[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 98.554374] audit: type=1800 audit(1551731481.608:25): pid=11082 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 98.573643] audit: type=1800 audit(1551731481.618:26): pid=11082 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 98.593142] audit: type=1800 audit(1551731481.628:27): pid=11082 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.63' (ECDSA) to the list of known hosts. 2019/03/04 20:31:36 fuzzer started 2019/03/04 20:31:42 dialing manager at 10.128.0.26:34023 2019/03/04 20:31:42 syscalls: 1 2019/03/04 20:31:42 code coverage: enabled 2019/03/04 20:31:42 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/03/04 20:31:42 extra coverage: extra coverage is not supported by the kernel 2019/03/04 20:31:42 setuid sandbox: enabled 2019/03/04 20:31:42 namespace sandbox: enabled 2019/03/04 20:31:42 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/04 20:31:42 fault injection: enabled 2019/03/04 20:31:42 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/04 20:31:42 net packet injection: enabled 2019/03/04 20:31:42 net device setup: enabled 20:35:03 executing program 0: syzkaller login: [ 320.876765] IPVS: ftp: loaded support on port[0] = 21 [ 321.042753] chnl_net:caif_netlink_parms(): no params data found [ 321.116671] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.123313] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.131742] device bridge_slave_0 entered promiscuous mode [ 321.141264] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.147866] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.156390] device bridge_slave_1 entered promiscuous mode [ 321.191803] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 321.203412] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 321.235778] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 321.244735] team0: Port device team_slave_0 added [ 321.252006] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 321.260684] team0: Port device team_slave_1 added [ 321.267564] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 321.276169] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 321.457236] device hsr_slave_0 entered promiscuous mode [ 321.623119] device hsr_slave_1 entered promiscuous mode [ 321.873912] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 321.881644] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 321.913702] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.920260] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.927525] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.934129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.028663] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.037570] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.064069] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.078821] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 322.091178] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 322.098177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.106063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.123811] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 322.129922] 8021q: adding VLAN 0 to HW filter on device team0 [ 322.144923] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 322.152179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 322.160905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.169267] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.175818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.198139] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 322.206303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 322.216769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.225237] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.231752] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.249964] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 322.263601] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 322.278364] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 322.286515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 322.296526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 322.306069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 322.315598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 322.325949] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 322.340658] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 322.348247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 322.357444] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 322.374009] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 322.381074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 322.389767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.406064] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 322.417166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 322.425998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.438053] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 322.444841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 322.473278] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 322.495532] 8021q: adding VLAN 0 to HW filter on device batadv0 20:35:05 executing program 0: 20:35:05 executing program 0: 20:35:05 executing program 0: 20:35:06 executing program 0: 20:35:06 executing program 0: 20:35:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r0, 0x3ea) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000000000002000000006000000"], 0x10}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="fe503e6c3b42f641d9cdc76d9ddd0c3d69e2fb01293f550bc2ecdbb4dd94200000000000000084000000", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000100)) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 20:35:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e24, 0x80000000, @ipv4={[], [], @multicast2}, 0x4f7ddc37}}, 0x0, 0x8}, &(0x7f00000001c0)=0x90) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000000)={r2, 0x38, 0x401, 0x3f}, 0x10) unshare(0x2000400) fallocate(r0, 0x0, 0x0, 0x3f) 20:35:07 executing program 1: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) capset(&(0x7f0000000040)={0x20071026, r0}, &(0x7f0000000080)={0x81, 0xdf, 0x4, 0x729, 0x6, 0x8001}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40200, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) setsockopt(r1, 0xb6e8, 0x8, &(0x7f0000000180)="868478044add9f919833215ec1684651f8badea716e29ba71c5ee8035d83c3d3a98326e27b7bca630085d2a3337d4a288f57c189cea4c5aed08e25cc33d600a4c83a39298dcefb2260bd91640c7f70054dfe5e76557cecee24da0e24522f43e31a1ae87e05ea627406578f9fd2c6517c3723ce16d9763242a1d8b4a787ca2740fdd9274525e10d17b545ea178ac1acd387cb7b9df91a82acad4fb11460e950c113c32eaaa6ebe49e077087b92a98649c93d6f33941f08e3d2a169dccc6194198eb275905b1c35e2ed9cb1f14a0e1fc08e298cd751d9048509ef7f11fabffedaf37c8d4c5c462f25a2c9f1d6fcf223c24eab564f196b6e8", 0xf7) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) bind$isdn_base(r1, &(0x7f0000000300)={0x22, 0xbd, 0x800, 0x0, 0x9}, 0x6) readlinkat(r1, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=""/201, 0xc9) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000480)) connect$rds(r1, &(0x7f00000004c0)={0x2, 0x4e22, @loopback}, 0x10) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000500)) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000540)={0x3, 0x3, 0x3f, 0x200, 0x5, 0x80000001, 0x7, 0xb207, 0x0, 0xfff, 0xd6}, 0xb) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000580)={'bridge_slave_0\x00', 0x3}) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000005c0)={0x4c8, {{0x2, 0x4e24, @local}}}, 0x88) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x7f, @dev={0xfe, 0x80, [], 0xe}, 0x7}}, [0x20, 0x9, 0x2, 0x9, 0x33d2, 0x81, 0x101, 0xfffffffffffffffc, 0x2, 0x9, 0x8, 0xffffffffffff0001, 0x6]}, &(0x7f0000000780)=0x100) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000007c0)={r2, 0x80000000, 0x5, [0x0, 0xc81, 0x1f, 0x8, 0x100]}, &(0x7f0000000800)=0x12) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000840)={r3, @in6={{0xa, 0x4e21, 0xffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x100000001}}, 0x40, 0x9, 0x0, 0x2, 0x1}, &(0x7f0000000900)=0x98) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000940), &(0x7f0000000980)=0x4) read$alg(r1, &(0x7f00000009c0)=""/107, 0x6b) prctl$PR_SET_DUMPABLE(0x4, 0x3) socketpair(0x10, 0x0, 0x20, &(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000a80), &(0x7f0000000b00)=0x60) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000b40)=0x20, 0x4) truncate(&(0x7f0000000b80)='./file0\x00', 0x1) lsetxattr$trusted_overlay_origin(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)='trusted.overlay.origin\x00', &(0x7f0000000c40)='y\x00', 0x2, 0x2) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000c80)='y\x00') socket$inet_udp(0x2, 0x2, 0x0) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000cc0)=""/86) 20:35:07 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c46a500000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000e0000000000000000000200000000000000000000000000000088c77585b1d3fdcad1cee39d93cd1cf46909d291bd84804a490a012514465b218b08868aa89591be74cca19994974bf3a5e42d333f55a24c842adb3f66ec3b67dccd6b7c0a119d891c97aaa5b4f064ee0de0c799371b8ec0c2ab05"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200800, 0x0) 20:35:07 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000000040)) 20:35:07 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x1, 0x0, 0x0, &(0x7f0000005c00)=""/156, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000500)=""/236, 0x0}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x1) [ 324.720760] IPVS: ftp: loaded support on port[0] = 21 [ 324.887875] chnl_net:caif_netlink_parms(): no params data found 20:35:08 executing program 0: socket$inet6_dccp(0xa, 0x6, 0x0) r0 = syz_open_dev$video(&(0x7f0000000500)='/dev/video#\x00', 0x80000000, 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000a40)={0x7, @sliced={0x7ff, [0x0, 0x5, 0x0, 0x8001, 0x2, 0x1, 0x3, 0x6, 0x9, 0xfff, 0x8, 0x6, 0x6a000000000000, 0xfffffffffffffeff, 0x1884, 0xffffffff, 0x9, 0x34fb, 0x0, 0x7, 0x8374, 0x0, 0x80, 0x0, 0xfff, 0x7fffffff, 0x75, 0x0, 0x9, 0xffffffff, 0xfffffffffffffffd, 0x4, 0x8, 0x2, 0xa74, 0x1, 0x4, 0x2, 0x6, 0x6, 0x7fff, 0x8000, 0x2, 0x4, 0x400, 0x2e3d400, 0xfff, 0x9], 0xa7ad}}) r1 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x5, 0x228400) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000200)={0x2, 0xaa, 0x0, 'queue0\x00', 0xff}) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000000)={0x93d, &(0x7f0000000540)="2ad2ed2a8c7fad14b4c236cdb8dd69e3945dce5cfc46ec7d3dc531d072b0b8d60fd3b6e46ad005c783442eae5e731b94c7f39d6b940d7c4f45be435ccbaf93f9f45a15ccca6b166979f65087fbefac2c7b06511a9dec5988f815bb915f7a8678fe3590293e3caadc5c4c90717d02a88b729b74e240572166c2bda00e2b96d10c19c323c36beea54e0c5147d1998d9161d4cae94cd88d0e7c1ddf3796c03f2d7b7cd49ca983a8995fd8d62b26c8914cfbf0f5b7b823e9f818a3a21353de3c8ebfa3eff49ad8d9f62c40a41d09bdf268aa5d82503c32aae437ddfd36e721cdf2c610e5"}) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f00000002c0)={0x1, 0x3, @stop_pts=0x7}) ioctl$FICLONE(r0, 0x40049409, r1) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x6, 0x400, [], &(0x7f0000000140)=0x9}) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000480)={{0xa, 0x4e20, 0x9, @ipv4={[], [], @remote}, 0x6}, {0xa, 0x4e22, 0xff, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xffffffffffffff80, [0x81, 0x1, 0x0, 0x1, 0x5, 0x4, 0x7f, 0x1]}, 0x5c) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000003c0)={0x0, @bt={0x23, 0xca, 0x1, 0x2, 0x24000000000000, 0x0, 0x60, 0x8, 0x5, 0x6, 0x93, 0x7ff, 0xfffffffffffffffa, 0xd2, 0x1, 0x28}}) [ 325.035600] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.042365] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.050875] device bridge_slave_0 entered promiscuous mode [ 325.083460] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.090021] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.098507] device bridge_slave_1 entered promiscuous mode [ 325.134770] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 325.146897] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 325.179590] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 325.188496] team0: Port device team_slave_0 added [ 325.195234] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 325.203993] team0: Port device team_slave_1 added [ 325.210505] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 325.219582] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 20:35:08 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x5, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6b23a673"}, 0x0, 0x0, @fd, 0x4}) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{0x20, '/dev/video36\x00'}, {}, {0x20, '-wlan1-'}, {}, {0x20, '\xc0'}, {0x20, 'selfwlan0\\md5sum'}, {0x20, '/dev/video36\x00'}, {0x20, '/dev/video36\x00'}, {0x20, '/dev/video36\x00'}]}, 0x60) [ 325.317568] device hsr_slave_0 entered promiscuous mode [ 325.362640] device hsr_slave_1 entered promiscuous mode [ 325.413665] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 325.421321] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 20:35:08 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x6, &(0x7f000079bffc), &(0x7f0000000000)=0x4) [ 325.462364] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.468939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.476276] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.482905] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.595174] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 325.601312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 325.619982] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 