[ 34.818777][ T26] audit: type=1800 audit(1552650007.483:28): pid=7416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 35.404461][ T26] audit: type=1800 audit(1552650008.113:29): pid=7416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 35.424949][ T26] audit: type=1800 audit(1552650008.113:30): pid=7416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [....] startpar: service(s) returned failure: ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.15' (ECDSA) to the list of known hosts. 2019/03/15 11:40:18 fuzzer started 2019/03/15 11:40:20 dialing manager at 10.128.0.26:37195 2019/03/15 11:40:20 syscalls: 1 2019/03/15 11:40:20 code coverage: enabled 2019/03/15 11:40:20 comparison tracing: enabled 2019/03/15 11:40:20 extra coverage: extra coverage is not supported by the kernel 2019/03/15 11:40:20 setuid sandbox: enabled 2019/03/15 11:40:20 namespace sandbox: enabled 2019/03/15 11:40:20 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/15 11:40:20 fault injection: enabled 2019/03/15 11:40:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/15 11:40:20 net packet injection: enabled 2019/03/15 11:40:20 net device setup: enabled 11:42:38 executing program 0: syzkaller login: [ 186.001969][ T7605] IPVS: ftp: loaded support on port[0] = 21 11:42:38 executing program 1: [ 186.138887][ T7605] chnl_net:caif_netlink_parms(): no params data found [ 186.207018][ T7608] IPVS: ftp: loaded support on port[0] = 21 [ 186.219108][ T7605] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.227066][ T7605] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.236380][ T7605] device bridge_slave_0 entered promiscuous mode [ 186.247776][ T7605] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.256018][ T7605] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.264066][ T7605] device bridge_slave_1 entered promiscuous mode [ 186.304895][ T7605] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 186.327420][ T7605] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:42:39 executing program 2: [ 186.398749][ T7605] team0: Port device team_slave_0 added [ 186.407295][ T7605] team0: Port device team_slave_1 added [ 186.473121][ T7608] chnl_net:caif_netlink_parms(): no params data found [ 186.516238][ T7605] device hsr_slave_0 entered promiscuous mode [ 186.535065][ T7611] IPVS: ftp: loaded support on port[0] = 21 11:42:39 executing program 3: [ 186.612900][ T7605] device hsr_slave_1 entered promiscuous mode [ 186.741464][ T7605] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.748775][ T7605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.756665][ T7605] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.762456][ T7613] IPVS: ftp: loaded support on port[0] = 21 [ 186.763795][ T7605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.787824][ T7608] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.797399][ T7608] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.808276][ T7608] device bridge_slave_0 entered promiscuous mode [ 186.830591][ T7608] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.839902][ T7608] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.848313][ T7608] device bridge_slave_1 entered promiscuous mode [ 186.880734][ T7608] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 186.891243][ T7608] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:42:39 executing program 4: [ 186.952313][ T7608] team0: Port device team_slave_0 added [ 186.981643][ T7611] chnl_net:caif_netlink_parms(): no params data found [ 186.993470][ T7608] team0: Port device team_slave_1 added [ 187.080926][ T7605] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.116460][ T7618] IPVS: ftp: loaded support on port[0] = 21 [ 187.147398][ T7608] device hsr_slave_0 entered promiscuous mode 11:42:39 executing program 5: [ 187.232906][ T7608] device hsr_slave_1 entered promiscuous mode [ 187.277243][ T7620] IPVS: ftp: loaded support on port[0] = 21 [ 187.285370][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.295513][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.304321][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 187.359653][ T7611] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.367559][ T7611] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.376325][ T7611] device bridge_slave_0 entered promiscuous mode [ 187.384330][ T7611] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.391694][ T7611] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.399778][ T7611] device bridge_slave_1 entered promiscuous mode [ 187.440090][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.448145][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.468202][ T7605] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.484039][ T7611] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 187.494390][ T7611] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 187.537221][ T7613] chnl_net:caif_netlink_parms(): no params data found [ 187.554804][ T7611] team0: Port device team_slave_0 added [ 187.561939][ T7611] team0: Port device team_slave_1 added [ 187.574224][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.583241][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.591868][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.599090][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.607580][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.616254][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.624724][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.631822][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.672094][ T7613] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.680287][ T7613] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.688333][ T7613] device bridge_slave_0 entered promiscuous mode [ 187.698343][ T7613] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.706089][ T7613] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.714585][ T7613] device bridge_slave_1 entered promiscuous mode [ 187.738133][ T7614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.794410][ T7611] device hsr_slave_0 entered promiscuous mode [ 187.843058][ T7611] device hsr_slave_1 entered promiscuous mode [ 187.894933][ T7613] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 187.918116][ T7613] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 187.929211][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.938128][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.947121][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.955849][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.964668][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.973517][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.036089][ T7613] team0: Port device team_slave_0 added [ 188.054130][ T7620] chnl_net:caif_netlink_parms(): no params data found [ 188.085230][ T7615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.093782][ T7615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.102127][ T7615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.110601][ T7615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.119871][ T7613] team0: Port device team_slave_1 added [ 188.126420][ T7605] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.217862][ T7620] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.225099][ T7620] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.234860][ T7620] device bridge_slave_0 entered promiscuous mode [ 188.242397][ T7620] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.250378][ T7620] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.258423][ T7620] device bridge_slave_1 entered promiscuous mode [ 188.281532][ T7608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.334667][ T7613] device hsr_slave_0 entered promiscuous mode [ 188.382986][ T7613] device hsr_slave_1 entered promiscuous mode [ 188.472250][ T7618] chnl_net:caif_netlink_parms(): no params data found [ 188.488307][ T7605] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.500184][ T7620] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 188.512018][ T7611] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.526397][ T7608] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.539893][ T7620] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 188.553094][ T7615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.561408][ T7615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.625239][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.639040][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.648971][ T7621] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.656096][ T7621] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.664664][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.672322][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.680300][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.689090][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.697799][ T7621] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.704937][ T7621] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.712821][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.721523][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.730451][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.739197][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.748575][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.756638][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 11:42:41 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) connect(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0xfdbb) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, 0x0) getuid() setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) tkill(r1, 0x1000000000016) [ 188.792252][ T7608] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 188.803781][ T7608] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 188.820811][ T7618] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.829767][ T7618] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.876116][ T7618] device bridge_slave_0 entered promiscuous mode [ 188.890752][ T7620] team0: Port device team_slave_0 added [ 188.903063][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.911858][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 11:42:41 executing program 0: [ 188.923971][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.932327][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.941141][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.950162][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.959042][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.968204][ T7611] 8021q: adding VLAN 0 to HW filter on device team0 11:42:41 executing program 0: [ 188.991542][ T7618] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.009838][ T7618] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.031086][ T7618] device bridge_slave_1 entered promiscuous mode 11:42:41 executing program 0: [ 189.054514][ T7620] team0: Port device team_slave_1 added [ 189.077676][ T7608] 8021q: adding VLAN 0 to HW filter on device batadv0 11:42:41 executing program 0: [ 189.114328][ T7618] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 189.126511][ T7618] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 189.166331][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.186341][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.203055][ T22] bridge0: port 1(bridge_slave_0) entered blocking state 11:42:41 executing program 0: [ 189.210149][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state 11:42:41 executing program 1: [ 189.245501][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.263748][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.282469][ T22] bridge0: port 2(bridge_slave_1) entered blocking state 11:42:42 executing program 0: [ 189.289641][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.337168][ T7620] device hsr_slave_0 entered promiscuous mode [ 189.413382][ T7620] device hsr_slave_1 entered promiscuous mode [ 189.453404][ T7614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.461383][ T7614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.470086][ T7614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.478731][ T7614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.487686][ T7614] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.496399][ T7614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.505223][ T7614] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.520065][ T7611] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 189.530617][ T7611] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 189.543754][ T7618] team0: Port device team_slave_0 added [ 189.555091][ T7613] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.563608][ T7618] team0: Port device team_slave_1 added [ 189.569535][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.577666][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.586533][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.594973][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.603834][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.612344][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.631641][ T7611] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.688187][ T7618] device hsr_slave_0 entered promiscuous mode [ 189.732943][ T7618] device hsr_slave_1 entered promiscuous mode [ 189.797127][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.813605][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 11:42:42 executing program 2: [ 189.851479][ T7613] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.915179][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.925738][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.934838][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.941921][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.957670][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.966428][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.974943][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.982013][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.990007][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.012313][ T7614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.020679][ T7614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.029467][ T7614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.038371][ T7614] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.047208][ T7614] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.071199][ T7620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.085307][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.094099][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.102309][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.110987][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.122017][ T7613] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.134561][ T7613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.158590][ T7620] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.165678][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.174982][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.183465][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.190985][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.207900][ T7613] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.233194][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.241870][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.251500][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.258604][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.266667][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.275460][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.284470][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.291508][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.299151][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.307678][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.328845][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.336886][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.345819][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.354416][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.362974][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.380343][ T7620] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 190.404431][ T7620] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.426019][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 11:42:43 executing program 3: [ 190.437758][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.448387][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.463745][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.472075][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.484826][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.513390][ T7618] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.529567][ T7620] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.550652][ T7618] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.565021][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.573698][ T3478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.594190][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.603918][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.612366][ T7621] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.619481][ T7621] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.630518][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.639068][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.647490][ T7621] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.654592][ T7621] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.662202][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.670807][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.679336][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.687851][ T7621] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.708363][ T7618] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 190.724572][ T7618] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.751098][ T7615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.759970][ T7615] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.768030][ T7615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.781469][ T7615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.790443][ T7615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.798943][ T7615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.807249][ T7615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.815493][ T7615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.824685][ T7615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.847603][ T7618] 8021q: adding VLAN 0 to HW filter on device batadv0 11:42:43 executing program 4: 11:42:43 executing program 1: 11:42:43 executing program 0: 11:42:43 executing program 2: 11:42:43 executing program 3: 11:42:43 executing program 5: 11:42:43 executing program 2: 11:42:43 executing program 1: 11:42:43 executing program 3: 11:42:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000040)=ANY=[@ANYBLOB="06000000000000008b04"]) 11:42:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 11:42:43 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r2, r1, 0x3, 0x0) write$P9_RLOCK(r3, &(0x7f0000000300)={0x8}, 0x8) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 11:42:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000f80)) 11:42:43 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) [ 191.150108][ T7691] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 11:42:43 executing program 1: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, 0x0, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0xfffffffffffffffe, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r4 = socket$inet6(0xa, 0x3, 0xfb) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) fgetxattr(r5, &(0x7f0000000600)=ANY=[@ANYBLOB="73656375726874796e2d002e6b19160eaae95d4177966756492abcb5bb2aef55fe8d55537f6665bc2af84a0c213fcab95d93cb04da01007fe270ac1ecdec0e0215bf552f715233fa633aba890bc9e660059deabc8331504b9f9d622450490d52b55e4d5dbd679c5f46ea25838053ffb1c11e6999ce73e9b0dd8db3933c46565e64e3bb387ba9dd611cf6911736581859edce89eaba53cd797b74b55bbc7c04676a8c2fc3c00bba630ac84970a6460990d8c38ab460a253cfff53dc8c5623e710610afdfed2939a3dce2c875ca65ece692cad530170f5f33c15279fff0e000000000000000000000000000000"], 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0xfffffffffffffffe, 0x0) ioctl$TIOCCONS(r3, 0x541d) r7 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x10000, 0x2, 0x3, 0x8, 0x0, 0x2000000000000, 0x2000, 0xb, 0x52, 0x357, 0x5, 0x1ffda0000, 0x10000, 0x1000, 0x7, 0x7a, 0x4, 0x2, 0x80000001, 0x1, 0x66b5c1b1, 0x9, 0x2, 0xa0000, 0x2, 0x10000, 0x100000001, 0x1, 0x0, 0x3ff, 0x9, 0x8001, 0x81, 0x1ff, 0x3, 0x3ff, 0x0, 0x100000000, 0x0, @perf_config_ext={0x8, 0x100000000}, 0x20, 0x6, 0x3, 0xf, 0x200, 0x5, 0x1}, r7, 0x5, r6, 0xa) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x2, 0x0) ioctl$int_in(r8, 0x800000c0045005, &(0x7f00000004c0)) r9 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VIDIOC_TRY_ENCODER_CMD(r10, 0xc028564e, &(0x7f0000000140)={0x3, 0x1, [0x3, 0xe86f, 0x100000020, 0x5, 0x5, 0x245, 0xb7, 