22:53:31 executing program 1:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}, 0xb)
sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c)
ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f0000000140), &(0x7f0000000180), 0x8)

22:53:31 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0xfffff029}]}, 0x10)

22:53:31 executing program 5:
r0 = socket$inet6(0xa, 0x3, 0x800000000000004)
ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070")
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0xe2e4, 0x20000fff})

22:53:31 executing program 3:
r0 = socket$inet6(0xa, 0x5, 0x0)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
r1 = socket$inet(0x2, 0x3, 0x1)
connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10)
r2 = socket(0xa, 0x1, 0x0)
setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000001c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88)
setsockopt$inet_opts(r1, 0x0, 0x800000000000003, &(0x7f00000000c0), 0x0)

22:53:31 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)="2f02726f75702e7374617000a3c3afd2dbb9fd60b1275d6051e52992391deefbc7830340a7d12baee4e138a9e729281793d907002f5147ceb3c2e99d6cb0bd00cfd55a660b2d3e8cab6a2fd907c8c9c210eaeccfca1d4899493ab60eb3e6e6317d05ee1e6543bd92ada18b7b8b6597e86b41f587283e3baa7c42a6814bf4775c9b23e40b8174e9eca285c0f5891c7f719850aac708054611f8e585bc4a400b9dc5918273e4dba4eb00eacaa039161a4cee106ecd46856f", 0x2761, 0x0)
ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0xffffffff})

22:53:32 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)="2f02726f75702e7374617000a3c3afd2dbb9fd60b1275d6051e52992391deefbc7830340a7d12baee4e138a9e729281793d907002f5147ceb3c2e99d6cb0bd00cfd55a660b2d3e8cab6a2fd907c8c9c210eaeccfca1d4899493ab60eb3e6e6317d05ee1e6543bd92ada18b7b8b6597e86b41f587283e3baa7c42a6814bf4775c9b23e40b8174e9eca285c0f5891c7f719850aac708054611f8e585bc4a400b9dc5918273e4dba4eb00eacaa039161a4cee106ecd46856f", 0x2761, 0x0)
ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0xffffffff})

22:53:32 executing program 4:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_int(r0, 0x0, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x4)

22:53:32 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7e228e36d99e2f0265df5dc7b581280cd556138d5f0e0658d18fb7c", 0x1c)
r1 = accept$alg(r0, 0x0, 0x0)
write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYRESDEC], 0xffffff18)
recvmmsg(r1, &(0x7f0000008e80)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x34010}], 0x1, &(0x7f0000001680)=""/72, 0x48}}], 0x1, 0x0, &(0x7f0000002240))

22:53:32 executing program 3:
socketpair$unix(0x1, 0x801, 0x0, &(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet6(0xa, 0x3, 0x100000001)
ioctl(r2, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070")
sendmmsg(0xffffffffffffffff, &(0x7f000000d8c0), 0x0, 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB='s'], 0x1)
recvfrom(r1, &(0x7f0000003540)=""/68, 0x44, 0x0, &(0x7f0000003640)=@hci, 0x705000)

22:53:32 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)="2f02726f75702e7374617000a3c3afd2dbb9fd60b1275d6051e52992391deefbc7830340a7d12baee4e138a9e729281793d907002f5147ceb3c2e99d6cb0bd00cfd55a660b2d3e8cab6a2fd907c8c9c210eaeccfca1d4899493ab60eb3e6e6317d05ee1e6543bd92ada18b7b8b6597e86b41f587283e3baa7c42a6814bf4775c9b23e40b8174e9eca285c0f5891c7f719850aac708054611f8e585bc4a400b9dc5918273e4dba4eb00eacaa039161a4cee106ecd46856f", 0x2761, 0x0)
ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0xffffffff})

22:53:32 executing program 4:
r0 = socket$inet6_sctp(0xa, 0x0, 0x84)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000480)={'team0\x00', 0x820dedf80ded09bd})
r1 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
r2 = socket$inet(0x15, 0x5, 0x0)
r3 = socket$inet6(0xa, 0x3, 0x800000000000004)
ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070")
syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004500005800000000002f9078ac14ffaaffffffffb4018c0b0009000000000000000086dd000000210000000010000000e1404fa20100000000000000080022eb00000000200046140200000000000000000000000800655800"], 0x0)
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f00000002c0)=""/195, &(0x7f0000000040)=0xc3)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x5}, 0x10)
sendto$inet(r2, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0)
socketpair(0x1, 0x5, 0x100, &(0x7f0000000200)={<r5=>0xffffffffffffffff})
setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000240)=0x2, 0x4)
close(r2)
setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000440)={0xc, @local, 0x4e20, 0x4, 'nq\x00', 0x0, 0x0, 0xb5}, 0x2c)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e22, 0x7ff, @mcast1}, @in={0x2, 0x0, @broadcast}, @in6={0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x793f}, 0x5}, @in6={0xa, 0x4e20, 0x9, @dev={0xfe, 0x80, [], 0x21}, 0x2eb}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}, @in={0x2, 0x4e20}, @in6={0xa, 0x4e23, 0x6, @loopback, 0x2}], 0xb0)
ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000000)={0x3, 0x200, 0x40})
sendfile(r3, r4, 0x0, 0x8)