325.635489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:35:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x19) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x200, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) [ 325.666748] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.688200] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.705091] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 325.740769] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 325.747092] 8021q: adding VLAN 0 to HW filter on device team0 [ 325.798157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 325.806663] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.814139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.856384] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 325.865868] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.872448] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.883374] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 325.901363] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 325.928265] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 325.948194] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 325.965229] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 325.973786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 325.982941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 325.991764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 326.001093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 326.009499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 326.018876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 20:35:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x100, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) getsockopt$sock_int(r0, 0x1, 0x3b, 0x0, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000180)={{0x1, 0x4}, 'port1\x00', 0xc0, 0x40, 0x4, 0xfffffffffffffffa, 0x0, 0x100000001, 0xffffffff, 0x0, 0x4, 0x5cd4a79b}) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000040)=0x100, 0x1) [ 326.030319] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 326.036512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 326.092790] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 326.123644] 8021q: adding VLAN 0 to HW filter on device batadv0 20:35:09 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x42400) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x15) r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x9, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r1, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0x6) close(r1) socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r1, r2, 0x0) [ 326.245408] capability: warning: `syz-executor.1' uses deprecated v2 capabilities in a way that may be insecure 20:35:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000000)={0x7fffd, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x69df]}) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f00000000c0)) lsetxattr$security_ima(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@md5={0x1, "fc6edce088109da2812e359c6993623a"}, 0x11, 0x3) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000240)={0xffffffff}) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18, 0x0, 0x7, {0x3ff}}, 0x18) [ 326.416221] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 20:35:09 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x5, 0x4, 0x6}}) r1 = socket(0xcc1ce6df679129a3, 0xf, 0x3ff) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@local, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f00000000c0)={0x0, 0x3016}) pwrite64(r0, &(0x7f0000000040)="16f7f699f7defecc3e7194efb90317db52ae4f3d87f9f1cdb3013514fe7ce5ef5bacd27c7df8ff1630efc54006bb9b3b95d59b731f4e1a6a73d2d6b67522d492", 0xfffffffffffffe36, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x400, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x400, 0x20) ioctl$VIDIOC_RESERVED(r0, 0x5601, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r3) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f00000001c0)={0xfffffffffffffffb, 0x0, 0x9, 0x2}) 20:35:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000180)=ANY=[@ANYBLOB="e829ef18"]) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x4000, 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x800, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2, 0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000080)="c3c1450cb1148267066d8d082bbcded92d62e4c51741c4ea6b492a79a866960c096c16870c1691b571de08a44aeaabe24bbb63ea488dd1687c7ffb1e1631e868678be08de81a0be6fc9c0037217a1be310ce1071f330a501fb85da6ceb0fff804825bd5d6af4ecfdf6ddfcc40c531a571c4b9157852efc24a3ed7c10bef02ce33e977c014be734af2214d98877f258bd6b3d25dc21b5c2afb586b9911cfcee174cda97f1c039433ca12fa4b3b6170e33e08b205c5689a8d145f96d3838793d7e45bec3cf2ea22e345c646a718b318ae5cd71de468228e4420f1ce7ec8b4f50505ccb0162cb9587e9a21877a8f906ab5a") 20:35:09 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140), 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@ipv6_delrule={0x3c, 0x21, 0xc05, 0x0, 0x0, {0xa, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@FIB_RULE_POLICY=@FRA_SPORT_RANGE={0x8}, @FRA_SRC={0x14}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40044}, 0x0) 20:35:09 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x8000201, 0x800000010007a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7) recvfrom$packet(r0, &(0x7f0000000040)=""/2, 0x2, 0x2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x6, 0x6, @broadcast}, 0x14) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080)=0x5, 0x4) setsockopt$inet_mreqsrc(r0, 0x0, 0x2f, &(0x7f0000000000)={@empty, @empty, @empty}, 0xc) ioctl$KVM_CREATE_VCPU(r0, 0x80045519, 0x0) 20:35:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0x100d000) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) r1 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x7, 0x21fe) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000040)=""/69) 20:35:10 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0xc000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000100)={0x8, 0x7, 0x1, 0x47545582, 0x7, 0x2, 0x1, 0x2, 0x5, 0x8f, 0x4}, 0xb) r1 = socket$inet6(0xa, 0x2, 0x0) keyctl$join(0x1, &(0x7f0000000400)={'syz', 0x3}) delete_module(&(0x7f0000000440)='syz', 0x200) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000000)=0x6, 0x24c) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) write$P9_RMKNOD(r0, &(0x7f0000000480)={0x14, 0x13, 0x1, {0x20, 0x2, 0x3}}, 0x14) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000040)=0x75, 0x4) r3 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, r3) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f0000000200)={0x800, {{0xa, 0x4e20, 0xf3, @mcast1, 0x1}}, {{0xa, 0x4e23, 0x0, @remote}}}, 0x108) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r0, 0x1, &(0x7f0000000340)="3f5014da99ecf091899c9bf4f8992352aa21dd6aeaa91b9cf2ea7d002614fc464dc1ad277a0d5f09cffec92911d68ff95f01b0ef33007636f769bb36107db6601994a1b2933a640a588ab10889902ead1dd3d7b7092ce18b0b0012029024e43a1b535842f13478a499cdaf27e24788b787de05834ee92492c15a9d711353fc78ff598799edf3f6c814b023c26e03d88c196c51ec0a32d5533ebb18d05af3635fa9ce64fd7c7d2ef12ac0a004e857eedc3a080f56e492d1d57d") ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000600)={0x0, {0x1000, 0x2}}) setsockopt$sock_int(r2, 0x1, 0x2, &(0x7f00000001c0)=0x7, 0x4) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000004c0)=0x3, 0x4) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) 20:35:10 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000140), 0x2) r1 = socket(0x10, 0x80002, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0xfffffffffffffffd) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0xffffffffffffff78, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001180ad0c000001000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001c00", @ANYRES32], 0x28}}, 0x0) sendto$unix(r1, &(0x7f0000000080)="b942c018ffac88d18644273fc9157a5ecb5bc82adf4ee335204ced662aa71aef1ba10ca8262feeba0912f611c94c5acdab432d839aa8f9ed491b79a5450f49ea58cccc", 0x43, 0x40011, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) 20:35:10 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000080)={0x0, 0x400}) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) sendfile(r2, r2, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r2, 0x4c01) ioctl$LOOP_SET_FD(r2, 0x4c00, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 20:35:10 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x30, 0x200000040000) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000080)={0x6, 0x1760}) 20:35:10 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40) socket$xdp(0x2c, 0x3, 0x0) readv(r0, &(0x7f0000000180)=[{0x0, 0x312}, {&(0x7f0000000100)=""/115, 0x73}], 0x2) accept4(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f0000000000)=0x80, 0x800) 20:35:10 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffe, 0x1) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000001340)={0x5, 0x3, @start={0x2}}) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0x180323, 0x4}) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000001140)={0x7, 0x800000, "f580f5f289ce936d07ad45b419a88ee762a48717cf7193a8", {0x80000001, 0x1}, 0x1f}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000001100)={'syz', 0x2}, &(0x7f0000000100)="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", 0x1000, 0xfffffffffffffffd) fcntl$setsig(r0, 0xa, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000001180)={@in6={{0xa, 0x4e22, 0xd90, @remote, 0x2}}, 0x0, 0xf7c9, 0x0, "e4578165178385fe6b605f3a6510b1713606419d209d05438bc47f18d10b06e1930a039d484764fe9c4a32f729a906b47e924da2b2968d04c41aaeb75d31070dba237db96806f82d4644d271aefa9b8e"}, 0xd8) futex(&(0x7f0000001280), 0x81, 0x2, &(0x7f00000012c0)={0x0, 0x1c9c380}, &(0x7f0000001300)=0x2, 0x0) 20:35:10 executing program 0: r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000340)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000280)=""/19, 0x13}, {&(0x7f0000000900)=""/124, 0x7c}, {&(0x7f0000000d00)=""/226, 0xe2}], 0xffffde8, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000f40)=[{&(0x7f00000007c0)=""/198, 0xc6}, {&(0x7f00000001c0)=""/33, 0x21}, {&(0x7f0000000280)=""/99, 0x63}, {&(0x7f0000000d00)=""/77, 0x32}], 0x4, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x49d}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) 20:35:10 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000040)=""/9, &(0x7f0000000080)=0x9) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(pcrypt(aegis256-generic))\x00'}, 0x58) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f00000000c0)) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0xb808) 20:35:11 executing program 0: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x10) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x11) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xe0c5, 0x400) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0x0, "c7426455ed102626ead485247b156c61956b79d983fd8fec4fa824f337aaa244a0e7228abc0aba6d74fb9718ca5e6a634e41c87924b0a20524fafd209ebbb7364bc2f141331a101b752abf6766e4e67347c51bfd"}, &(0x7f0000000140)=0x2c5) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000300)={r1, 0x5b, "3a8747887c539bc0cc7b7b85c0c00b965dc85cba0d242832e5f748df180f612e261cbbc87eb90165ebf16a0d2c8798a25df977ad8c3315ed1de27bddd474eea8a5adc5faa6845c9f5151384a670b432a0498934754861ace50775c"}, &(0x7f0000000200)=0x164) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0xb4d4e1fdc2d42ed0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040)=0x5, 0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000380)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in=@rand_addr=0x200, @in6=@empty, 0x4e23, 0x4bec, 0x4e21, 0x0, 0xa, 0x80, 0xa0, 0xff, r3, 0xffffffffffffffff}, {0x101, 0x0, 0x3, 0x6, 0xfffffffffffffff9, 0x100000001, 0x8, 0xb18}, {0x1f, 0x200, 0x9, 0xffffffffffff0001}, 0x3, 0x0, 0x1, 0x1, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d2, 0x3c}, 0xa, @in6=@loopback, 0x3504, 0x1, 0x3, 0x1ff, 0x0, 0x8, 0x9}}, 0xe8) 20:35:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4542c2, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x9d3e, 0x7f, 0x1, {0x77359400}, 0x7, 0x8}) r3 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x2, r3, 0x3}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f00000011c0)={@mcast1, 0x0}, &(0x7f0000001200)=0x14) sendto$packet(r2, &(0x7f00000001c0)="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", 0x1000, 0x20000000, &(0x7f0000001240)={0x11, 0x9, r4, 0x1, 0x20, 0x6, @broadcast}, 0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") fcntl$getownex(r1, 0x10, &(0x7f0000001280)={0x0, 0x0}) ptrace$poke(0xffffffffffffffff, r6, &(0x7f00000012c0), 0x9c12) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x2000000001, r3, 0x2}) 20:35:11 executing program 0: r0 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0xfffffffffffffffb, 0x4, 0xffff, 0x0, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0)=r1, 0x4) capset(&(0x7f0000000b40)={0x20080522}, &(0x7f0000000b80)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x14000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000240)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x2, 0x2, 0x7}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r3 = shmget(0x3, 0x3000, 0x410, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_INFO(r3, 0xe, &(0x7f0000000000)=""/41) 20:35:11 executing program 1: r0 = socket$inet6(0xa, 0x100000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f00000001c0)=0x3, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 20:35:11 