0x1]}) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) renameat(r3, &(0x7f00000000c0)='./file0\x00', r9, &(0x7f00000001c0)='./file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bond0\x00'}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000340)={0x0, 0x9, 0x1, {0xb}}) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x82, 0x4d6) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) fallocate(r0, 0x0, 0x1000, 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xc83c, 0x10002) 11:42:43 executing program 0: r0 = socket$kcm(0x2, 0x9, 0x84) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000640)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200), 0xfc99}], 0x1}, 0x0) pipe(&(0x7f0000000040)) close(r0) 11:42:44 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x7da3a8d9, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f00000006c0)={{0x7, 0x0, 0x0, 0x0, 'syz0\x00'}}) 11:42:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x10000, &(0x7f0000000240)=ANY=[@ANYBLOB="66645553f6d41dcf4303f78f00d225087ef2f5b985ad17f19db7cff821d91ad6cad67a673e4c113acf7d0ddf60d728ed8cbc80719579316be7ca916e324cb1214189c48586239dcd88286666a4df815ddb517faa24ce15927667212c3ce8a343e98c5af98164d2ab8da768608a5ea8ea1f574dc8f8592d1a9592dabc6d2a1cdf63bfeae6b5a19e0c58", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) 11:42:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000180)={0x7b, 0x0, [0xc0000080, 0xd01], [0x187]}) r4 = dup3(r3, r2, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, r5, 0x3c, 0x0, @in={0x2, 0x4e22, @multicast2}}}, 0xa0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f00000000c0)) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x50, r4, 0x0) [ 191.395841][ C0] hrtimer: interrupt took 36867 ns 11:42:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x5f}], 0x30}, 0x0) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[], 0xeb) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x5f}, {&(0x7f0000000780)=""/98, 0x91}], 0x2}}], 0x400000000000061, 0x0, 0x0) r3 = shmget$private(0x0, 0x3000, 0x54000000, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_RMID(r3, 0x0) 11:42:44 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x5, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={0x0, 0xfffffffffffffffc}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={r2, 0x1000}, &(0x7f0000000140)=0x8) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc040564a, &(0x7f0000000980)={0x0, 0x0, {0x100a}}) 11:42:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ipv6_route\x00') r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = geteuid() fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r4, r5) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100030}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r6, 0x4, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0xc040) sendfile(r1, r2, 0x0, 0x1000007ffff000) 11:42:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) close(r0) pipe(&(0x7f00000002c0)) fcntl$setstatus(r0, 0x4, 0x3ffd) 11:42:44 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r2, r1, 0x3, 0x0) write$P9_RLOCK(r3, &(0x7f0000000300)={0x8}, 0x8) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 11:42:44 executing program 0: rt_sigaction(0x4, 0xfffffffffffffffe, 0x0, 0x8, &(0x7f00000000c0)) 11:42:44 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/user\x00') pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x3, 0x7, 0x8, 0xffffffffffffffff, 0x6, 0x2, 0x1, {0x0, @in={{0x2, 0x4e22, @remote}}, 0xff, 0xffffffffffffff9e, 0x9ef5ad5, 0x2, 0x1e8}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1e, 0x3}, &(0x7f0000000200)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") ioctl$FS_IOC_GETFLAGS(r0, 0xb704, 0x0) 11:42:44 executing program 1: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, 0x0, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0xfffffffffffffffe, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r4 = socket$inet6(0xa, 0x3, 0xfb) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) fgetxattr(r5, &(0x7f0000000600)=ANY=[@ANYBLOB="73656375726874796e2d002e6b19160eaae95d4177966756492abcb5bb2aef55fe8d55537f6665bc2af84a0c213fcab95d93cb04da01007fe270ac1ecdec0e0215bf552f715233fa633aba890bc9e660059deabc8331504b9f9d622450490d52b55e4d5dbd679c5f46ea25838053ffb1c11e6999ce73e9b0dd8db3933c46565e64e3bb387ba9dd611cf6911736581859edce89eaba53cd797b74b55bbc7c04676a8c2fc3c00bba630ac84970a6460990d8c38ab460a253cfff53dc8c5623e710610afdfed2939a3dce2c875ca65ece692cad530170f5f33c15279fff0e000000000000000000000000000000"], 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0xfffffffffffffffe, 0x0) ioctl$TIOCCONS(r3, 0x541d) r7 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x10000, 0x2, 0x3, 0x8, 0x0, 0x2000000000000, 0x2000, 0xb, 0x52, 0x357, 0x5, 0x1ffda0000, 0x10000, 0x1000, 0x7, 0x7a, 0x4, 0x2, 0x80000001, 0x1, 0x66b5c1b1, 0x9, 0x2, 0xa0000, 0x2, 0x10000, 0x100000001, 0x1, 0x0, 0x3ff, 0x9, 0x8001, 0x81, 0x1ff, 0x3, 0x3ff, 0x0, 0x100000000, 0x0, @perf_config_ext={0x8, 0x100000000}, 0x20, 0x6, 0x3, 0xf, 0x200, 0x5, 0x1}, r7, 0x5, r6, 0xa) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x2, 0x0) ioctl$int_in(r8, 0x800000c0045005, &(0x7f00000004c0)) r9 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VIDIOC_TRY_ENCODER_CMD(r10, 0xc028564e, &(0x7f0000000140)={0x3, 0x1, [0x3, 0xe86f, 0x100000020, 0x5, 0x5, 0x245, 0xb7, 0x1]}) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) renameat(r3, &(0x7f00000000c0)='./file0\x00', r9, &(0x7f00000001c0)='./file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bond0\x00'}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000340)={0x0, 0x9, 0x1, {0xb}}) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x82, 0x4d6) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) fallocate(r0, 0x0, 0x1000, 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xc83c, 0x10002) 11:42:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ipv6_route\x00') r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = geteuid() fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r4, r5) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100030}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r6, 0x4, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0xc040) sendfile(r1, r2, 0x0, 0x1000007ffff000) 11:42:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) capset(&(0x7f00000001c0), &(0x7f0000000200)={0x0, 0xfffffffffffffffc}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)={0x3, 0x1f, 0x8}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) setsockopt$sock_void(r4, 0x1, 0x3f, 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) 11:42:44 executing program 4: r0 = accept(0xffffffffffffff9c, &(0x7f00000000c0)=@isdn, &(0x7f0000000140)=0x80) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e24, 0x4, @remote, 0x9}}, 0x5, 0x8}, &(0x7f00000002c0)=0x90) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, 0x0) ioctl$PPPIOCCONNECT(r3, 0x4004743a, &(0x7f0000000300)=0x2) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af13, &(0x7f0000000000)={0x0, 0xffffffffffffff9c}) [ 192.271579][ T7783] QAT: Invalid ioctl 