22:53:32 executing program 5:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3)
bind$bt_l2cap(r0, &(0x7f0000000040), 0xe)
listen(r0, 0x0)
shutdown(r0, 0x0)

22:53:32 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4, 0x0, 0xf6250100}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x10, 0x11, [@generic="e2abb4ec7645192056d52f"]}]}, 0x24}}, 0x0)

22:53:32 executing program 3:
setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6)
r0 = socket(0x11, 0x4000000000080003, 0x0)
setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0xfff, 0x4)
bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14)
r1 = socket$inet6(0xa, 0x3, 0x800000000000004)
ioctl(r1, 0x8912, &(0x7f00000005c0)="153f6234488dd25d5c6070")
setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5)
syz_emit_ethernet(0x3e, &(0x7f0000001180)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b7e720", 0x8, 0x11, 0x0, @local, @local, {[], @icmpv6=@echo_request}}}}}, &(0x7f0000000180))

22:53:32 executing program 5:
syz_emit_ethernet(0x6a, &(0x7f0000000140)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80, 0x2c00000000000000}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0xf, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local, @dev, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f00000000c0))

[  115.980840] sysfs: cannot create duplicate filename '/class/ieee80211/⫴�vE V�!'
[  116.013280] CPU: 0 PID: 7644 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #136
[  116.020591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  116.029944] Call Trace:
[  116.032561]  dump_stack+0x1c4/0x2b4
[  116.036209]  ? dump_stack_print_info.cold.2+0x52/0x52
[  116.041814]  ? _raw_spin_unlock_irqrestore+0x6d/0xd0
[  116.046932]  sysfs_warn_dup.cold.3+0x1c/0x2b
[  116.051360]  sysfs_do_create_link_sd.isra.2+0x116/0x130
[  116.056730]  sysfs_create_link+0x65/0xc0
[  116.060803]  device_add+0x5d0/0x17b0
[  116.064518]  ? genl_rcv_msg+0xc6/0x168
[  116.068411]  ? netlink_rcv_skb+0x172/0x440
[  116.072671]  ? get_device_parent.isra.27+0x5a0/0x5a0
[  116.078304]  ? __sanitizer_cov_trace_switch+0x53/0x90
[  116.084195]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  116.089747]  wiphy_register+0x1a5e/0x2770
[  116.093933]  ? wiphy_unregister+0x1380/0x1380
[  116.098457]  ? kasan_unpoison_shadow+0x35/0x50
[  116.103675]  ? kasan_kmalloc+0xc7/0xe0
[  116.107919]  ? __kmalloc+0x31c/0x760
[  116.111635]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  116.117179]  ? ieee80211_cs_list_valid+0x7c/0x440
[  116.122035]  ? ieee80211_register_hw+0xcf5/0x3b00
[  116.126892]  ieee80211_register_hw+0x15a7/0x3b00
[  116.131660]  ? ieee80211_ifa_changed+0xed0/0xed0
[  116.136422]  mac80211_hwsim_new_radio+0x1e49/0x3460
[  116.141452]  ? __rhashtable_insert_fast.constprop.53+0xf00/0xf00
[  116.147600]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  116.153134]  ? vsnprintf+0x20d/0x1b60
[  116.156949]  ? pointer+0x990/0x990
[  116.160531]  ? __sanitizer_cov_trace_cmp4+0x16/0x20
[  116.165556]  ? kvasprintf+0xee/0x150
[  116.169277]  ? bust_spinlocks+0xe0/0xe0
[  116.173263]  ? kasprintf+0xab/0xe0
[  116.176806]  ? kvasprintf_const+0x190/0x190
[  116.181139]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  116.186689]  hwsim_new_radio_nl+0x7dc/0xb20
[  116.191014]  ? nla_parse+0x2f9/0x480
[  116.194733]  ? mac80211_hwsim_new_radio+0x3460/0x3460
[  116.199956]  ? __netlink_ns_capable+0x100/0x130
[  116.204672]  genl_family_rcv_msg+0x8a9/0x1140
[  116.209614]  ? genl_unregister_family+0x8a0/0x8a0
[  116.215334]  ? __radix_tree_insert+0x8f0/0x8f0
[  116.219928]  ? rcu_read_unlock_special.part.39+0x11f0/0x11f0
[  116.225746]  ? lock_acquire+0x1ed/0x520
[  116.229729]  ? genl_rcv+0x19/0x40
[  116.233195]  genl_rcv_msg+0xc6/0x168
[  116.236917]  netlink_rcv_skb+0x172/0x440
[  116.240991]  ? genl_family_rcv_msg+0x1140/0x1140
[  116.245750]  ? netlink_ack+0xb80/0xb80
[  116.249648]  genl_rcv+0x28/0x40
[  116.252930]  netlink_unicast+0x5a5/0x760
[  116.257006]  ? netlink_attachskb+0x9a0/0x9a0
[  116.261413]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  116.266952]  netlink_sendmsg+0xa18/0xfc0
[  116.271027]  ? netlink_unicast+0x760/0x760
[  116.275263]  ? aa_sock_msg_perm.isra.12+0xba/0x160
[  116.280197]  ? apparmor_socket_sendmsg+0x29/0x30
[  116.284952]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  116.290503]  ? security_socket_sendmsg+0x94/0xc0
[  116.295265]  ? netlink_unicast+0x760/0x760
[  116.299502]  sock_sendmsg+0xd5/0x120
[  116.303214]  ___sys_sendmsg+0x7fd/0x930
[  116.307196]  ? copy_msghdr_from_user+0x580/0x580
[  116.311954]  ? __fd_install+0x2b5/0x8f0
[  116.315947]  ? __fget_light+0x2e9/0x430
[  116.319931]  ? fget_raw+0x20/0x20
[  116.323396]  ? lock_downgrade+0x900/0x900
[  116.327553]  ? lock_release+0x970/0x970
[  116.331529]  ? arch_local_save_flags+0x40/0x40
[  116.336115]  ? __bpf_trace_preemptirq_template+0x30/0x30
[  116.341572]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  116.347117]  ? sockfd_lookup_light+0xc5/0x160
[  116.351619]  __sys_sendmsg+0x11d/0x280
[  116.355533]  ? __ia32_sys_shutdown+0x80/0x80
[  116.360305]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  116.365847]  ? put_timespec64+0x10f/0x1b0
[  116.370007]  ? __bpf_trace_preemptirq_template+0x30/0x30
[  116.375473]  __x64_sys_sendmsg+0x78/0xb0
[  116.379535]  do_syscall_64+0x1b9/0x820
[  116.383421]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[  116.388787]  ? syscall_return_slowpath+0x5e0/0x5e0
[  116.393717]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  116.398571]  ? trace_hardirqs_on_caller+0x310/0x310
[  116.403598]  ? prepare_exit_to_usermode+0x3b0/0x3b0
[  116.408623]  ? prepare_exit_to_usermode+0x291/0x3b0
[  116.413648]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  116.418501]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  116.423695] RIP: 0033:0x457519
[  116.426890] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  116.445787] RSP: 002b:00007f4f03b7bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  116.453498] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519
[  116.460766] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004
[  116.468033] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000
[  116.475300] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f03b7c6d4
22:53:32 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000080)={0x6, @empty, 0x4e20, 0x0, 'lblcr\x00'}, 0x2c)