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'ip6gre0\x00'}) sendmsg(r0, &(0x7f0000000400)={0x0, 0x341, &(0x7f0000000040)=[{&(0x7f0000000500)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623692500160004bfaa8be66121b1f731afdc1338d544f6ff9a85c43a1500bf0cec6bab91d40000e00000000000fe00000000000000000000000000", 0x7d}], 0x1}, 0x0) 20:35:11 executing program 0: semget$private(0x0, 0x0, 0xa0) semget$private(0x0, 0x3, 0x100) r0 = semget(0x3, 0x0, 0x538) semctl$GETALL(r0, 0x0, 0x6, 0x0) 20:35:11 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x105000, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000100)={0x7fff}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x0, 0x0, 0x0, 0x4}, 0x2c) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xfffffffffffff97c, 0x28000) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000080)='vboxnet1proc\x00') 20:35:11 executing program 0: seccomp(0x1, 0x0, 0x0) seccomp(0x1, 0x1, &(0x7f0000028ff0)={0x1, &(0x7f00000b3000)=[{0x6, 0x0, 0x0, 0x407ffffffd}]}) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x3, 0x10000) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x3c, @broadcast, 0x4e24, 0x2, 'sed\x00', 0xe, 0x3, 0x8}, 0x2c) 20:35:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000100)="f4", 0x1) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000180)=0x1, 0x4) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x10001, 0x400) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x475e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000140)={r3, 0x6b03, 0x80000099}, &(0x7f00000001c0)=0xe) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:35:12 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x58f, 0x40) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000080)=""/83, &(0x7f0000000100)=0x53) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000140)) r1 = socket(0x10, 0x803, 0x0) unshare(0x8000000) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x38, &(0x7f0000000000), 0x20a154cc) 20:35:12 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000080)=""/249) ioctl$RTC_WIE_ON(r0, 0x700f) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) r1 = syz_open_dev$mice(0x0, 0x0, 0x0) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) 20:35:12 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f00003e2ff6)='net/ptype\x00') fanotify_init(0x19, 0x1000) pread64(r0, 0x0, 0x0, 0x33) 20:35:12 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='[system)\xd6!\x00') r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2880, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f00000000c0)=0x8, 0x4) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) 20:35:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x8001, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="0f014ba7"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:35:12 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) timerfd_gettime(r1, &(0x7f0000000000)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) 20:35:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c01000010000f09000000000000000000000000000000000000000000000000ac14140000000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x13c}}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x7, &(0x7f0000000180)=0x8000) getsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), &(0x7f0000000040)=0x4) getpgrp(r1) 20:35:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$EVIOCRMFF(r1, 0x80044584, 0x0) io_setup(0x5be, &(0x7f0000000040)=0x0) io_destroy(r2) [ 330.122221] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. [ 330.165439] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. 20:35:13 executing program 0: mkdir(0x0, 0x0) r0 = userfaultfd(0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) userfaultfd(0x800) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x400042, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x400002) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000040)={{0xfffffffffffffff7, 0x80, 0x1, 0xdb56, 0x3, 0xffff}, 0x6}) 20:35:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000180)=0x800, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0xfffffffffffff001}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x5d80000000000000, 0x0, 0x0, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f00000000c0)=""/149) 20:35:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$rxrpc(0x21, 0x2, 0x2) r2 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x0, 0x80000) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000240)=""/103) ioctl$VIDIOC_G_PRIORITY(r2, 0x80045643, 0x1) io_setup(0x8, &(0x7f0000000100)=0x0) connect$rxrpc(r1, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4}}, 0x24) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2c0000, 0x4) preadv(r4, &(0x7f0000000180)=[{&(0x7f0000000140)=""/51, 0x33}], 0xfffffffffffffaa, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r4, 0x10f, 0x82, &(0x7f00000000c0)=0x4, 0x4) io_submit(r3, 0x0, &(0x7f0000000380)) 20:35:13 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x7, 0x80000) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) 20:35:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @initdev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000240)={0x1, 0xffffffffffffff0f, 0xfa00, {0x0, r2}}, 0x10000012e) 20:35:13 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000340)='asymmetric\x00', &(0x7f00000002c0)=@keyring={'key_or_keyring:', r1}) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r0) 20:35:13 executing program 1: r0 = semget$private(0x0, 0x20000000103, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0xffff}, {0x0, 0x100000001}], 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x450, 0x0, 0x290, 0x290, 0x130, 0x290, 0x380, 0x380, 0x380, 0x380, 0x380, 0x4, &(0x7f0000000080), {[{{@uncond, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x2, 0x88}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "38a4166f75cb6f50473194f5de60b93bd7a3d5cafacb891cf3cc58a75c9e"}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}, @common=@hbh={0x48, 'hbh\x00', 0x0, {0x1bd1, 0x4, 0x1, [0x5873, 0x3, 0x7fff, 0xfffffffffffffffa, 0x3, 0x1, 0x400, 0x6, 0x727, 0x100, 0x7, 0x80, 0x6, 0x40, 0x7], 0xf}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4b0) semop(r0, &(0x7f0000000040)=[{0x4, 0x7}], 0x1) 20:35:13 executing program 0: mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0xb02, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f00000000c0)) ppoll(&(0x7f0000000040)=[{r0, 0x110}], 0x1, &(0x7f0000000180)={0x77359400}, &(0x7f0000000080), 0x8) 20:35:14 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x44802, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0x95, "7e829113d9c983a1e820b550e0b691bccbc4ed528c5b38ef324923f84a47d09d54627d9a191d35aa32e234d44c84ddee7e9613300088b91d13899657f78de8bb994c5beb12907b48e312c1ad348a8cbc066151b39c42485e094268d75690b846f94d9b8e020c973cc90669a204e43f92672fcb422706c9ae4a52d358af160e82c2cc78a2cca5f2a619a929a1bf4e0fa8075270e5e4"}, &(0x7f0000000100)=0x9d) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x80000001}, 0x8) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffd, @loopback, 0xb1}}, 0x3, 0x7, 0x4b, 0x7c0000000000000, 0x20}, &(0x7f0000000240)=0x98) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r2, 0x521, 0x70bd2d, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f00000003c0)={{0x80000000, 0x8, 0x1, 0x7ff0000000000, 0x5, 0x6f4}, 0x1ff}) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000400), &(0x7f0000000440)=0x4) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000480)={0x8001, 0x0, 0x10001}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f00000004c0)={0x5, r3, 0x10001, 0x7}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f00000005c0)={0x5, &(0x7f0000000500)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @link_local}]}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000520}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r2, 0x500, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40081}, 0x80) timer_create(0x7, &(0x7f0000000700)={0x0, 0x40, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000740)=0x0) timer_delete(r4) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000780)) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x89) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000007c0)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000800)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000840)='net/protocols\x00') bind$alg(r6, &(0x7f0000000880)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-avx2\x00'}, 0x58) setxattr$security_smack_transmute(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000980)='TRUE', 0x4, 0x1) getpeername$netlink(r6, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) link(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)='./file0\x00') setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000ac0)=0x100, 0x4) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000b40)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000c40)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000b80)={0x6c, r7, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000c80)=0x1) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000cc0), &(0x7f0000000d00)=0x4) 20:35:14 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x8) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x402000, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept(r0, 0x0, 0x0) close(r2) read(r1, &(0x7f00000001c0)=""/4096, 0x1000) 20:35:14 executing program 0: r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2f0000001800030007fffd946fa283bc8020000000040005031d8568130009000f0000000b00bb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000180)=""/251, &(0x7f0000000000)=0xfb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000280)="aadca3eb41c2c5995424a1") bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0xfffffffffffffe6f) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f00000002c0)={0x1, 0x0, {0x8, 0xe0d, 0x3, 0x7f}}) 20:35:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x4, {0x200, 0x80000000, "9a477b963a10a9d519fdae181224c95a71916f573174174f1f91c32efe1488a2c2396219196d58ae5f880d998e7ed7e7e46edafdc323e98fad2d501012db20fae30f70800431a1c4f882a85d2ac6f586c32342ca0b54c4e549befe1ce263cee710fcf1f040061e26474c8199da445189d32b4918955184e887f7d64e843a93d992b8d31a220f83f80727086eb8c8222844e796731c31ebc7a6e3a36f30edfc76ef46c57ccf548f66e6c47dc682b429777b6613d303a312b3e3623a6cc72b081dc9b8318e8dd9eeee1b80e6c7bac7fb376634ebefd0b4e7c8b71dd027af8e139092f3d2d01a6c07e0ca57409332bd0a55813192436acd21b95c631b051513bccc", 0xc5, 0x5, 0x80000000, 0x5, 0x8, 0x800}, r1}}, 0x128) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000140)=0x55f5341b, 0x8) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {0x0, r1, r0}}, 0x18) r3 = dup(r0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000200)={r4, r5/1000+30000}, 0x10) [ 331.612356] IPVS: ftp: loaded support on port[0] = 21 20:35:14 executing program 1: r0 = semget$private(0x0, 0x20000000103, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0xffff}, {0x0, 0x100000001}], 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x450, 0x0, 0x290, 0x290, 0x130, 0x290, 0x380, 0x380, 0x380, 0x380, 0x380, 0x4, &(0x7f0000000080), {[{{@uncond, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x2, 0x88}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "38a4166f75cb6f50473194f5de60b93bd7a3d5cafacb891cf3cc58a75c9e"}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}, @common=@hbh={0x48, 'hbh\x00', 0x0, {0x1bd1, 0x4, 0x1, [0x5873, 0x3, 0x7fff, 0xfffffffffffffffa, 0x3, 0x1, 0x400, 0x6, 0x727, 0x100, 0x7, 0x80, 0x6, 0x40, 0x7], 0xf}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4b0) semop(r0, &(0x7f0000000040)=[{0x4, 0x7}], 0x1) 20:35:14 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) mmap(&(0x7f0000388000/0x3000)=nil, 0x3000, 0x6, 0x1c, r0, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) [ 331.986194] chnl_net:caif_netlink_parms(): no params data found [ 332.065487] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.072161] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.080601] device bridge_slave_0 entered promiscuous mode [ 332.092401] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.098975] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.108228] device bridge_slave_1 entered promiscuous mode [ 332.150067] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 332.162515] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 332.199449] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 332.208358] team0: Port device team_slave_0 added [ 332.217526] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 332.226485] team0: Port device team_slave_1 added [ 332.235333] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 332.244590] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 332.339336] device hsr_slave_0 entered promiscuous mode [ 332.374636] device hsr_slave_1 entered promiscuous mode [ 332.415256] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 332.427553] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 332.466136] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.472769] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.479969] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.486629] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.606381] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 332.613223] 8021q: adding VLAN 0 to HW filter on device bond0 [ 332.631650] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 332.648211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.659475] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.679221] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.716628] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 