11:42:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x700000000000000, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x1, 0x208001) write$P9_RFSYNC(r1, &(0x7f0000000200)={0x7, 0x33, 0x1}, 0x7) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20001, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000040)) shmget$private(0x0, 0x4000, 0x300, &(0x7f0000ffc000/0x4000)=nil) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000240)) write$apparmor_exec(r2, &(0x7f0000000080)={'stack ', '-^-md5sum:\x00'}, 0x11) 11:42:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$rxrpc(0x21, 0x2, 0x400000000000002) io_setup(0xb, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) [ 192.293292][ T7786] QAT: Invalid ioctl 11:42:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x384, 0xfffffffffffffffb, 0x0, 0x0, 0x401, 0x0, 0x972, 0x1, 0x4, 0x0, 0x0, 0x7fffffff, 0x0, 0x9, 0x0, 0x101, 0x0, 0x22c5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000, 0xffffffff80000001, 0xffffffff00000000, 0x7}, 0x0, 0x0, 0xffffffffffffff9c, 0x1) r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x527c01, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x6d38) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="f000000000000000140812000c000100621067104e6f6e64000000000400020798ea4c5b9dd01c406388db294969d700"], 0x1}}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) sendmsg$nl_route(r1, &(0x7f0000000740)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000700)={&(0x7f0000000780)=@ipv4_getroute={0x1c, 0x1a, 0x523, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x7fffffff, 0xfc, 0x3, 0xfd, 0x1}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, &(0x7f0000000200)={{0x2, 0x5, 0x6, 0x400, 'syz0\x00', 0x5}, 0x1, [0x7ff, 0x8, 0xffffffffffffffff, 0x9, 0x1, 0x0, 0x2, 0x7ff, 0xf50, 0xffffffffffff587c, 0xfd, 0x40, 0x9, 0x3, 0x2, 0x4, 0x7, 0x4000000000000000, 0x7, 0x3ff, 0x0, 0x1, 0x3, 0x2, 0xffd, 0x2000000000000000, 0x100, 0x2, 0x8f3, 0x1, 0x6, 0x6, 0x5, 0x101, 0x9, 0x3, 0x80000001, 0x0, 0x6c9, 0x7, 0xc3, 0x7, 0xcdd4, 0x4, 0xffff, 0x3c, 0x0, 0x7df5, 0x6, 0x0, 0x8, 0xfffffffffffffe01, 0x0, 0x9, 0x3, 0x3, 0x0, 0x8914, 0x0, 0x10000, 0xf84a, 0x2, 0x631b, 0x0, 0x2, 0x10000000, 0xdc, 0x5, 0xffffffffffffffc0, 0xbc, 0x446, 0x2dc, 0x1, 0x5, 0x2, 0x100, 0x400, 0x75cc, 0x7fffffff, 0x4, 0x0, 0x1, 0x1ff, 0x7fffffff, 0x8, 0x0, 0x7, 0x3, 0x7, 0xff, 0x800, 0x6, 0x7fff, 0x4, 0x6, 0x3, 0x0, 0xc3, 0x81, 0x3, 0x9, 0x8, 0x265, 0x100000001, 0x1000, 0x7e, 0x7ff, 0x1, 0x4, 0x4, 0x9, 0x3, 0xaf, 0x0, 0x2, 0x6, 0x5742, 0x2, 0x8000, 0x5fc, 0x2406, 0x3f, 0x4, 0x3, 0x7, 0x1, 0x0, 0x5]}) 11:42:45 executing program 4: r0 = accept(0xffffffffffffff9c, &(0x7f00000000c0)=@isdn, &(0x7f0000000140)=0x80) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e24, 0x4, @remote, 0x9}}, 0x5, 0x8}, &(0x7f00000002c0)=0x90) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, 0x0) ioctl$PPPIOCCONNECT(r3, 0x4004743a, &(0x7f0000000300)=0x2) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af13, &(0x7f0000000000)={0x0, 0xffffffffffffff9c}) 11:42:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) capset(&(0x7f00000001c0), &(0x7f0000000200)={0x0, 0xfffffffffffffffc}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)={0x3, 0x1f, 0x8}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) setsockopt$sock_void(r4, 0x1, 0x3f, 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) [ 192.430999][ T7793] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 192.528994][ T7798] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 192.588919][ T7803] QAT: Invalid ioctl 11:42:45 executing program 2: accept$inet6(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x1c) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x3cd) getsockopt$inet_tcp_buf(r0, 0x6, 0x1b, &(0x7f0000000600)=""/4096, &(0x7f0000000040)=0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x183ff) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, 0x0) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) listen(r1, 0x43) r2 = socket$inet6_sctp(0xa, 0x2, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f0000847fff)='X', 0x1, 0x0, 0x0, 0x0) 11:42:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000e80)=ANY=[@ANYBLOB="010000000067b278ccf000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42857d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284b2110dd293890154ad73fe0175d6060017d6d554949abe4d31abaf0d975a09af4b1e945cdeb8af18b1341bcc96ecf0514ba89d7a0c6e0f156a5b73f0adb39673d79447cac5ef000000000000000000f9853f3044101431a54a043cd897f64f6ed29e5cffe780574509f308000000201637520326a997bcdab4493994a5e7f61cb65515a2cc697e217bdc6322ed481e74792624a0aa52d42df7a7c9bfa11c184bdd88f54ce3bb84dd8e4a9c271fb82e615a6db3f787f015dd5dbf64c369be18a7e33c2308d17fd9c0274dee5aed58e1359712ee5a1a897705f63f384e84fe9bd95da0cee85dcee7ee41c698f25da05d3d2f3c9af8ff0bbfe63e3bc89e40e30205b78056137adc7d7c23df097ae35ec1e418eacbcc4612329fc45d53f812238e4b88fdfdbf51"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) capset(&(0x7f00000001c0), &(0x7f0000000200)={0x0, 0xfffffffffffffffc}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)={0x3, 0x1f, 0x8}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) setsockopt$sock_void(r4, 0x1, 0x3f, 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) 11:42:45 executing program 5: r0 = semget$private(0x0, 0x207, 0x0) semop(r0, &(0x7f0000000140)=[{0x0, 0x3}], 0x1) semop(r0, &(0x7f0000000180)=[{}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x480000, 0xa) sysfs$1(0x1, &(0x7f0000000080)='vmnet0-#GPLwlan0{eth1\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r2, 0x7}}, 0x10) 11:42:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x384, 0xfffffffffffffffb, 0x0, 0x0, 0x401, 0x0, 0x972, 0x1, 0x4, 0x0, 0x0, 0x7fffffff, 0x0, 0x9, 0x0, 0x101, 0x0, 0x22c5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000, 0xffffffff80000001, 0xffffffff00000000, 0x7}, 0x0, 0x0, 0xffffffffffffff9c, 0x1) r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x527c01, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x6d38) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="f000000000000000140812000c000100621067104e6f6e64000000000400020798ea4c5b9dd01c406388db294969d700"], 0x1}}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) sendmsg$nl_route(r1, &(0x7f0000000740)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000700)={&(0x7f0000000780)=@ipv4_getroute={0x1c, 0x1a, 0x523, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x7fffffff, 0xfc, 0x3, 0xfd, 0x1}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x4000000) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, &(0x7f0000000200)={{0x2, 0x5, 0x6, 0x400, 'syz0\x00', 0x5}, 0x1, [0x7ff, 0x8, 0xffffffffffffffff, 0x9, 0x1, 0x0, 0x2, 0x7ff, 0xf50, 0xffffffffffff587c, 0xfd, 0x40, 0x9, 0x3, 0x2, 0x4, 0x7, 0x4000000000000000, 0x7, 0x3ff, 0x0, 0x1, 0x3, 0x2, 0xffd, 0x2000000000000000, 0x100, 0x2, 0x8f3, 0x1, 0x6, 0x6, 0x5, 0x101, 0x9, 0x3, 0x80000001, 0x0, 0x6c9, 0x7, 0xc3, 0x7, 0xcdd4, 0x4, 0xffff, 0x3c, 0x0, 0x7df5, 0x6, 0x0, 0x8, 0xfffffffffffffe01, 0x0, 0x9, 0x3, 0x3, 0x0, 0x8914, 0x0, 0x10000, 0xf84a, 0x2, 0x631b, 0x0, 0x2, 0x10000000, 0xdc, 0x5, 