22:53:32 executing program 2:
syz_emit_ethernet(0x2a, &(0x7f00000005c0)={@broadcast, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @broadcast, @empty, @local}}}}, &(0x7f0000001740))

22:53:32 executing program 5:
syz_emit_ethernet(0x6a, &(0x7f0000000140)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80, 0x2c00000000000000}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0xf, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local, @dev, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f00000000c0))

[  116.482567] R13: 00000000004c3830 R14: 00000000004d5670 R15: 00000000ffffffff
22:53:32 executing program 1:
setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000140)={0x0, 0x2000000000007ffd, 0x20000000001}, 0xc)
pipe(&(0x7f00000007c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
vmsplice(r0, &(0x7f0000000000), 0x282, 0x0)

22:53:32 executing program 5:
syz_emit_ethernet(0x6a, &(0x7f0000000140)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80, 0x2c00000000000000}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0xf, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local, @dev, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f00000000c0))

22:53:32 executing program 2:
r0 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
bpf$MAP_CREATE(0x0, &(0x7f0000006000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x2c)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x5, &(0x7f0000006000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0xffffffc5, 0x1}]}, &(0x7f0000000400)="73797a6b6aaea4500183f4f69a28b4a9135eec9746a7656c6c65720080f470791ee2351469e29e9b0800000000000000ae6bc61296dd", 0x4, 0x1000, &(0x7f0000008000)=""/4096}, 0x48)

22:53:33 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4, 0x0, 0xf6250100}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x10, 0x11, [@generic="e2abb4ec7645192056d52f"]}]}, 0x24}}, 0x0)