332.729730] kauditd_printk_skb: 3 callbacks suppressed [ 332.729764] audit: type=1800 audit(1551731715.778:31): pid=11537 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="ramfs" ino=25523 res=0 20:35:15 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x884) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @remote, 0x5}, 0x1c) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfffffffffffffeba}}], 0x400000000000055, 0x0) [ 332.754410] audit: type=1800 audit(1551731715.778:32): pid=11539 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="ramfs" ino=25523 res=0 [ 332.787043] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 332.793394] 8021q: adding VLAN 0 to HW filter on device team0 [ 332.816459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.825028] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.831558] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.895559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.904001] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.910520] bridge0: port 2(bridge_slave_1) entered forwarding state 20:35:16 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$VIDIOC_S_MODULATOR(r2, 0x40445637, &(0x7f0000000040)={0x10001, "1a20809d536444955954a4318124322a725d4c3c62befc77d23d1622ca674a0c", 0x80, 0x8001, 0x4, 0x8, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x2b, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0xffffff94, 0x4}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) [ 332.979021] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 332.988997] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 333.000723] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 333.013836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 20:35:16 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x608001, 0x0) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000080)=0x8000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x8001, @loopback, 0x8000}, r2}}, 0x30) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7d, 0xa8, 0x1, 0x1fffe0000000, 0x20}, 0x14) [ 333.023771] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 333.033898] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 333.042846] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 333.146394] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 333.152925] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 333.161317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 333.199358] 8021q: adding VLAN 0 to HW filter on device batadv0 20:35:16 executing program 0: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000080)={{0x7fffffff, 0xc}, {}, 0xfffffffe, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 20:35:16 executing program 1: ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000080)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x100]}) 20:35:16 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800, 0x0) getsockopt$inet6_int(r1, 0x29, 0x1000000004e, 0x0, &(0x7f0000013000)) r2 = shmget(0x1, 0x1000, 0x1200, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000010000/0x3000)=nil, 0x1000) 20:35:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x101000, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000340)={'broute\x00'}, &(0x7f0000000440)=0x78) statx(r1, &(0x7f0000000200)='./file0\x00', 0x100, 0xfff, &(0x7f0000000240)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x2, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000080), &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0x279) socket$inet_sctp(0x2, 0x5, 0x84) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40202, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000140)=""/14) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) socket$pppoe(0x18, 0x1, 0x0) bind$rxrpc(r2, &(0x7f0000000180)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}}, 0x24) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480)='/dev/snapshot\x00', 0x206400, 0x0) 20:35:16 executing program 1: r0 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x4, 0xfffffffffffffffe, 0xc4e}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x1ff, 0x7fff, 0x8, 0xa30, 0x155}, &(0x7f0000000200)=0x14) listen(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 20:35:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x7fff, 0x4}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={r1, 0xffffffff}, 0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x64, 0x0, 0x4) 20:35:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x0, 0x0) [ 333.808871] kernel msg: ebtables bug: please report to author: Wrong len argument [ 333.895317] kernel msg: ebtables bug: please report to author: Wrong len argument 20:35:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000200)) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000300)={0xffffffffffff8001}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000340)) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x1f6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tun\x00\x9c;\x98\xfc\x06\x9f\x9fU\xd1\xc2\xec\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$nbd(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="674466b0000000000100030001000000e29d535b8806490dae18d374533a7555465a48813c931e57507b56"], 0x2b) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000000c0)={[{0x0, 0x0, 0x0, 0xfffffffffffffffc}]}) r4 = fcntl$dupfd(r3, 0x406, r3) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f0000000040)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0xaaaaaaaaaaaac41, 0x0, 0x0, 0x181) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:35:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x101000, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000340)={'broute\x00'}, &(0x7f0000000440)=0x78) statx(r1, &(0x7f0000000200)='./file0\x00', 0x100, 0xfff, &(0x7f0000000240)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x2, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000080), &(0x7f0000000800)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006272696467655f736c6176655f30000076657468305f746f5f627269646765007369743000000000000000000000000069703667726574617030000000000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000da00000000a0000000a0000000d00000006367726f75700000000000000000000000000000000000000000000000000000080000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000002ffffffff01000000110000000000000000006e72300000000000000000000000000079616d3000000000000000000000000079616d3000000000000000000000000076657468315f746f5f7465616d0000000180c2000000000000000000aaaaaaaaaa0000000000000000007000000070000000a0000000415544495400000000000000000000000000000000000000000000000000000008000000000000000000000000000000"]}, 0x279) socket$inet_sctp(0x2, 0x5, 0x84) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40202, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000140)=""/14) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) socket$pppoe(0x18, 0x1, 0x0) bind$rxrpc(r2, &(0x7f0000000180)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}}, 0x24) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480)='/dev/snapshot\x00', 0x206400, 0x0) [ 334.182875] kvm: pic: level sensitive irq not supported [ 334.185082] kvm: pic: single mode not supported [ 334.190626] kvm: pic: level sensitive irq not supported [ 334.195393] kernel msg: ebtables bug: please report to author: Wrong len argument [ 334.227332] kvm: pic: level sensitive irq not supported [ 334.233201] kvm: pic: level sensitive irq not supported [ 334.244773] kvm: pic: single mode not supported [ 334.254838] kvm: pic: single mode not supported 20:35:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x101000, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000340)={'broute\x00'}, &(0x7f0000000440)=0x78) statx(r1, &(0x7f0000000200)='./file0\x00', 0x100, 0xfff, &(0x7f0000000240)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x2, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000080), &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0x279) socket$inet_sctp(0x2, 0x5, 0x84) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40202, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000140)=""/14) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) socket$pppoe(0x18, 0x1, 0x0) bind$rxrpc(r2, &(0x7f0000000180)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}}, 0x24) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480)='/dev/snapshot\x00', 0x206400, 0x0) [ 334.274720] kvm: pic: single mode not supported [ 334.290817] kvm: pic: level sensitive irq not supported [ 334.427269] kernel msg: ebtables bug: please report to author: Wrong len argument 20:35:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x101000, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000340)={'broute\x00'}, &(0x7f0000000440)=0x78) statx(r1, &(0x7f0000000200)='./file0\x00', 0x100, 0xfff, &(0x7f0000000240)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x2, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000080), &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0x279) socket$inet_sctp(0x2, 0x5, 0x84) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40202, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000140)=""/14) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) socket$pppoe(0x18, 0x1, 0x0) bind$rxrpc(r2, &(0x7f0000000180)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}}, 0x24) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480)='/dev/snapshot\x00', 0x206400, 0x0) 20:35:17 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}], 0x1}}], 0x1, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000a00)=""/224, 0xe0}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f00000006c0)=@hci, 0x80, 0x0, 0x0, &(0x7f00000024c0)=""/129, 0x81}, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f00000007c0)=""/186, 0xba}], 0x1, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000c80)=[{&(0x7f0000000b00)=""/39, 0x27}, {&(0x7f0000000280)=""/139, 0x8b}], 0x2, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) [ 334.668955] kernel msg: ebtables bug: please report to author: Wrong len argument 20:35:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x101000, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000340)={'broute\x00'}, &(0x7f0000000440)=0x78) statx(r1, &(0x7f0000000200)='./file0\x00', 0x100, 0xfff, &(0x7f0000000240)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x2, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000080), &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0x279) socket$inet_sctp(0x2, 0x5, 0x84) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40202, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000140)=""/14) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) socket$pppoe(0x18, 0x1, 0x0) bind$rxrpc(r2, &(0x7f0000000180)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}}, 0x24) 20:35:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=@random={'osx.', 'fd'}, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x2) read$FUSE(r1, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 334.938429] kernel msg: ebtables bug: please report to author: Wrong len argument 20:35:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x101000, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000340)={'broute\x00'}, &(0x7f0000000440)=0x78) statx(r1, &(0x7f0000000200)='./file0\x00', 0x100, 0xfff, &(0x7f0000000240)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x2, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000080), &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0x279) socket$inet_sctp(0x2, 0x5, 0x84) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40202, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000140)=""/14) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) socket$pppoe(0x18, 0x1, 0x0) [ 335.151093] kernel msg: ebtables bug: please report to author: Wrong len argument 20:35:18 executing program 1: r0 = socket(0x1e, 0x805, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 20:35:18 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x800020000000ff) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x0) poll(&(0x7f0000000080)=[{r1, 0x1182}, {r0, 0x1}, {r0, 0x200}, {r1, 0x400}, {r1, 0x400}, {r0, 0x1000}, {r0, 0x1280}, {r0, 0x1003}], 0x8, 0xf4) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000040)={0x8000000, 0x3, 0x26}) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000140)={0xa1, ""/161}) socket$unix(0x1, 0x3, 0x0) 20:35:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x101000, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000340)={'broute\x00'}, &(0x7f0000000440)=0x78) statx(r1, &(0x7f0000000200)='./file0\x00', 0x100, 0xfff, &(0x7f0000000240)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x2, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000080), &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0x279) socket$inet_sctp(0x2, 0x5, 0x84) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40202, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000140)=""/14) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) [ 335.380166] kernel msg: ebtables bug: please report to author: Wrong len argument 20:35:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x267) sendto(r0, &(0x7f00000006c0)='u', 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000001000000000000000000000000038000000000000000000000000000000000000000000c774282680cbf51271e80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9e8212fe44486b966b50a9a125203eb990fef8e116341aa2ad671488ce1589385ecb013e771879acc7dcaaedb86df6cc736b02e8463f0372cffff0000000000007ab756d8d011"], 