0xffffffffffffffc0, 0xbc, 0x446, 0x2dc, 0x1, 0x5, 0x2, 0x100, 0x400, 0x75cc, 0x7fffffff, 0x4, 0x0, 0x1, 0x1ff, 0x7fffffff, 0x8, 0x0, 0x7, 0x3, 0x7, 0xff, 0x800, 0x6, 0x7fff, 0x4, 0x6, 0x3, 0x0, 0xc3, 0x81, 0x3, 0x9, 0x8, 0x265, 0x100000001, 0x1000, 0x7e, 0x7ff, 0x1, 0x4, 0x4, 0x9, 0x3, 0xaf, 0x0, 0x2, 0x6, 0x5742, 0x2, 0x8000, 0x5fc, 0x2406, 0x3f, 0x4, 0x3, 0x7, 0x1, 0x0, 0x5]}) 11:42:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = socket$inet(0x2, 0x100000000805, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x72, &(0x7f0000745ffc), &(0x7f0000b96000)=0x35b) 11:42:45 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x3, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f00000002c0)=""/205, 0x2}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0xc040564a, &(0x7f0000000180)={0x0, 0x1}) getpid() clock_getres(0x4000000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$rxrpc(r0, &(0x7f0000000440)=""/138, 0x8a, 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) fchmod(r1, 0x80000000000002) prctl$PR_CAPBSET_READ(0x17, 0x22) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) preadv(r1, &(0x7f0000000280)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000500)={0x400, "5dd6bde1c620288f10291e743c77e0d53af02619005ef1160112b40ba1ed932a", 0x2, 0x55c2, 0x1, 0xffb7ff, 0x8}) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000000)={0x3, "830312"}, 0x4) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) prctl$PR_SET_MM(0x23, 0xf, &(0x7f0000ffe000/0x2000)=nil) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 11:42:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x16, [@typed={0x8, 0x0, @fd}]}]}, 0x20}}, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) 11:42:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000003c0)=@expire={0xf8, 0x18, 0xd03, 0x0, 0x0, {{{@in6=@mcast2, @in=@multicast2}, {@in=@remote}, @in6=@remote}}}, 0xf8}}, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffff9, 0x80) sendto$inet(r1, &(0x7f0000000040)="077caeb54dbb33c99e7b75e617f693740fa5c1f4d00afd7f2751011188cf7129fefd5d19fa704a0b0e33e2b018bdd46811810c8542ff35db1ea008ea0822acb346a289077034b456dba2c17e9a93a725442f835593d5d638557f52b78b34ba9fc57d1ae9e4e38de688ae6b859b7245fad1c5bea00f980aa355786174661692dd50736db3007774b79f84242f728964e31e6893a9b57b865e", 0x98, 0x4000, 0x0, 0x0) 11:42:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) capset(&(0x7f00000001c0), &(0x7f0000000200)={0x0, 0xfffffffffffffffc}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)={0x3, 0x1f, 0x8}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) setsockopt$sock_void(r4, 0x1, 0x3f, 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) 11:42:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) capset(&(0x7f00000001c0), &(0x7f0000000200)={0x0, 0xfffffffffffffffc}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)={0x3, 0x1f, 0x8}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) setsockopt$sock_void(r4, 0x1, 0x3f, 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) 11:42:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0xfffffffffffffff7, 0x101001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000340)={0x0, r1, 0x39f0, 0x0, 0x100, 0x2}) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000300)=""/61) r2 = userfaultfd(0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000240)=0xc) syz_open_procfs(r4, &(0x7f0000000280)='net/ip6_tables_targets\x00') ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f000085c000/0x3000)=nil, 0x3000}, 0x3}) r5 = gettid() process_vm_writev(r5, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x32f, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x400, 0x2, 0x0, 0x0, 0x0, 0x8000, 0xffffffffffffffc0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100000000, 0x8caf, 0x80000001, 0x0, 0x1, 0xfff, 0x0, 0x2, 0x4, 0x191d, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x1, 0xf0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x10, 0xffffffffffffffff, 0x2) close(r2) munmap(&(0x7f00002c6000/0x1000)=nil, 0x1000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x4e24, @rand_addr=0x3}, @in6={0xa, 0x4e24, 0x2, @mcast1, 0x3}, @in6={0xa, 0x4e21, 0x1, @remote, 0x10001}, @in6={0xa, 0x4e24, 0xf75, @loopback, 0x200}, @in6={0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x100000001}], 0x80) setsockopt$inet_buf(r0, 0x0, 0x11, &(0x7f00000002c0), 0x0) 11:42:45 executing program 5: r0 = socket$inet(0x10, 0x20000000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000001e0007041dfffd946f610500070000001f00000000000400060005000410ff7e", 0x24}], 0x1}, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x8000) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000000c0)={0x8001007, 0xfffffffffffff800, 0x2}) 11:42:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) capset(&(0x7f00000001c0), &(0x7f0000000200)={0x0, 0xfffffffffffffffc}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)={0x3, 0x1f, 0x8}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) setsockopt$sock_void(r4, 0x1, 0x3f, 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) 11:42:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) capset(&(0x7f00000001c0), &(0x7f0000000200)={0x0, 0xfffffffffffffffc}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000100)={0x3, 0x1f, 0x8}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) setsockopt$sock_void(r4, 0x1, 0x3f, 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) 11:42:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x16, [@typed={0x8, 0x0, @fd}]}]}, 0x20}}, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) 11:42:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000), 0xc) sendto$inet6(r0, 0x0, 0xfffffffffffffe67, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r0], 0x12) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000440)={{{@in=@loopback, @in=@dev={0xac, 0x14, 0x14, 0x23}, 0x4e20, 0x1ff, 0x4e23, 0x1, 0x0, 0xa0, 0x20, 0x77, r2, r3}, {0x9, 0x7, 0x7, 0xf413, 0x7fffffff, 0x7f, 0x81, 0x200}, {0x5, 0x80000000, 0x4000000000, 0x7ff}, 0x8001, 0x6e6bb1, 0x3, 0x1, 0x3, 0x1}, {{@in=@broadcast, 0x4d6, 0x2b}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x29}, 0x3507, 0x6, 0x0, 0x3, 0x7, 0xf7, 0x80000001}}, 0xe8) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000100)='/dev/rtc0\x00', 0xa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x12) 11:42:46 executing program 1: syz_open_dev$sndseq(0x0, 0x0, 0x100000000000001) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000340)=0x1000) r2 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f00000000c0), &(0x7f0000000180)=0x4) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x80000, 0xffffffffffffefff) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r4 = dup2(r3, r3) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="4500b091e5fb02a45fcbf9c9c86a32e1286ec7ad5269a445251954d4895f2b460900006602899f17bf3243d03db2717aeb5719ee70dd179bc6dd3954c3031659eab8d6efefa19fbc9994b538b6dfbd9a444a0ae36b231be666702002f91846b4c756915faf2b7b097d23b2529aa0f02f2a2dba77fb970044de7191c085dc05cf52d7335bf8410d79557dc5b3261599c74301d2e70a8ab828b8f3597f8c035e7ece1fd94869915290bc2c90"], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xfffffffffffffffc, 