[  116.712941] sysfs: cannot create duplicate filename '/class/ieee80211/⫴�vE V�!'
[  116.744131] CPU: 0 PID: 7686 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #136
[  116.751437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  116.760788] Call Trace:
[  116.763428]  dump_stack+0x1c4/0x2b4
[  116.767101]  ? dump_stack_print_info.cold.2+0x52/0x52
[  116.772303]  ? _raw_spin_unlock_irqrestore+0x6d/0xd0
[  116.777427]  sysfs_warn_dup.cold.3+0x1c/0x2b
[  116.781856]  sysfs_do_create_link_sd.isra.2+0x116/0x130
[  116.787243]  sysfs_create_link+0x65/0xc0
[  116.791308]  device_add+0x5d0/0x17b0
[  116.795019]  ? genl_rcv_msg+0xc6/0x168
[  116.798909]  ? netlink_rcv_skb+0x172/0x440
[  116.803148]  ? get_device_parent.isra.27+0x5a0/0x5a0
[  116.808256]  ? __sanitizer_cov_trace_switch+0x53/0x90
[  116.813451]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  116.819006]  wiphy_register+0x1a5e/0x2770
[  116.823162]  ? wiphy_unregister+0x1380/0x1380
[  116.827654]  ? kasan_unpoison_shadow+0x35/0x50
[  116.832233]  ? kasan_kmalloc+0xc7/0xe0
[  116.836133]  ? __kmalloc+0x31c/0x760
[  116.839847]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  116.845388]  ? ieee80211_cs_list_valid+0x7c/0x440
[  116.850232]  ? ieee80211_register_hw+0xcf5/0x3b00
[  116.855604]  ieee80211_register_hw+0x15a7/0x3b00
[  116.860371]  ? ieee80211_ifa_changed+0xed0/0xed0
[  116.865134]  mac80211_hwsim_new_radio+0x1e49/0x3460
[  116.870593]  ? __rhashtable_insert_fast.constprop.53+0xf00/0xf00
[  116.876737]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  116.882273]  ? vsnprintf+0x20d/0x1b60
[  116.886230]  ? pointer+0x990/0x990
[  116.889981]  ? __sanitizer_cov_trace_cmp4+0x16/0x20
[  116.895000]  ? kvasprintf+0xee/0x150
[  116.898710]  ? bust_spinlocks+0xe0/0xe0
[  116.902696]  ? kasprintf+0xab/0xe0
[  116.906243]  ? kvasprintf_const+0x190/0x190
[  116.910570]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  116.916109]  hwsim_new_radio_nl+0x7dc/0xb20
[  116.920431]  ? nla_parse+0x2f9/0x480
[  116.924146]  ? mac80211_hwsim_new_radio+0x3460/0x3460
[  116.929338]  ? __netlink_ns_capable+0x100/0x130
[  116.934007]  genl_family_rcv_msg+0x8a9/0x1140
[  116.938507]  ? genl_unregister_family+0x8a0/0x8a0
[  116.943363]  ? __radix_tree_insert+0x8f0/0x8f0
[  116.947953]  ? rcu_read_unlock_special.part.39+0x11f0/0x11f0
[  116.953763]  ? lock_acquire+0x1ed/0x520
[  116.957737]  ? genl_rcv+0x19/0x40
[  116.961200]  genl_rcv_msg+0xc6/0x168
[  116.964926]  netlink_rcv_skb+0x172/0x440
[  116.968990]  ? genl_family_rcv_msg+0x1140/0x1140
[  116.973757]  ? netlink_ack+0xb80/0xb80
[  116.977651]  genl_rcv+0x28/0x40
[  116.980931]  netlink_unicast+0x5a5/0x760
[  116.985005]  ? netlink_attachskb+0x9a0/0x9a0
[  116.989412]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  116.994956]  netlink_sendmsg+0xa18/0xfc0
[  116.999037]  ? netlink_unicast+0x760/0x760
[  117.003270]  ? aa_sock_msg_perm.isra.12+0xba/0x160
[  117.008199]  ? apparmor_socket_sendmsg+0x29/0x30
[  117.013304]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  117.019708]  ? security_socket_sendmsg+0x94/0xc0
[  117.025418]  ? netlink_unicast+0x760/0x760
[  117.030443]  sock_sendmsg+0xd5/0x120
[  117.034768]  ___sys_sendmsg+0x7fd/0x930
[  117.039273]  ? copy_msghdr_from_user+0x580/0x580
[  117.044028]  ? __fd_install+0x2b5/0x8f0
[  117.048007]  ? __fget_light+0x2e9/0x430
[  117.051989]  ? fget_raw+0x20/0x20
[  117.055444]  ? lock_downgrade+0x900/0x900
[  117.059594]  ? lock_release+0x970/0x970
[  117.063568]  ? arch_local_save_flags+0x40/0x40
[  117.068150]  ? __bpf_trace_preemptirq_template+0x30/0x30
[  117.073603]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  117.079139]  ? sockfd_lookup_light+0xc5/0x160
[  117.083634]  __sys_sendmsg+0x11d/0x280
[  117.087533]  ? __ia32_sys_shutdown+0x80/0x80
[  117.091946]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  117.097493]  ? put_timespec64+0x10f/0x1b0
[  117.101654]  ? __bpf_trace_preemptirq_template+0x30/0x30
[  117.107108]  __x64_sys_sendmsg+0x78/0xb0
[  117.111176]  do_syscall_64+0x1b9/0x820
[  117.115062]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[  117.120425]  ? syscall_return_slowpath+0x5e0/0x5e0
[  117.125349]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  117.130208]  ? trace_hardirqs_on_caller+0x310/0x310
[  117.135250]  ? prepare_exit_to_usermode+0x3b0/0x3b0
[  117.140271]  ? prepare_exit_to_usermode+0x291/0x3b0
[  117.145288]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  117.150138]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  117.155325] RIP: 0033:0x457519
[  117.158518] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  117.179249] RSP: 002b:00007f4f03b7bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  117.187568] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519
[  117.194837] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003
[  117.202105] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000
22:53:33 executing program 4:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000002cc0), 0x8)

22:53:33 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0)
poll(&(0x7f0000000040)=[{r0, 0x120}, {r0}, {r0, 0x18}, {r0, 0x4060}, {r0, 0x5000}, {r0, 0x1000}], 0x6, 0x400000)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac)
mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r0, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0)
mmap(&(0x7f0000f44000/0x4000)=nil, 0x507000, 0x1000007, 0x2013, r0, 0x0)
getuid()
accept$alg(r0, 0x0, 0x0)
ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611)