0xc9) sendto$inet(r0, &(0x7f0000000e80)="d763ec98de31f5dc47bd7ae5eeceba2e977e432f103b988c19d71150515b1e85734b186237ec9b9430fec0a3117d1440a9c30c12723d46fc4454123028fb5730ac9eb53022e5108d5e6f8fa861b991fcb0123281d4150b0506e8f00c4590b571e43dc126ea669e8e", 0x68, 0x0, 0x0, 0x0) 20:35:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x101000, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000340)={'broute\x00'}, &(0x7f0000000440)=0x78) statx(r1, &(0x7f0000000200)='./file0\x00', 0x100, 0xfff, &(0x7f0000000240)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x2, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000080), &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0x279) socket$inet_sctp(0x2, 0x5, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40202, 0x0) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) 20:35:18 executing program 0: r0 = add_key(&(0x7f0000000180)='user\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x240800, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f00000000c0)={0x7f, 0x2f, 0x8, 0x1, 0xff, 0x7f}) keyctl$get_persistent(0x16, 0x0, r0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000080)={0x7, 0x103, 0x5, {0x8, 0x0, 0x7, 0xff}}) [ 335.637908] kernel msg: ebtables bug: please report to author: Wrong len argument 20:35:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x101000, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000340)={'broute\x00'}, &(0x7f0000000440)=0x78) statx(r1, &(0x7f0000000200)='./file0\x00', 0x100, 0xfff, &(0x7f0000000240)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x2, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000080), &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0x279) socket$inet_sctp(0x2, 0x5, 0x84) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) 20:35:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400000, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080)=0xfffffffffffffffa, 0x4) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xd1, &(0x7f0000000000)=0x2, 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8921, &(0x7f00000000c0)={'team_slave_1\x00', &(0x7f0000000140)=@ethtool_sfeatures}) 20:35:19 executing program 0: syz_emit_ethernet(0xfffffffffffffe5d, &(0x7f0000000540)={@broadcast, @dev={[], 0x10}, [{[], {0x8100, 0x81, 0x4, 0x1}}], {@ipx={0x8137, {0xffff, 0x46, 0xfffffffffffffffd, 0x15, {@random=0x2, @broadcast, 0x7fffffff}, {@broadcast, @broadcast, 0x4}, "a868a54229b9071b98e120a82670db28ad9105930328c63b32f05e45a2b88764b17bc3bd2e305957"}}}}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000080)=ANY=[@ANYBLOB="860a000010aef50001010000070000000800000001000000"]) prctl$PR_SET_SECUREBITS(0x1c, 0x1) io_setup(0x7, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000587000)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f000096f000)="060063efff7f00009d", 0x9}]) [ 335.894355] kernel msg: ebtables bug: please report to author: Wrong len argument 20:35:19 executing program 1: getpid() r0 = socket(0x10, 0x803, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000700)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, 0x0, 0x0, &(0x7f0000000e00)=""/241, 0xf1}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef00000000000000a1", 0xfffffffffffffe3c, 0x0, 0x0, 0x0) sendmsg$rds(r0, 0x0, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000140)=@hci, 0x80, 0x0, 0x0, &(0x7f0000000a00)=""/129, 0x81}, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f00000007c0)=""/186, 0xba}, {&(0x7f00000001c0)=""/19, 0x13}, {&(0x7f0000000280)=""/37, 0x25}, {&(0x7f0000000900)=""/124, 0x7c}, {&(0x7f0000000d00)=""/226, 0xe2}, {&(0x7f0000000980)=""/69, 0x45}], 0x6, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000001fc0)={{0x3, 0x7, 0x0, 0x4, 'syz1\x00', 0x2}, 0x1, [0x6, 0x200, 0x20a, 0x5, 0x3, 0x7, 0x2, 0xc000, 0x4, 0x0, 0x5, 0x6e8972da, 0x5, 0xdd9, 0x9, 0x73f, 0x94a1, 0x7fff, 0x5, 0xe2, 0xffff, 0x4, 0x7ff, 0x0, 0x6, 0x6be8, 0x8, 0xec, 0x4, 0x100000001, 0x401, 0x4, 0x68, 0x49e3, 0x1, 0x1f, 0x1000, 0x9, 0x9, 0xa147, 0x5, 0x7f, 0x1, 0x782, 0x2, 0x2f, 0x8, 0xfffffffffffffffd, 0x200, 0x2, 0x7, 0x100000001, 0x7, 0xf01, 0x1, 0x250, 0x480, 0x8000, 0x0, 0x9, 0x869d, 0x2, 0xa, 0x80, 0x6, 0x2, 0xc94, 0x7, 0x8, 0x7ff, 0x7, 0x7, 0x600000000000000, 0x8001, 0x5, 0x4, 0x1, 0x800, 0x3, 0x0, 0x7, 0x80000000, 0x0, 0x2aa872e4, 0x9, 0x3ff, 0x401, 0x8, 0x4, 0x3, 0xfffffffffffffffa, 0xff, 0xdb1, 0x0, 0x9, 0x5, 0xffff, 0x80000001, 0x4e, 0xfffffffffffffc00, 0x0, 0x5d55, 0x15c, 0x1, 0x9, 0x7fff, 0xfff, 0x1, 0x80000001000, 0x1, 0x3ef, 0x0, 0x3f, 0x10001, 0x8000, 0x9, 0x2, 0x8, 0x7fff, 0x4, 0x0, 0x7, 0x3, 0x7, 0x9, 0x3, 0x6, 0x8], {0x77359400}}) 20:35:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x101000, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000340)={'broute\x00'}, &(0x7f0000000440)=0x78) statx(r1, &(0x7f0000000200)='./file0\x00', 0x100, 0xfff, &(0x7f0000000240)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x2, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000080), &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0x279) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) [ 336.157784] kernel msg: ebtables bug: please report to author: Wrong len argument 20:35:19 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10400, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000180)) syz_emit_ethernet(0x5, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYBLOB="d3a198684ef9a86b98131961fe166cace604fea2745871c31aeb2975633d58fdb6bf4697935e6cabe64183e6d48131eaa29cc26f94bf68c231c4f80ff921f83dab1d55cf6171740baa167659349857ee7189c7a7a17b84a48370668e57fabbcfadcba64106a5c72c6b9da716bf92d1bd031cb5d8096e3817eae40ee14e7c0a3b0b60d0fb90551d8f4d1f38b9d92f07cf075b83c5100633a4824f6eb7d382403dffe15188fee653609b9b38a9c5f2cedcf60c2a85cffaec4cd68cfd12cbab913bf796966959c740dfe2084ead6c6e7f7e6e0542bdf606134a21a0ae03d4dd342a6158552f3af210ac100c3d11ae45b189e42f", @ANYRES16, @ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRESOCT, @ANYPTR64, @ANYRES16], @ANYRES64], 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000080)={0x1, 0x7fffffff, 0x1, 0x3f, 0x3a85, 0x5}) 20:35:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000140)="420fb507b805000000b98de92d630f01c1f2430f3566b869008ec0f0814b00ec480000470f017a00f3f7e4470f017cc0423e26460f21f6410f01df", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0xffffffffffff0001) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:35:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x101000, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000340)={'broute\x00'}, &(0x7f0000000440)=0x78) statx(r1, &(0x7f0000000200)='./file0\x00', 0x100, 0xfff, &(0x7f0000000240)) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) 20:35:19 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000001200)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000080)={0x2}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000040)=0xe8) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x4}, [{0x2, 0x5, r2}], {0x4, 0x4}, [{0x8, 0x4, r3}, {0x8, 0x1, r4}, {0x8, 0x5, r5}]}, 0x44, 0x2) 20:35:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x101000, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000340)={'broute\x00'}, &(0x7f0000000440)=0x78) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) 20:35:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000100)='./file0\x00') clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x400) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x2, 0x6d, 0x20000000000001, 0x0, 0x0}, 0xbe) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r2}, 0x10) 20:35:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x800000000013, 0x10, 0x4}, 0x2c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x7, 0x9, 0x9, 0x22, r0}, 0x2c) 20:35:19 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x101000, 0x0) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) 20:35:19 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x804, 0x31, 0xffffffffffffffff, 0x4) r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x200000000114, 0x2715, 0xffffffffffffffff, &(0x7f0000000000)=0x2a5) signalfd4(r0, &(0x7f0000000040)={0x9}, 0x8, 0x800) 20:35:20 executing program 0: unshare(0x20400) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x3a, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0xffffffffffffff5e) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f00000000c0)) syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) 20:35:20 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) 20:35:20 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) 20:35:20 executing program 0: r0 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) r1 = dup2(r0, r0) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x8) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) io_cancel(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 20:35:20 executing program 2: futex(0x0, 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) 20:35:20 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x1, 0x80000) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000380)={0x5, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @local}]}) r1 = socket(0x1000004200080011, 0x80800, 0x6) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xfffffffffffffe07, &(0x7f0000000500)={&(0x7f00000001c0)={0x1c, r2, 0x8, 0x70bd2b, 0x25dfdbf3, {}, ["", "", ""]}, 0xb}, 0x1, 0x0, 0x0, 0x40000}, 0x4040) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f00000003c0)=0x1f000) write(r1, &(0x7f0000000180)="2400000058001f02ff07f4f9002304000a04f511080001000201000207000280010c0000", 0x24) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000480)=0x68) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000), &(0x7f0000000040)=0x4) 20:35:20 executing program 2: futex(0x0, 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) 20:35:20 executing program 0: mkdir(&(0x7f0000578000)='./file0\x00', 0x0) r0 = eventfd2(0x1, 0x80000) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x8, 0x8, 0xd9, 0xffff, 0x3, 0x0, 0x848, 0x94, 0x40, 0xf5, 0xd791, 0x3, 0x38, 0x2, 0xffffffffffff87be, 0x1, 0x6}, [{0x0, 0x7fff, 0x1, 0x9, 0x10001, 0x100000001, 0xfffffffffffffffd, 0x2}], "699219600902a65f7487eb648db99f50aacb97ab52b530ef6b2ba50a3d1b3bf5fd180bcc4dbc8cd859dbb24951940f5568d428ece0f8bcabf0c70f97d10efc75939da38309fd6c6f9db09727d3415b80ba246d46de25b13b5721c2f3f893050b32b6cdda14e437e122e45a22d83bfe9a0126d8060b1e0c477827e65655a925deddde769a9962f78d84c80da95b43ed381d29be3ebe054484af4f58ffded654cca09c96832d7ceba95a752e4bd2ef1be22bad60b216ea3dc3ba5161c8ac893bc8ef02f56dfb0fa95bdde11bee55e4a759db6be1c2a5de5cba1174", [[], []]}, 0x352) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x50000) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) bind$unix(r1, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e24}, 0x6e) lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@known='system.posix_acl_default\x00', &(0x7f00000003c0)='\x02\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x02\x00\xf3\x00\x00\x00\x00\x00', 0x14, 0x0) 20:35:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80043f679a10", 0x11}], 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000240)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x22}}, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x1ff}, @in6={0xa, 0x4e24, 0x0, @loopback, 0x1}, @in6={0xa, 0x4e22, 0x4, @loopback, 0x5}, @in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e24, 0xffffffffffffff23, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e21, @multicast2}], 0xa0) write$binfmt_misc(r4, &(0x7f0000000040)=ANY=[], 0xff06) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000040)) splice(r3, 0x0, r2, 0x0, 0x10005, 0x0) 20:35:21 executing program 2: futex(0x0, 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) 20:35:21 executing program 2: futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) 20:35:21 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000000)=""/40, &(0x7f0000000040)=0x28) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f00000000c0), 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, 0xffffffffffffffff, 0x0) 20:35:21 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/7, 0x2) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x5, 0x4, 0xffff, 0x1, 0x6}, &(0x7f0000000040)=0x14) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000100)={r1, 0xfff, 0x30, 0x5, 0x5}, &(0x7f0000000140)=0xfffffffffffffc60) [ 338.602042] hrtimer: interrupt took 211267 ns 20:35:21 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x2) close(r0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x8e, 0x2001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x80000000000d) creat(&(0x7f00000000c0)='./bus\x00', 0xffffffffffffffff) 20:35:22 executing program 2: futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) 20:35:22 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0c33ba40"], 0x1, 0xfeffffff00000000, &(0x7f0000000300)="14"}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x19, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000009"], 0x0, 0x0, 0x0}) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x20000, 0x0) ioctl$EVIOCRMFF(r4, 0x40044581, &(0x7f0000000280)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) [ 339.193983] binder: 11776:11777 unknown command 1085944588 [ 339.199877] binder: 11776:11777 ioctl c0306201 200002c0 returned -22 [ 339.218526] binder: 11776:11777 ioctl 6611 0 returned -22 [ 339.227908] binder_alloc: binder_alloc_mmap_handler: 11776 20ffa000-20ffd000 already mapped failed -16 [ 339.240377] binder: BINDER_SET_CONTEXT_MGR already set [ 339.245884] binder: 11776:11777 ioctl 40046207 0 returned -16 [ 339.253084] binder: 