0x2, 0x100000001, 0x9, 0x320, 0x3a, 0x4, 0x35130000, 0xffffffffffff7fff, 0x8001, 0xb05e}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x0, 0x0) shutdown(r3, 0x1) setsockopt$XDP_UMEM_FILL_RING(r5, 0x11b, 0x5, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/sys/\x00\x00\x80\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodewt_conn\x00', 0x2, 0x0) 11:42:46 executing program 0: socketpair$unix(0x1, 0xfffffffffffffffd, 0x0, &(0x7f0000000200)) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1f, 0x80100) open(&(0x7f0000000140)='./file0\x00', 0x8000, 0x0) r0 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x800000417ffc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={&(0x7f0000000100)={0x10, 0x6000}, 0xc, &(0x7f0000000080)={&(0x7f0000000800)=ANY=[@ANYBLOB="540100001000010500000000000000ec28ad6e4c6371f200000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000000000000032000000ff0100000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480001007368613531322d617678320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c0017000b0000000000000000000000000000000000000000000000"], 0x4}}, 0x0) 11:42:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000680)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000006c0)=[{0x30, 0x0, [0xfffffffffffffff8, 0x3f, 0x80000000, 0x31, 0x1f, 0x6, 0x401, 0x11, 0x8, 0x8, 0x4c, 0xfffffffffffffffb, 0x1, 0x320, 0x100, 0x6]}, {0x17, 0x0, [0x80000000, 0x100000000, 0x5672, 0x8, 0x8, 0x9, 0x4, 0x100000001, 0x868, 0x80000000, 0x6f3, 0xffffffffffff6c97, 0x3b, 0xd06, 0x3f, 0xe2b506f]}, {0x1, 0x0, [0x82aa, 0x6, 0x8001, 0x4, 0x10001, 0x6, 0x0, 0x6, 0x7, 0x2, 0x5, 0x8000, 0x8, 0x313, 0x6d8, 0x1f]}, {0x0, 0x0, [0x2, 0x5, 0x9, 0x3ff8000000000, 0x7, 0x4, 0x401, 0xb2d, 0x8f, 0x8, 0xfff, 0x80000001, 0xebd, 0x0, 0xfffffffffffffff9, 0x5]}, {0x0, 0x0, [0x5, 0xffffffffffff8001, 0x0, 0x7, 0x9, 0xfff, 0x10001, 0x2, 0xacf, 0x3f7, 0xfffffffffffff800, 0x1f, 0xe997, 0x8, 0x4, 0xb93]}, {0x8, 0x0, [0x80000001, 0x2, 0x2, 0x8001, 0x0, 0x2, 0x401, 0x9, 0x10000, 0x100, 0x10001, 0xcbe, 0x2, 0x2, 0x3, 0x8]}, {0x5, 0x0, [0x6, 0x4, 0x2, 0xffff, 0x3, 0x8, 0x1, 0x707122, 0x2, 0xc00000000, 0x0, 0xfffffffffffffe6f, 0x8041, 0x8, 0xff, 0x80000000]}, {0x10, 0x0, [0x9, 0x0, 0x3, 0x0, 0x8, 0x0, 0x7fff, 0x7, 0x7, 0x40, 0x0, 0x913, 0x0, 0x8, 0x27756e7, 0x9891]}, {0x8, 0x0, [0x6, 0x4f, 0xecb5, 0x5, 0x1, 0x2, 0xb14f, 0xbc, 0x8, 0x1, 0x80000000, 0xffff, 0x8, 0xfff, 0x3f, 0x1000]}, {0x2, 0x0, [0x7, 0x3, 0x2, 0x1ff, 0x7f0000000000000, 0x1ed, 0x4, 0x10001, 0x6, 0x4, 0x2a6b, 0x1, 0x68, 0x6, 0x0, 0xfffffffffffffffc]}], r1, 0x1, 0x1, 0x2d0}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x749443, 0x0) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f00000004c0)={0xfffffffffffffffc, {{0x2, 0x4e22, @local}}, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x100000000, @remote, 0xff}, {0xa, 0x4e22, 0x5, @empty, 0xffffffff}, r1, 0x66}}, 0x48) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000440)) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0xc000000000000000}}, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @mcast2, 0xfffffffffffffffc}, {}, r2}}, 0x48) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000600)) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 11:42:46 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058560f, &(0x7f0000000080)={0x0, 0x5, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ba143bef"}, 0x0, 0x0, @fd, 0x4}) r1 = getpgrp(0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) ptrace(0x421f, r1) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000100)={0x800, 0x0, [], {0x0, @reserved}}) 11:42:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040), 0x3) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x202, 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000080)) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) 11:42:46 executing program 0: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200000, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f00000000c0)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000180)) syz_open_pts(r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c833, 0xffffffffffffffff, 0x0) [ 193.597712][ T7885] kasan: CONFIG_KASAN_INLINE enabled [ 193.631349][ T7885] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 193.646990][ T7893] QAT: Invalid ioctl [ 193.656157][ T7885] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 193.663115][ T7885] CPU: 0 PID: 7885 Comm: syz-executor.3 Not tainted 5.0.0+ #23 [ 193.670675][ T7885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.680743][ T7885] RIP: 0010:rdma_listen+0x2dc/0x970 [ 193.685946][ T7885] Code: 8b ac 24 c8 01 00 00 31 f6 48 c7 c7 80 2f 1d 89 e8 59 cf 00 02 48 b8 00 00 00 00 00 fc ff df 49 8d 7d 08 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 d6 05 00 00 48 b8 00 00 00 00 00 fc ff df 49 8b [ 193.689213][ T7893] QAT: Invalid ioctl [ 193.705559][ T7885] RSP: 0018:ffff88805b82fc30 EFLAGS: 00010202 [ 193.705570][ T7885] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: 0000000000000000 [ 193.705577][ T7885] RDX: 0000000000000001 RSI: 0000000000000008 RDI: 0000000000000008 [ 193.705585][ T7885] RBP: ffff88805b82fc68 R08: 1ffffffff123a5f0 R09: fffffbfff123a5f1 [ 193.705593][ T7885] R10: ffff88805b82fc20 R11: ffffffff891d2f87 R12: ffff88805ab0aa80 [ 193.705599][ T7885] R13: 0000000000000000 R14: 0000000000000400 R15: 0000000000000007 [ 193.705610][ T7885] FS: 00007f0c7ad1a700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 193.705617][ T7885] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 193.705624][ T7885] CR2: 0000000001ed3fd0 CR3: 000000009804f000 CR4: 00000000001406f0 [ 193.705634][ T7885] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 193.705651][ T7885] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 193.794928][ T7885] Call Trace: [ 193.798226][ T7885] ucma_listen+0x14d/0x1c0 [ 193.802648][ T7885] ? ucma_notify+0x190/0x190 [ 193.807237][ T7885] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 193.813486][ T7885] ? _copy_from_user+0xdd/0x150 [ 193.818345][ T7885] ucma_write+0x2da/0x3c0 [ 193.822673][ T7885] ? ucma_notify+0x190/0x190 [ 193.827269][ T7885] ? ucma_open+0x290/0x290 [ 193.831695][ T7885] ? apparmor_file_permission+0x25/0x30 [ 193.837238][ T7885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.843523][ T7885] ? security_file_permission+0x94/0x380 [ 193.849281][ T7885] __vfs_write+0x8d/0x110 [ 193.853620][ T7885] ? ucma_open+0x290/0x290 [ 193.858038][ T7885] vfs_write+0x20c/0x580 [ 193.862309][ T7885] ksys_write+0xea/0x1f0 [ 193.866558][ T7885] ? __ia32_sys_read+0xb0/0xb0 [ 193.871328][ T7885] ? do_syscall_64+0x26/0x610 [ 193.876002][ T7885] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.882068][ T7885] ? do_syscall_64+0x26/0x610 [ 193.886750][ T7885] __x64_sys_write+0x73/0xb0 [ 193.891343][ T7885] do_syscall_64+0x103/0x610 [ 193.895936][ T7885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.901936][ T7885] RIP: 0033:0x458079 [ 193.905830][ T7885] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.927044][ T7885] RSP: 002b:00007f0c7ad19c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 193.935483][ T7885] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458079 [ 193.943454][ T7885] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000004 [ 193.951419][ T7885] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 193.959391][ T7885] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0c7ad1a6d4 [ 193.967362][ T7885] R13: 00000000004c7279 R14: 00000000004dcd30 R15: 00000000ffffffff [ 193.975506][ T7885] Modules linked in: 11:42:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1a1900, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') connect$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, r2, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb0f3}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000850}, 0x40000) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000130a0508ff0280fffdfffe2e0a0000000c0003002f006a007d0a00010c000200570022ff02f1d271"], 0x2c}}, 0x0) 11:42:46 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) r1 = syz_open_dev$usb(0x0, 0x0, 0x1) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000000)) write$cgroup_type(r1, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x4}, 0x28, 0x1) 11:42:46 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80) listen(r0, 0xa) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{0x1, 0xf000, 0x1c, 0x3, 0xfff, 0x0, 0x0, 0x0, 0x4, 0x40, 0x7, 0x4}, {0xf001, 0x1f000, 0x0, 0x2, 0x1890e483, 0x6, 0x1, 0x2, 0x7fff, 0x2, 0x8, 0x2}, {0x1, 0x110000, 0x3, 0x40, 0x1000, 0x4, 0xffffffff99df7052, 0xfff, 0x0, 0x8, 0x200, 0x1}, {0x4, 0x100000, 0x3, 0x401, 0x2, 0x8001, 0x3f7, 0xa48, 0x9, 0x800, 0x5, 0x8}, {0x2000, 0x100000, 0xf, 0x3ff, 0x200, 0x2, 0xeb, 0x1, 0x2, 0x7f, 0x7, 0x6}, {0x3000, 0x10000, 0xa, 0x81, 0x2, 0x5, 0x401, 0x0, 0x5, 0x7fffffff, 0x335a, 0xecb5}, {0x0, 0x7000, 0xc, 0x5, 0xa880, 0x2, 0xd98, 0x3, 0xee, 0x7, 0x200, 0x100000001}, {0x10f000, 0x10f000, 0x8, 0x8, 0xfffffffffffffff7, 0x5, 0x3, 0x0, 0x5, 0x38, 0x81, 0x2}, {0x3001, 0xd000}, {0x4}, 0x40000, 0x0, 0x0, 0x118, 0x0, 0x4800, 0x2, [0x1, 0x7fff, 0x1, 0x6]}) write(r1, &(0x7f0000000100), 0x34000) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x20000) keyctl$session_to_parent(0x12) setns(r3, 0x8000000) close(r0) [ 193.992987][ T3874] kobject: 'loop2' (0000000017038fac): kobject_uevent_env [ 194.000155][ T3874] kobject: 'loop2' (0000000017038fac): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 194.016933][ T7898] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 11:42:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1a1900, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') connect$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, r2, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb0f3}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000850}, 0x40000) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000130a0508ff0280fffdfffe2e0a0000000c0003002f006a007d0a00010c000200570022ff02f1d271"], 0x2c}}, 0x0) [ 194.056998][ T3874] kobject: 'loop4' (00000000b80357e2): kobject_uevent_env [ 194.088573][ T3874] kobject: 'loop4' (00000000b80357e2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 194.093571][ T7910] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 11:42:46 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) r1 = syz_open_dev$usb(0x0, 0x0, 0x1) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000000)) write$cgroup_type(r1, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x4}, 0x28, 0x1) [ 194.116390][ T3874] kobject: 'loop1' (000000004e425655): kobject_uevent_env [ 194.137211][ T3874] kobject: 'loop1' (000000004e425655): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 194.169911][ T3874] kobject: 'loop1' (000000004e425655): kobject_uevent_env [ 194.182735][ T7885] ---[ end trace 4d8d045f50c079e1 ]--- [ 194.189777][ T7885] RIP: 0010:rdma_listen+0x2dc/0x970 [ 194.198917][ T3874] kobject: 'loop1' (000000004e425655): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 194.223927][ T7885] Code: 8b ac 24 c8 01 00 00 31 f6 48 c7 c7 80 2f 1d 89 e8 59 cf 00 02 48 b8 00 00 00 00 00 fc ff df 49 8d 7d 08 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 d6 05 00 00 48 b8 00 00 00 00 00 fc ff df 49 8b [ 194.240891][ T3874] kobject: 'loop2' (0000000017038fac): kobject_uevent_env [ 194.266331][ T3874] kobject: 'loop2' (0000000017038fac): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 194.287200][ T7885] RSP: 0018:ffff88805b82fc30 EFLAGS: 00010202 11:42:47 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x22280, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000040)=""/29) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, 0x0, 0x0) 11:42:47 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) r1 = syz_open_dev$usb(0x0, 0x0, 0x1) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000000)) write$cgroup_type(r1, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x4}, 0x28, 0x1) 11:42:47 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) r1 = syz_open_dev$usb(0x0, 0x0, 0x1) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000000)) write$cgroup_type(r1, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x4}, 0x28, 0x1) [ 194.328374][ T7885] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: 0000000000000000 [ 194.340625][ T3874] kobject: 'loop5' (0000000039e61fcb): kobject_uevent_env [ 194.367661][ T7927] QAT: Invalid ioctl [ 194.372065][ T3874] kobject: 'loop5' (0000000039e61fcb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 194.386243][ T7885] RDX: 0000000000000001 RSI: 0000000000000008 RDI: 0000000000000008 [ 194.395827][ T7927] QAT: Invalid ioctl [ 194.407529][ T3874] kobject: 'loop4' (00000000b80357e2): kobject_uevent_env [ 194.427830][ T7885] RBP: ffff88805b82fc68 R08: 1ffffffff123a5f0 R09: fffffbfff123a5f1 [ 194.452168][ T3874] kobject: 'loop4' (00000000b80357e2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 194.462822][ T7885] R10: ffff88805b82fc20 R11: ffffffff891d2f87 R12: ffff88805ab0aa80 [ 194.473935][ T3874] kobject: 'loop1' (000000004e425655): kobject_uevent_env [ 194.481090][ T3874] kobject: 'loop1' (000000004e425655): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 194.497142][ T7885] R13: 0000000000000000 R14: 0000000000000400 R15: 0000000000000007 [ 194.504088][ T3874] kobject: 'loop2' (0000000017038fac): kobject_uevent_env [ 194.507708][ T7885] FS: 00007f0c7ad1a700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 194.512298][ T3874] kobject: 'loop2' (0000000017038fac): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 194.559240][ T7885] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 194.574359][ T7885] CR2: 00007fa4216d9db8 CR3: 000000009804f000 CR4: 00000000001406e0 [ 194.582353][ T7885] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 194.614991][ T7885] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 194.628330][ T7885] Kernel panic - not syncing: Fatal exception [ 194.635260][ T7885] Kernel Offset: disabled [ 194.639615][ T7885] Rebooting in 86400 seconds..