22:53:33 executing program 5:
syz_emit_ethernet(0x6a, &(0x7f0000000140)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80, 0x2c00000000000000}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0xf, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local, @dev, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f00000000c0))

22:53:33 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)

[  117.209370] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f03b7c6d4
[  117.216634] R13: 00000000004c3830 R14: 00000000004d5670 R15: 00000000ffffffff
22:53:33 executing program 2:
r0 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
bpf$MAP_CREATE(0x0, &(0x7f0000006000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x2c)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x5, &(0x7f0000006000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0xffffffc5, 0x1}]}, &(0x7f0000000400)="73797a6b6aaea4500183f4f69a28b4a9135eec9746a7656c6c65720080f470791ee2351469e29e9b0800000000000000ae6bc61296dd", 0x4, 0x1000, &(0x7f0000008000)=""/4096}, 0x48)

[  117.274897] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies.  Check SNMP counters.
22:53:33 executing program 4:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000002c0)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, &(0x7f0000000040), &(0x7f0000000340)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bond_slave_0\x00', 'veth1_to_bond\x00', 'veth0_to_team\x00', 'bridge_slave_0\x00', @random="3f11b4a13efe", [], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [], 0xe0, 0xe0, 0x118, [@stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @random="9f68e070940f", [], 0x0, 0x0, 0x0, 0x0, @link_local}, 0x840}}}]}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, "00000000000000000000000200", 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x220)

22:53:33 executing program 5:
r0 = socket$inet6(0xa, 0x3, 0x7)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
r1 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000060107031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0)

22:53:33 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4, 0x0, 0xf6250100}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x10, 0x11, [@generic="e2abb4ec7645192056d52f"]}]}, 0x24}}, 0x0)

22:53:33 executing program 2:
r0 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
bpf$MAP_CREATE(0x0, &(0x7f0000006000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x2c)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x5, &(0x7f0000006000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0xffffffc5, 0x1}]}, &(0x7f0000000400)="73797a6b6aaea4500183f4f69a28b4a9135eec9746a7656c6c65720080f470791ee2351469e29e9b0800000000000000ae6bc61296dd", 0x4, 0x1000, &(0x7f0000008000)=""/4096}, 0x48)