11776:11778 unknown command 1085944588 [ 339.258878] binder: 11776:11778 ioctl c0306201 200002c0 returned -22 [ 339.269343] binder_alloc: 11776: binder_alloc_buf, no vma [ 339.275165] binder: 11776:11778 transaction failed 29189/-3, size 0-0 line 3035 [ 339.286855] binder: undelivered TRANSACTION_COMPLETE [ 339.295429] binder: undelivered TRANSACTION_ERROR: 29189 [ 339.301067] binder: undelivered transaction 2, process died. 20:35:22 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0c33ba40"], 0x1, 0xfeffffff00000000, &(0x7f0000000300)="14"}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x19, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000009"], 0x0, 0x0, 0x0}) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x20000, 0x0) ioctl$EVIOCRMFF(r4, 0x40044581, &(0x7f0000000280)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) [ 339.436394] binder: 11780:11781 unknown command 1085944588 [ 339.442316] binder: 11780:11781 ioctl c0306201 200002c0 returned -22 [ 339.451721] binder: 11780:11781 ioctl 6611 0 returned -22 [ 339.460127] binder: undelivered TRANSACTION_COMPLETE 20:35:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x7, 0x40) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0xffffffff, 0x3, 0x8, 0x9, 0x100, 0x2331110b, 0x1, 0x8e, r2}, &(0x7f0000000180)=0x20) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x100000000, 0x80) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) r4 = accept$alg(r0, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(r3, 0xc004562f, &(0x7f0000000040)) sendmmsg(r4, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 339.510257] binder: undelivered transaction 5, process died. 20:35:22 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7fffffff, 0x400000) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000040)={0x78, 0x101, 0x5, 0x2, 0x94c}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x8400, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000001c0)={@loopback, @empty, 0x0}, &(0x7f0000000200)=0xc) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000400}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)=@newtclass={0xc0, 0x28, 0x200, 0x70bd27, 0x25dfdbfd, {0x0, r3, {0xe, 0x3}, {0xffff, 0xb}, {0xe, 0xffef}}, [@tclass_kind_options=@c_hfsc={{0xc, 0x1, 'hfsc\x00'}, {0x34, 0x2, [@TCA_HFSC_FSC={0x10, 0x2, {0x1, 0x1, 0x328}}, @TCA_HFSC_FSC={0x10, 0x2, {0xffffffffffffffff, 0x100, 0x853}}, @TCA_HFSC_RSC={0x10, 0x1, {0xfffffffffffffffe, 0x6, 0x80000000}}]}}, @TCA_RATE={0x8, 0x5, {0x8, 0x28}}, @tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x4c, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0x3, 0x0, 0x8000, 0x3ff, 0x5, 0x7}}, @TCA_CBQ_WRROPT={0x10, 0x2, {0x1, 0x2, 0xc7e, 0x2, 0x73, 0x4}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0xd, 0x2, 0x15, 0x6f61969d, 0x438b, 0xfffffffffffffff7, 0x100000000, 0x4}}, @TCA_CBQ_WRROPT={0x10, 0x2, {0x6, 0x5, 0x200000000000000, 0x8, 0x7, 0x1f}}]}}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4840}, 0x4040884) bind$netlink(r1, &(0x7f0000000380)={0x10, 0x0, 0x25dfdbfe, 0x140}, 0xc) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f00000003c0)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1b) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x89b, 0x6, 0x4}) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000440)=[0x6, 0x7]) write$P9_RREMOVE(r2, &(0x7f0000000480)={0x7, 0x7b, 0x1}, 0x7) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x4, 0xfffffffffffffff9, 0x3f}}, 0x30) fcntl$addseals(r1, 0x409, 0x4) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000500)={0x3, 0x101, 0x6}) setsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f0000000540)="09cc28e5418b1d3a038377dba820b038755baa7ae453969357f866889ebbeb9243c5bc73c09d2450723f3bd3ab0f10cb063ef8b56668d84d141f3f4749e10a8716bb031da96e37580affb4780b19ea73fb4dcdd415455b0fa597c3f8425532fbd7f523f142d037ffab3a53899941de05a5a2c044cc9eddc300f30ff6838c68e4e1946706591bce8a0793d3b756522cf289a4986c0de2e45391c2687c20aea66edf0e5b742eeb5c6fe474d878d05359", 0xaf) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000600)) r4 = getpgrp(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000640)='gid_map\x00') getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000680)={0x0, 0x20, 0x1, [0x7]}, &(0x7f00000006c0)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000700)={r6, 0x23, "bdbf0d64a9136a06542f708e9bd7572269785ba17ac17a6314b22b95f49536c4245bd2"}, &(0x7f0000000740)=0x2b) getsockopt$inet_int(r2, 0x0, 0xf, &(0x7f0000000780), &(0x7f00000007c0)=0x4) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000800)={0x4, 0x30323953, 0x3, @stepwise={0x7fffffff, 0x6, 0x80000000, 0x200, 0x0, 0x1f}}) ftruncate(r1, 0x2) ioctl$KDSIGACCEPT(r5, 0x4b4e, 0x14) r7 = syz_open_dev$cec(&(0x7f0000000840)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r5, 0x6, 0x21, &(0x7f0000000880)="960de43b3d7d8f2a5f4b68bbcf0717ba", 0x10) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f00000008c0)={[{0x4, 0x80000000000, 0x7fffffff, 0x1, 0xff, 0xffffffff, 0xe0, 0x30140a95, 0x7, 0xfff, 0x67a, 0x5, 0x7fff}, {0x9, 0x100000001, 0xffffffff80000000, 0x7, 0xf21, 0x5, 0x7ff, 0xfffffffffffffffe, 0x6, 0x69e7, 0xf, 0xffffffff80000001, 0x3}, {0x1, 0x2, 0x0, 0x3, 0x6, 0x5, 0x6, 0xf0fc, 0x4c3d, 0x905, 0x1ff, 0x73d, 0x4}], 0x10000}) getsockopt$netlink(r7, 0x10e, 0xa, &(0x7f0000000940)=""/118, &(0x7f00000009c0)=0x76) ioctl$TIOCSCTTY(r2, 0x540e, 0xfffffffffffffff7) 20:35:22 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x6, 0x8800) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r1, 0x402, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa95d}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffffffc0}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000004}, 0x4040) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020200020e000000000000000000000005000600000000000a0000000000000000000000000000000000000000af23a40117c178b2ce59e3361e00000000000000000000000200010000000000000000000000000005000500000000000a00000000000000ff01000400000000000000000000000100004d5daf1a0000"], 0x70}}, 0x0) [ 340.274189] IPVS: ftp: loaded support on port[0] = 21 [ 340.436378] chnl_net:caif_netlink_parms(): no params data found [ 340.516989] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.523739] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.532276] device bridge_slave_0 entered promiscuous mode [ 340.543921] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.550503] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.559250] device bridge_slave_1 entered promiscuous mode [ 340.599638] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 340.611701] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 340.648392] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 340.657279] team0: Port device team_slave_0 added [ 340.666461] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 340.675324] team0: Port device team_slave_1 added [ 340.681666] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 340.693461] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 340.767505] device hsr_slave_0 entered promiscuous mode [ 340.882789] device hsr_slave_1 entered promiscuous mode 20:35:24 executing program 2: futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) 20:35:24 executing program 1: r0 = userfaultfd(0x4000080800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000200)) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{}], 0x20000000000000dc, 0x0, 0x0, 0xfffffffffffffddf) 20:35:24 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x6, 0x8800) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r1, 0x402, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa95d}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffffffc0}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000004}, 0x4040) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020200020e000000000000000000000005000600000000000a0000000000000000000000000000000000000000af23a40117c178b2ce59e3361e00000000000000000000000200010000000000000000000000000005000500000000000a00000000000000ff01000400000000000000000000000100004d5daf1a0000"], 0x70}}, 0x0) [ 341.045984] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 341.065344] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 341.117037] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.123793] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.130973] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.137616] bridge0: port 1(bridge_slave_0) entered forwarding state 20:35:24 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000040)={0x20, 0x0, 0x4, {0x3, 0x4, 0x200, 0xfffffffffffffffd}}, 0x20) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f00000004c0)={0x1, {&(0x7f0000000740)=""/24, 0xfffffffffffffed9, &(0x7f0000000780)=""/101, 0x0, 0x2}}, 0x68) 20:35:24 executing program 1: r0 = socket$inet(0x15, 0x80005, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000000)={@broadcast, @multicast2, @empty}, 0xc) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="580000000000010000000600000036320f69bf01000000858d767ce525e770fa6129377108a727461d303f1c19b711d3000029ea40771d03f50b7e9ac71ca5040000005b14d96a0100009a9ef8a39a3c72e40f629594003b35dbff8f168c3c291e099a0000000000000000"], 0x58}, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000100)={'filter\x00', 0x0, 0x4, 0xd3, [], 0x8, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000200)=""/211}, &(0x7f0000000180)=0x78) [ 341.282588] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 341.288948] 8021q: adding VLAN 0 to HW filter on device bond0 [ 341.306870] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 341.369374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 341.393355] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.408752] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.431116] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 341.467225] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 341.473490] 8021q: adding VLAN 0 to HW filter on device team0 20:35:24 executing program 1: r0 = socket$inet(0x15, 0x80005, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000000)={@broadcast, @multicast2, @empty}, 0xc) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="580000000000010000000600000036320f69bf01000000858d767ce525e770fa6129377108a727461d303f1c19b711d3000029ea40771d03f50b7e9ac71ca5040000005b14d96a0100009a9ef8a39a3c72e40f629594003b35dbff8f168c3c291e099a0000000000000000"], 0x58}, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000100)={'filter\x00', 0x0, 0x4, 0xd3, [], 0x8, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000200)=""/211}, &(0x7f0000000180)=0x78) [ 341.510107] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 341.517814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 341.526682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 341.535495] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.542144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 341.616013] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 341.642527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 341.651349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 341.659788] bridge0: port 2(bridge_slave_1) entered blocking state 20:35:24 executing program 0: process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f00000000c0)=0x7, 0x4) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) [ 341.666358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.691093] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 341.719534] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 341.752430] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 341.761735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 341.771211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 341.781529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 341.790808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 341.811521] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready 20:35:24 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x14104a, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) remap_file_pages(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f000000a000/0x3000)=nil) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x16, 0x4) remap_file_pages(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) [ 341.843881] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 341.857830] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 341.892513] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 341.902482] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 341.914271] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 341.927311] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 341.935702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 20:35:25 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$sock_int(r1, 0x1, 0x28, &(0x7f0000000040)=0x3f, 0x4) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f00000000c0)={{0xa, 0x4e22, 0xffffffffffffffc1, @local}, {0xa, 0x4e24, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, 0xd5, [0x4, 0x400, 0x3f, 0x0, 0x33e4, 0x4, 0x3, 0x1]}, 0x5c) syz_emit_ethernet(0xfffffffffffffe68, &(0x7f0000000200)={@link_local={0x1, 0x80, 0xc2, 0x3a}, @random="a90277621ff1", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @multicast1}, @icmp=@address_reply}}}}, 0x0) 20:35:25 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, 0x0, &(0x7f00000000c0)=0x2, 0x0) [ 341.944848] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 341.953768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 341.962626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 341.971684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 341.980229] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 342.047271] mmap: syz-executor.1 (11817) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 342.065357] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 342.106026] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 342.158353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 342.183049] protocol 88fb is buggy, dev hsr_slave_0 [ 342.188923] protocol 88fb is buggy, dev hsr_slave_1 20:35:25 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000080)={{0x0, 0x1ff}, 'port1\x00'}) geteuid() 20:35:25 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, 0x0, &(0x7f00000000c0)=0x2, 0x0) 20:35:25 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0) 20:35:25 executing program 0: r0 = inotify_init1(0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$admmidi(&(0x7f0000001600)='/dev/admmidi#\x00', 0x1000, 0x2000) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000001640)={0x5, 0x3, 0x7, 0x200}, 0x8) preadv(r0, &(0x7f0000001680)=[{&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000100)=""/105, 0x69}, {&(0x7f0000000180)=""/83, 0x53}, {&(0x7f0000000200)=""/11, 0xb}, {&(0x7f0000000240)=""/6, 0x6}, {&(0x7f0000000280)=""/66, 0x3e}, {&(0x7f0000000300)=""/231, 0xe7}, {&(0x7f0000000400)=""/138, 0x8a}, {&(0x7f00000004c0)=""/73, 0x49}, {&(0x7f0000000540)=""/4096, 0x11e0}], 0xa, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x200000000000001a, 0x100000001) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0xc00, 0x0) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f0000000040)=0x4) 20:35:25 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, 0x0, &(0x7f00000000c0)=0x2, 0x0) 20:35:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x14}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 20:35:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='veth1_to_bridge\x00', 0x172) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x4, 0x400) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000140)={0xfffffffffffff800, 0xbff, &(0x7f00000001c0)="048197c1d233bdd7aea282088acca1cfa77d4f8c588f990443b25ad4cdae70842cebb99b5a49d990bd3f30db97017aa82862c43c185d6259d1f09f7dde8be8f78091164e585df6802a792b65ff41ac4f17a5de2063996f60519c4a823c8bc5683ad3fc4254e926903501668a01a38d9aa8a1769776bf09c728f1840ec80d9331a32af584eb3837f56b0c4e90c5adacc2e916", &(0x7f0000000100)="95fe541cf56828682c7ef6e878e56f2466ebf41f9af96d", 0x92, 0x17}) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) tee(r0, r0, 0x3ff, 0x8) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000000)=0x10001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:35:25 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000dae000/0x4000)=nil, 0x4000) 20:35:25 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) 20:35:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x14}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 20:35:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000005e40), 0x0, 0x20000000) setsockopt$inet6_int(r0, 0x29, 0x30, &(0x7f00000001c0), 0x4027) 20:35:26 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) 20:35:26 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x82, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup(r0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0xee72) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) sendfile(r2, r3, 0x0, 0x8000fffffffe) 20:35:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x14}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 20:35:26 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) 20:35:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="31000000130009006900000000000010ab008048130000004600010700000014080003c025640000000003f50000000000", 0x31}], 0x1) 20:35:26 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) [ 343.571336] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 343.580477] 0: renamed from caif0 20:35:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x14}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 20:35:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8400, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\t\x00\x00\x00\xeb\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000480)={0x2000017d, &(0x7f0000000180)=[{}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={'lo\x00', 0x200}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) 20:35:26 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='status\x00') getpeername$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000200)=[0x0, r1, r2]) r3 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r3}) 20:35:26 executing program 2 (fault-call:0 fault-nth:0): futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) [ 343.998342] FAULT_INJECTION: forcing a failure. [ 343.998342] name fail_futex, interval 1, probability 0, space 0, times 1 [ 344.010034] CPU: 0 PID: 11899 Comm: syz-executor.2 Not tainted 5.0.0-rc1+ #9 [ 344.017270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.026660] Call Trace: [ 344.029335] dump_stack+0x173/0x1d0 [ 344.033029] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 344.038284] should_fail+0xa19/0xb20 [ 344.042080] get_futex_key+0x2e8/0x1ca0 [ 344.046148] futex_requeue+0x472/0x5170 [ 344.050191] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 344.055447] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 344.060978] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 344.066246] do_futex+0xb45/0x6ab0 [ 344.069871] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 344.075134] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 344.080560] ? fsnotify+0x2092/0x20a0 [ 344.084431] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 344.089865] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 344.095121] ? __msan_poison_alloca+0x1f0/0x2a0 [ 344.099855] ? __x64_sys_futex+0x6e/0x90 [ 344.103978] __se_sys_futex+0x43d/0x7f0 [ 344.108017] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 344.113284] ? syscall_return_slowpath+0xb2/0x650 [ 344.118202] __x64_sys_futex+0x6e/0x90 [ 344.122148] do_syscall_64+0xbc/0xf0 [ 344.125940] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 344.131179] RIP: 0033:0x457e29 20:35:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x14}}, 0x0) [ 344.134429] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 344.153376] RSP: 002b:00007f50c087bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 344.161139] RAX: ffffffffffffffda RBX: 00007f50c087bc90 RCX: 0000000000457e29 [ 344.168459] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000020000000 [ 344.175769] RBP: 000000000073bf00 R08: 00000000200000c0 R09: 0000000000000000 [ 344.183089] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f50c087c6d4 [ 344.190422] R13: 00000000004be69a R14: 00000000004cf228 R15: 0000000000000003 20:35:27 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)={0x2, 0x400000000000003, 0x0, 0x5, 0x12, 0x0, 0x70bd2b, 0x0, [@sadb_ident={0x2, 0xa, 0x2, 0x0, 0x7fffffff}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e24, 0x9, @mcast1, 0x20}}]}, 0x90}}, 0x4040800) 20:35:27 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x8000000004e20}, 0x1c) listen(r0, 0xa) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x80100, 0x102) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x100000000, 0x4) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x84, r5, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc326}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x367f3762}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20004054}, 0x1) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x14}}, {0xa, 0x4e24, 0x9, @remote, 0xd7ef}, 0x81, [0x5, 0x4, 0x7, 0xc3, 0x3, 0x80000000, 0x1, 0x401]}, 0x5c) connect(r3, &(0x7f0000000000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) listen(r3, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000380), 0x1, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x1, 0x400) 20:35:27 executing program 2 (fault-call:0 fault-nth:1): futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) 20:35:27 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x14}}, 0x0) 20:35:27 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x8, &(0x7f0000000000), &(0x7f0000000080)=0xffffffffffffff68) r1 = shmget(0x0, 0x1000, 0x1, &(0x7f0000ffb000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x4022) shmdt(r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x30042, 0x0) connect$tipc(r3, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0xdfda2f6c62d0f736, {0x0, 0x1, 0x1}}, 0x10) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x13, r3, 0x0) getpid() timer_create(0x6, &(0x7f0000000100)={0x0, 0x1c, 0x7, @tid=0xffffffffffffffff}, &(0x7f0000000180)=0x0) timer_getoverrun(r4) 20:35:27 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x14}}, 0x0) 20:35:27 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000040)=""/91, 0x5b) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udplite\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x8, 0x0, 0x10000, 0x200}) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000001c0), &(0x7f0000000240)=0x68) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000100)={r2, 0x8}) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000280)="d32af34068d90732a15fd0a1ff106fd150b9af267557743ef2f2163fe1423c07ac8ab1801f7438d6") [ 344.823014] FAULT_INJECTION: forcing a failure. [ 344.823014] name fail_futex, interval 1, probability 0, space 0, times 0 [ 344.834707] CPU: 0 PID: 11928 Comm: syz-executor.2 Not tainted 5.0.0-rc1+ #9 [ 344.841935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.851322] Call Trace: [ 344.853982] dump_stack+0x173/0x1d0 [ 344.857674] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 344.862926] should_fail+0xa19/0xb20 [ 344.866731] get_futex_key+0x3f8/0x1ca0 [ 344.870790] futex_requeue+0x472/0x5170 [ 344.874817] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 344.880073] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 344.885598] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 344.890947] do_futex+0xb45/0x6ab0 [ 344.894568] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 344.899819] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 344.905238] ? fsnotify+0x2092/0x20a0 [ 344.909114] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 344.914543] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 344.919803] ? __msan_poison_alloca+0x1f0/0x2a0 [ 344.924541] ? __x64_sys_futex+0x6e/0x90 [ 344.928665] __se_sys_futex+0x43d/0x7f0 [ 344.932727] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 344.937988] ? syscall_return_slowpath+0xb2/0x650 [ 344.942902] __x64_sys_futex+0x6e/0x90 [ 344.946847] do_syscall_64+0xbc/0xf0 [ 344.950686] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 344.955933] RIP: 0033:0x457e29 20:35:28 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10000000000) ftruncate(r0, 0x25) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video37\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e21, 0x9e9, @remote, 0x2}}, 0x5, 0x5, 0x7fff, 0x6}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000180)={r1, 0x5}, 0x8) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x10001, 0x5}) lseek(r0, 0x0, 0x80000000000003) 20:35:28 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x14}}, 0x0) [ 344.959207] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 344.978154] RSP: 002b:00007f50c087bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 344.985921] RAX: ffffffffffffffda RBX: 00007f50c087bc90 RCX: 0000000000457e29 [ 344.993234] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000020000000 [ 345.000546] RBP: 000000000073bf00 R08: 00000000200000c0 R09: 0000000000000000 [ 345.007858] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f50c087c6d4 [ 345.015168] R13: 00000000004be69a R14: 00000000004cf228 R15: 0000000000000003 20:35:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f00000000c0)={0x4000000, 0x8, 0x27}) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000), 0xc, &(0x7f00008b7ff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000000001010000000000ffffffff02000000100002000c000100050002000000000026154f9b5b0bf064850375c71b7f91d8ffcadde87c7181cccc85226709bdf6c9a3052eba1d3f8d2ddd461b565c0ad09337b5fd845d8856924ddf975a61f869f4cd9d1ee0e3d375f7403a32ef59a4698325498f184cf3b34c46fe3f4c0478dc33"], 0x24}}, 0x0) 20:35:28 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x14}}, 0x0) 20:35:28 executing program 2 (fault-call:0 fault-nth:2): futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) 20:35:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, &(0x7f0000000240), &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) getpeername$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) [ 345.320872] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 20:35:28 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x14}}, 0x0) 20:35:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x10202, 0x1, 0x10000, 0x1000, &(0x7f000000b000/0x1000)=nil}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f000000a000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 345.505307] FAULT_INJECTION: forcing a failure. [ 345.505307] name fail_futex, interval 1, probability 0, space 0, times 0 [ 345.516980] CPU: 1 PID: 11950 Comm: syz-executor.2 Not tainted 5.0.0-rc1+ #9 [ 345.524216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.533736] Call Trace: [ 345.536400] dump_stack+0x173/0x1d0 [ 345.540096] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 345.545376] should_fail+0xa19/0xb20 [ 345.549174] get_futex_key+0x1582/0x1ca0 [ 345.553327] futex_requeue+0x472/0x5170 [ 345.557372] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 345.562630] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 