[  117.404175] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'.
[  117.428732] sysfs: cannot create duplicate filename '/class/ieee80211/⫴�vE V�!'
[  117.452566] CPU: 1 PID: 7715 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #136
[  117.459870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  117.469231] Call Trace:
[  117.471842]  dump_stack+0x1c4/0x2b4
[  117.475492]  ? dump_stack_print_info.cold.2+0x52/0x52
[  117.480707]  ? _raw_spin_unlock_irqrestore+0x6d/0xd0
[  117.485834]  sysfs_warn_dup.cold.3+0x1c/0x2b
[  117.490256]  sysfs_do_create_link_sd.isra.2+0x116/0x130
[  117.495633]  sysfs_create_link+0x65/0xc0
[  117.499706]  device_add+0x5d0/0x17b0
[  117.503437]  ? genl_rcv_msg+0xc6/0x168
[  117.507336]  ? netlink_rcv_skb+0x172/0x440
[  117.511587]  ? get_device_parent.isra.27+0x5a0/0x5a0
[  117.516705]  ? __sanitizer_cov_trace_switch+0x53/0x90
[  117.521911]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  117.527468]  wiphy_register+0x1a5e/0x2770
[  117.531634]  ? wiphy_unregister+0x1380/0x1380
[  117.536138]  ? kasan_unpoison_shadow+0x35/0x50
[  117.540728]  ? kasan_kmalloc+0xc7/0xe0
[  117.544638]  ? __kmalloc+0x31c/0x760
[  117.548362]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  117.553910]  ? ieee80211_cs_list_valid+0x7c/0x440
[  117.558788]  ? ieee80211_register_hw+0xcf5/0x3b00
[  117.563812]  ieee80211_register_hw+0x15a7/0x3b00
[  117.568583]  ? ieee80211_ifa_changed+0xed0/0xed0
[  117.573356]  mac80211_hwsim_new_radio+0x1e49/0x3460
[  117.578400]  ? __rhashtable_insert_fast.constprop.53+0xf00/0xf00
[  117.584553]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  117.590099]  ? vsnprintf+0x20d/0x1b60
[  117.593921]  ? pointer+0x990/0x990
[  117.597484]  ? __sanitizer_cov_trace_cmp4+0x16/0x20
[  117.602513]  ? kvasprintf+0xee/0x150
[  117.606236]  ? bust_spinlocks+0xe0/0xe0
[  117.610226]  ? kasprintf+0xab/0xe0
[  117.613776]  ? kvasprintf_const+0x190/0x190
[  117.618112]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  117.623664]  hwsim_new_radio_nl+0x7dc/0xb20
[  117.628218]  ? nla_parse+0x2f9/0x480
[  117.631945]  ? mac80211_hwsim_new_radio+0x3460/0x3460
[  117.637159]  ? __netlink_ns_capable+0x100/0x130
[  117.641844]  genl_family_rcv_msg+0x8a9/0x1140
[  117.646357]  ? genl_unregister_family+0x8a0/0x8a0
[  117.651212]  ? __radix_tree_insert+0x8f0/0x8f0
[  117.655811]  ? rcu_read_unlock_special.part.39+0x11f0/0x11f0
[  117.661625]  ? lock_acquire+0x1ed/0x520
[  117.665979]  ? genl_rcv+0x19/0x40
[  117.669451]  genl_rcv_msg+0xc6/0x168
[  117.673182]  netlink_rcv_skb+0x172/0x440
[  117.677255]  ? genl_family_rcv_msg+0x1140/0x1140
[  117.682033]  ? netlink_ack+0xb80/0xb80
[  117.685938]  genl_rcv+0x28/0x40
[  117.689238]  netlink_unicast+0x5a5/0x760
[  117.693316]  ? netlink_attachskb+0x9a0/0x9a0
[  117.697772]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  117.703334]  netlink_sendmsg+0xa18/0xfc0
[  117.707445]  ? netlink_unicast+0x760/0x760
[  117.712217]  ? aa_sock_msg_perm.isra.12+0xba/0x160
[  117.717166]  ? apparmor_socket_sendmsg+0x29/0x30
[  117.721940]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  117.727510]  ? security_socket_sendmsg+0x94/0xc0
[  117.732285]  ? netlink_unicast+0x760/0x760
[  117.737026]  sock_sendmsg+0xd5/0x120
[  117.740758]  ___sys_sendmsg+0x7fd/0x930
[  117.744757]  ? copy_msghdr_from_user+0x580/0x580
[  117.749525]  ? __fd_install+0x2b5/0x8f0
[  117.753515]  ? __fget_light+0x2e9/0x430
[  117.757499]  ? fget_raw+0x20/0x20
[  117.760974]  ? lock_downgrade+0x900/0x900
[  117.765137]  ? lock_release+0x970/0x970
[  117.769148]  ? arch_local_save_flags+0x40/0x40
[  117.773747]  ? __bpf_trace_preemptirq_template+0x30/0x30
[  117.779214]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  117.784779]  ? sockfd_lookup_light+0xc5/0x160
[  117.789292]  __sys_sendmsg+0x11d/0x280
[  117.793196]  ? __ia32_sys_shutdown+0x80/0x80
[  117.797624]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  117.803180]  ? put_timespec64+0x10f/0x1b0
[  117.807358]  ? __bpf_trace_preemptirq_template+0x30/0x30
[  117.812829]  __x64_sys_sendmsg+0x78/0xb0
[  117.816902]  do_syscall_64+0x1b9/0x820
[  117.820798]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[  117.826175]  ? syscall_return_slowpath+0x5e0/0x5e0
[  117.831115]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  117.832547] kasan: CONFIG_KASAN_INLINE enabled
[  117.835975]  ? trace_hardirqs_on_caller+0x310/0x310
[  117.835993]  ? prepare_exit_to_usermode+0x3b0/0x3b0
[  117.836013]  ? prepare_exit_to_usermode+0x291/0x3b0
[  117.840616] kasan: GPF could be caused by NULL-ptr deref or user memory access
[  117.845603]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  117.850664] general protection fault: 0000 [#1] PREEMPT SMP KASAN
[  117.855613]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  117.862968] CPU: 0 PID: 7708 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #136
[  117.867792] RIP: 0033:0x457519
[  117.874006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  117.879185] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  117.886451] RIP: 0010:rb_erase+0x306/0x3710
[  117.889624] RSP: 002b:00007f4f03b7bc78 EFLAGS: 00000246
[  117.898983] Code: c7 81 28 01 00 00 f2 f2 f2 f2 c7 81 2c 01 00 00 00 f2 f2 f2 48 89 f9 65 48 8b 1c 25 28 00 00 00 48 89 5d d0 31 db 48 c1 e9 03 <42> 80 3c 01 00 0f 85 41 1c 00 00 4c 8d 48 10 4c 8b 78 08 48 b9 00
[  117.917863]  ORIG_RAX: 000000000000002e
[  117.917878] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519
[  117.922192] RSP: 0018:ffff8801bd146918 EFLAGS: 00010202
[  117.927544] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003
[  117.950418] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000
[  117.957730] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000001
[  117.963104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f03b7c6d4
[  117.970380] RDX: 1ffff10037a28d2b RSI: ffffffff8afbc8a0 RDI: 0000000000000008
[  117.970395] RBP: ffff8801bd147320 R08: dffffc0000000000 R09: fffffbfff12d69b0
[  117.977663] R13: 00000000004c3830 R14: 00000000004d5670 R15: 00000000ffffffff
[  117.982138] kobject: 'loop3' (0000000026520684): kobject_uevent_env
[  117.984942] R10: fffffbfff12d69b0 R11: ffffffff896b4d83 R12: ffff8801c47fa3b0
[  118.015421] kobject: 'loop3' (0000000026520684): fill_kobj_path: path = '/devices/virtual/block/loop3'
[  118.020400] R13: dffffc0000000000 R14: ffff8801bd1472f8 R15: ffff8801bd147438
[  118.020414] FS:  00007f442bc35700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000
[  118.020423] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  118.020432] CR2: 0000001b3272c000 CR3: 00000001c4e59000 CR4: 00000000001406f0
[  118.020448] Call Trace:
[  118.038514] kobject: 'loop4' (00000000be6edc9a): kobject_uevent_env
[  118.044603]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  118.044624]  ? rb_insert_color+0x1460/0x1460
[  118.044648]  ? add_to_page_cache_lru+0x10b0/0x10b0
[  118.044668]  ? radix_tree_tag_get+0x350/0x350
[  118.094921]  ? lock_downgrade+0x900/0x900
[  118.099072]  ? rcu_read_unlock_special.part.39+0x11f0/0x11f0
[  118.104870]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  118.110403]  ? mark_held_locks+0x130/0x130
[  118.114635]  ? mark_page_accessed+0xcb0/0x2040
[  118.119212]  ? activate_page+0x1040/0x1040
[  118.123452]  ? rb_insert_color+0x1460/0x1460
[  118.127856]  ? lock_downgrade+0x900/0x900
[  118.132003]  ? filemap_fault+0x25f0/0x25f0
[  118.136236]  ? mark_held_locks+0x130/0x130
[  118.140472]  ? count_shadow_nodes+0x270/0x270
[  118.144977]  ? pagecache_get_page+0x2d8/0xf00
[  118.149473]  ? mark_held_locks+0x130/0x130
[  118.153702]  ? find_get_pages_contig+0x15b0/0x15b0
[  118.158629]  ? trace_hardirqs_on+0xbd/0x310
[  118.162940]  ? __getblk_gfp+0xf4/0xd50
[  118.166838]  ? __bpf_trace_preemptirq_template+0x30/0x30
[  118.172282]  ? mark_held_locks+0x130/0x130
[  118.176517]  ? mark_held_locks+0x130/0x130
[  118.180750]  ? ext4_discard_preallocations+0x9b9/0x13c0
[  118.186107]  ? lock_downgrade+0x900/0x900
[  118.190281]  ? kasan_check_read+0x11/0x20
[  118.194425]  ? do_raw_spin_unlock+0xa7/0x2f0
[  118.198830]  ? do_raw_spin_trylock+0x1c0/0x1c0
[  118.203410]  ? mark_held_locks+0x130/0x130
[  118.207645]  ? mark_held_locks+0x130/0x130
[  118.211881]  ? ext4_exit_mballoc+0xc0/0xc0
[  118.216114]  ? __sanitizer_cov_trace_cmp4+0x16/0x20
[  118.221127]  ? bpf_prog_kallsyms_find+0xde/0x4a0
[  118.225878]  ? modules_open+0xa0/0xa0
[  118.229676]  ? __es_tree_search.isra.12+0x1ba/0x220
[  118.234691]  ? __es_remove_extent+0x9a3/0xba0
[  118.239181]  ? mark_held_locks+0x130/0x130
[  118.243411]  ? lock_downgrade+0x900/0x900
[  118.247556]  ? ext4_es_scan+0x960/0x960
[  118.251527]  ? lock_release+0x970/0x970
[  118.256281]  ? trace_hardirqs_on+0xbd/0x310
[  118.261641]  ? kasan_check_read+0x11/0x20
[  118.266568]  ? clear_inode+0x114/0x3a0
[  118.271253]  ? do_raw_write_trylock+0x1c0/0x1c0
[  118.276792]  ? kasan_check_write+0x14/0x20
[  118.281544]  ? lock_acquire+0x1ed/0x520
[  118.285538]  ? integrity_inode_free+0x77/0x320
[  118.290116]  ? ext4_es_remove_extent+0x151/0x500
[  118.294870]  ? lock_release+0x970/0x970
[  118.298837]  ? __destroy_inode+0x2ae/0x820
[  118.303068]  ? lock_downgrade+0x900/0x900
[  118.307210]  ? kasan_check_write+0x14/0x20
[  118.311457]  ? do_raw_write_lock+0xbd/0x1b0
[  118.315778]  integrity_inode_free+0x12f/0x320
[  118.320277]  security_inode_free+0x19/0x90
[  118.324512]  __destroy_inode+0x328/0x820
[  118.328568]  ? generic_update_time+0x450/0x450
[  118.333146]  ? evict+0x5d8/0x980
[  118.336513]  ? lock_downgrade+0x900/0x900
[  118.340658]  ? __inode_wait_for_writeback+0x2cf/0x380
[  118.345851]  destroy_inode+0xda/0x200
[  118.349646]  ? __destroy_inode+0x820/0x820
[  118.353888]  ? kasan_check_write+0x14/0x20
[  118.358293]  ? do_raw_spin_lock+0xc1/0x200
[  118.362524]  evict+0x5e0/0x980
[  118.365712]  ? jbd2_journal_stop+0x430/0x15d0
[  118.370206]  ? destroy_inode+0x200/0x200
[  118.374272]  ? do_raw_spin_lock+0xc1/0x200
[  118.378500]  ? iput+0x671/0xa90
[  118.381785]  ? lock_downgrade+0x900/0x900
[  118.385930]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  118.391487]  ? kasan_check_read+0x11/0x20
[  118.395654]  ? do_raw_spin_trylock+0x1c0/0x1c0
[  118.400230]  ? lock_downgrade+0x900/0x900
[  118.404414]  ? ext4_ioctl+0x231b/0x4210
[  118.408390]  iput+0x679/0xa90
[  118.411496]  ? inode_add_lru+0x2a0/0x2a0
[  118.415551]  ? up_write+0x7b/0x220
[  118.419083]  ? up_read+0x110/0x110
[  118.422618]  ? up_read+0x110/0x110
[  118.426344]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  118.432661]  ? check_preemption_disabled+0x48/0x200
[  118.438026]  ext4_ioctl+0x236f/0x4210
[  118.441832]  ? lock_downgrade+0x900/0x900
[  118.445985]  ? ext4_ioctl_group_add+0x560/0x560
[  118.450652]  ? mark_held_locks+0x130/0x130
[  118.454887]  ? do_futex+0x249/0x26d0
[  118.458598]  ? trace_hardirqs_on+0xbd/0x310
[  118.462924]  ? __fget+0x4d1/0x740
[  118.466382]  ? exit_robust_list+0x280/0x280
[  118.470700]  ? __fget+0x4aa/0x740
[  118.474151]  ? lock_downgrade+0x900/0x900
[  118.478300]  ? rcu_read_unlock_special.part.39+0x11f0/0x11f0
[  118.484102]  ? __fget+0x4d1/0x740
[  118.487553]  ? ksys_dup3+0x680/0x680
[  118.491269]  ? __might_fault+0x12b/0x1e0
[  118.495325]  ? lock_downgrade+0x900/0x900
[  118.499474]  ? lock_release+0x970/0x970
[  118.503456]  ? arch_local_save_flags+0x40/0x40
[  118.508056]  ? ext4_ioctl_group_add+0x560/0x560
[  118.512721]  do_vfs_ioctl+0x1de/0x1720
[  118.516620]  ? ioctl_preallocate+0x300/0x300
[  118.521033]  ? __fget_light+0x2e9/0x430
[  118.524999]  ? fget_raw+0x20/0x20
[  118.528442]  ? _copy_to_user+0xc8/0x110
[  118.532412]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  118.537948]  ? put_timespec64+0x10f/0x1b0
[  118.542104]  ? nsecs_to_jiffies+0x30/0x30
[  118.546513]  ? security_file_ioctl+0x94/0xc0
[  118.550917]  ksys_ioctl+0xa9/0xd0
[  118.554367]  __x64_sys_ioctl+0x73/0xb0
[  118.558261]  do_syscall_64+0x1b9/0x820
[  118.562144]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[  118.567509]  ? syscall_return_slowpath+0x5e0/0x5e0
[  118.572433]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  118.577275]  ? trace_hardirqs_on_caller+0x310/0x310
[  118.582296]  ? prepare_exit_to_usermode+0x3b0/0x3b0
[  118.587308]  ? prepare_exit_to_usermode+0x291/0x3b0
[  118.592326]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  118.597175]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  118.602355] RIP: 0033:0x457519
[  118.605542] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  118.624435] RSP: 002b:00007f442bc34c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  118.632354] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000457519
[  118.639618] RDX: 0000000000000000 RSI: 0000000000006611 RDI: 0000000000000003
[  118.646880] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000
[  118.654140] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f442bc356d4
[  118.661400] R13: 00000000004bf5c5 R14: 00000000004cf460 R15: 00000000ffffffff
[  118.668665] Modules linked in:
[  118.673022] ---[ end trace feb47f4e1e46ff18 ]---
[  118.677806] RIP: 0010:rb_erase+0x306/0x3710
[  118.682158] Code: c7 81 28 01 00 00 f2 f2 f2 f2 c7 81 2c 01 00 00 00 f2 f2 f2 48 89 f9 65 48 8b 1c 25 28 00 00 00 48 89 5d d0 31 db 48 c1 e9 03 <42> 80 3c 01 00 0f 85 41 1c 00 00 4c 8d 48 10 4c 8b 78 08 48 b9 00
[  118.701083] RSP: 0018:ffff8801bd146918 EFLAGS: 00010202
[  118.706445] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000001
[  118.713730] RDX: 1ffff10037a28d2b RSI: ffffffff8afbc8a0 RDI: 0000000000000008
[  118.721018] RBP: ffff8801bd147320 R08: dffffc0000000000 R09: fffffbfff12d69b0
[  118.728282] R10: fffffbfff12d69b0 R11: ffffffff896b4d83 R12: ffff8801c47fa3b0
[  118.735853] R13: dffffc0000000000 R14: ffff8801bd1472f8 R15: ffff8801bd147438
[  118.743145] FS:  00007f442bc35700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000
[  118.751388] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  118.757268] CR2: 0000001b3272c000 CR3: 00000001c4e59000 CR4: 00000000001406f0
[  118.764575] Kernel panic - not syncing: Fatal exception
[  118.770939] Kernel Offset: disabled
[  118.774570] Rebooting in 86400 seconds..