345.568159] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 345.573446] do_futex+0xb45/0x6ab0 [ 345.577089] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 345.582345] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 345.587763] ? fsnotify+0x2092/0x20a0 [ 345.591641] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 345.597081] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 345.602343] ? __msan_poison_alloca+0x1f0/0x2a0 [ 345.607086] ? __x64_sys_futex+0x6e/0x90 [ 345.611210] __se_sys_futex+0x43d/0x7f0 [ 345.615241] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 345.620487] ? syscall_return_slowpath+0xb2/0x650 [ 345.625394] __x64_sys_futex+0x6e/0x90 [ 345.629328] do_syscall_64+0xbc/0xf0 [ 345.633106] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 345.638420] RIP: 0033:0x457e29 [ 345.641660] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.660617] RSP: 002b:00007f50c087bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 345.668382] RAX: ffffffffffffffda RBX: 00007f50c087bc90 RCX: 0000000000457e29 [ 345.675695] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000020000000 [ 345.683000] RBP: 000000000073bf00 R08: 00000000200000c0 R09: 0000000000000000 [ 345.690303] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f50c087c6d4 [ 345.697620] R13: 00000000004be69a R14: 00000000004cf228 R15: 0000000000000003 20:35:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000), 0x4) 20:35:28 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x14}}, 0x0) 20:35:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000080)=""/29, &(0x7f00000000c0)=0x1d) r1 = socket(0xc, 0xa, 0x8) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000001600)='TIPC\x00') prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000016c0)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001680)={&(0x7f0000001640)={0x1c, r2, 0x400, 0x70bd2d, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000811) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000100)={0x2, 0x0, [0x3ff, 0xb26, 0x0, 0x800, 0x0, 0x8, 0x5, 0xffff]}) 20:35:29 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x20000000001007f3, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000100)={0x39}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x1, 0x2) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000380)) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 20:35:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) 20:35:29 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x81, 0x101602) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000240)={0x400, 0x6, 0x1, 0x9, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}]}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r2, 0x29, 0x1, &(0x7f0000000040), &(0x7f0000013000)=0x4) close(r0) 20:35:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) 20:35:29 executing program 2 (fault-call:0 fault-nth:3): futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) [ 346.480700] FAULT_INJECTION: forcing a failure. [ 346.480700] name fail_futex, interval 1, probability 0, space 0, times 0 [ 346.492469] CPU: 1 PID: 11987 Comm: syz-executor.2 Not tainted 5.0.0-rc1+ #9 [ 346.499710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.509110] Call Trace: [ 346.511797] dump_stack+0x173/0x1d0 [ 346.515587] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 346.520839] should_fail+0xa19/0xb20 [ 346.524739] get_futex_key+0x2e8/0x1ca0 [ 346.528806] futex_requeue+0x5e8/0x5170 [ 346.532848] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 346.538107] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 346.543741] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 346.549011] do_futex+0xb45/0x6ab0 [ 346.552643] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 346.557907] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 346.563329] ? fsnotify+0x2092/0x20a0 [ 346.567224] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 346.572657] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 346.577920] ? __msan_poison_alloca+0x1f0/0x2a0 [ 346.582665] ? __x64_sys_futex+0x6e/0x90 [ 346.586801] __se_sys_futex+0x43d/0x7f0 [ 346.590851] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 346.596117] ? syscall_return_slowpath+0xb2/0x650 [ 346.601037] __x64_sys_futex+0x6e/0x90 [ 346.604985] do_syscall_64+0xbc/0xf0 [ 346.608789] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 346.614022] RIP: 0033:0x457e29 20:35:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) [ 346.617283] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 346.636238] RSP: 002b:00007f50c087bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 346.644007] RAX: ffffffffffffffda RBX: 00007f50c087bc90 RCX: 0000000000457e29 [ 346.651329] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000020000000 [ 346.658646] RBP: 000000000073bf00 R08: 00000000200000c0 R09: 0000000000000000 [ 346.666070] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f50c087c6d4 [ 346.673385] R13: 00000000004be69a R14: 00000000004cf228 R15: 0000000000000003 20:35:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 20:35:29 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x284, 0x501d00) connect$l2tp(r0, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x2, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x8) write$UHID_INPUT2(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0c0000b93507d9fdf466b76a4b420000000000000000682a7db80625ed02f89caa0681f4a034aa253f9584c59b19c12b60b69d41ccbf3d69e0dd96dc5043f8c9de9447b0"], 0x44) 20:35:29 executing program 2 (fault-call:0 fault-nth:4): futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) [ 346.935778] FAULT_INJECTION: forcing a failure. [ 346.935778] name fail_futex, interval 1, probability 0, space 0, times 0 [ 346.947405] CPU: 1 PID: 12001 Comm: syz-executor.2 Not tainted 5.0.0-rc1+ #9 [ 346.954644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.964040] Call Trace: [ 346.966714] dump_stack+0x173/0x1d0 [ 346.970413] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 346.975666] should_fail+0xa19/0xb20 [ 346.979472] get_futex_key+0x3f8/0x1ca0 20:35:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 346.983536] futex_requeue+0x5e8/0x5170 [ 346.987592] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 346.992849] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 346.998377] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 347.003642] do_futex+0xb45/0x6ab0 [ 347.007275] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 347.012531] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 347.017960] ? fsnotify+0x2092/0x20a0 [ 347.021833] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 347.027269] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 347.032522] ? __msan_poison_alloca+0x1f0/0x2a0 [ 347.037271] ? __x64_sys_futex+0x6e/0x90 [ 347.041393] __se_sys_futex+0x43d/0x7f0 [ 347.045431] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 347.050685] ? syscall_return_slowpath+0xb2/0x650 [ 347.055620] __x64_sys_futex+0x6e/0x90 [ 347.059569] do_syscall_64+0xbc/0xf0 [ 347.063357] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 347.068595] RIP: 0033:0x457e29 20:35:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x111201, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x20000000, 0x2000, &(0x7f0000000000/0x2000)=nil}) [ 347.071841] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.090789] RSP: 002b:00007f50c087bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 347.098559] RAX: ffffffffffffffda RBX: 00007f50c087bc90 RCX: 0000000000457e29 [ 347.105870] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000020000000 [ 347.113192] RBP: 000000000073bf00 R08: 00000000200000c0 R09: 0000000000000000 [ 347.120503] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f50c087c6d4 [ 347.127824] R13: 00000000004be69a R14: 00000000004cf228 R15: 0000000000000003 20:35:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000940)='./file0\x00', 0x42040, 0x8) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cachefiles\x00', 0x444c80, 0x0) syz_open_procfs(0x0, &(0x7f00000009c0)='attr/prev\x00') r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/rfkill\x00', 0x240, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4000000004001ff) r4 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r4, &(0x7f0000001640), 0x10) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000a40)={0xf, "6c7e06fd6d0137bbbd03c62a2cbd3c"}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) fstat(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f00000005c0)=0xc) fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000680)=0x0, &(0x7f00000006c0), &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getegid() fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {0x1, 0x4}, [{0x2, 0x0, r5}, {0x2, 0x5, r6}, {0x2, 0x1, r7}, {0x2, 0x2, r8}, {0x2, 0x2, r9}, {0x2, 0x7, r10}, {0x2, 0x0, r11}, {0x2, 0x2, r12}, {0x2, 0x6, r13}, {0x2, 0x1, r14}], {0x4, 0x7}, [{0x8, 0x7, r15}], {0x10, 0x7}, {0x20, 0x3}}, 0x7c, 0x1) setsockopt(r4, 0x65, 0xfffffffffffffffd, &(0x7f0000000100)="92a88ed40ca365e96b138d573ae703afe0680a8d7ef762f39fd5f790ffffffdf137dc737f5953735c9e86297d2a3cbc679e5a12ea1e14a8b68f6cdcd62e119311b04ba5e0effc1dd46fbba8099ea73aa23f5de9a0523e61fafb03fe7682d9ce61c0450032e369ce18a7ea3bd10e75a4efdecd23143c9bd8d", 0x78) 20:35:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 20:35:30 executing program 2 (fault-call:0 fault-nth:5): futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) 20:35:30 executing program 0: r0 = socket(0x10, 0x10000000000003, 0x0) socket$inet6(0xa, 0x0, 0x6) write(r0, &(0x7f00000001c0)="26000000130046f10701c1b00ef900000700000000ffffdf09ef18ffff000700000009000000", 0x26) socketpair(0xb, 0x1, 0x4, &(0x7f0000000040)) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000080)=0x384d, 0x4) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000)=0x6, 0x4) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) ioctl$PPPIOCDISCONN(r1, 0x7439) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x400, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000200)={0x0, 0x0, @ioapic={0x7000, 0x3, 0x9, 0x2, 0x0, [{0x100000001, 0x3ff, 0x9, [], 0x80}, {0x1ff, 0x6, 0x0, [], 0x101}, {0x8, 0x0, 0x100000001, [], 0x20}, {0x7fffffff, 0x4, 0x80000000, [], 0x3}, {0x20, 0x7fffffff, 0x6, [], 0xff}, {0x7, 0xfff, 0x1, [], 0x10001}, {0x200, 0x9, 0x4, [], 0x7}, {0x4, 0xfff, 0x8000}, {0x8000, 0x109, 0x4, [], 0x7}, {0x3f, 0x6, 0x1ff, [], 0xffffffff80000001}, {0x5, 0xa4, 0x2, [], 0x5}, {0x7, 0x3, 0x7, [], 0xa000}, {0x8, 0x9, 0x8, [], 0x100000}, {0x10001, 0x7fff, 0x138, [], 0x7}, {0x691, 0xc8f7, 0x2, [], 0x9}, {0x58da, 0x2, 0xffffffff, [], 0x6}, {0x6, 0xffffffffffffff16, 0x2, [], 0x1000}, {0x1ff, 0x9, 0x7fffffff, [], 0x8230}, {0x6, 0x7, 0x63}, {0x7, 0x5eb, 0x7fffffff, [], 0x4}, {0xffffffffffffffff, 0x1, 0x81, [], 0xffffffffffffffff}, {0x10001, 0xfff, 0x200, [], 0x100}, {0x1, 0xffffffff, 0x8, [], 0x7fffffff}, {0x8000, 0xfffffffffffffffc, 0x9d35, [], 0x1}]}}) recvmsg(r0, &(0x7f0000f95fd7)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x80806, 0x5d) [ 347.479335] FAULT_INJECTION: forcing a failure. [ 347.479335] name fail_futex, interval 1, probability 0, space 0, times 0 [ 347.490926] CPU: 0 PID: 12020 Comm: syz-executor.2 Not tainted 5.0.0-rc1+ #9 [ 347.498153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.507533] Call Trace: [ 347.510224] dump_stack+0x173/0x1d0 [ 347.513919] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 347.519171] should_fail+0xa19/0xb20 [ 347.522963] get_futex_key+0x1582/0x1ca0 [ 347.527124] futex_requeue+0x5e8/0x5170 [ 347.531163] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 347.536528] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 347.542060] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 347.547326] do_futex+0xb45/0x6ab0 [ 347.550959] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 347.556229] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 347.561652] ? fsnotify+0x2092/0x20a0 [ 347.565532] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 347.570975] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 347.576232] ? __msan_poison_alloca+0x1f0/0x2a0 [ 347.580966] ? __x64_sys_futex+0x6e/0x90 [ 347.585092] __se_sys_futex+0x43d/0x7f0 [ 347.589151] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 347.594411] ? syscall_return_slowpath+0xb2/0x650 [ 347.599328] __x64_sys_futex+0x6e/0x90 [ 347.603274] do_syscall_64+0xbc/0xf0 [ 347.607078] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 347.612314] RIP: 0033:0x457e29 20:35:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 347.615562] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.634604] RSP: 002b:00007f50c087bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 347.642368] RAX: ffffffffffffffda RBX: 00007f50c087bc90 RCX: 0000000000457e29 [ 347.649677] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000020000000 [ 347.657024] RBP: 000000000073bf00 R08: 00000000200000c0 R09: 0000000000000000 [ 347.664339] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f50c087c6d4 [ 347.671651] R13: 00000000004be69a R14: 00000000004cf228 R15: 0000000000000003 20:35:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) unshare(0x20400) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x1a) 20:35:30 executing program 2 (fault-call:0 fault-nth:6): futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) 20:35:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 20:35:31 executing program 2: futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7f, 0x101400) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000140)={0x1, 0x69, "a32847b6a626348806666cefa399e67778248e829f7ea0f76d1f8d618ee1e59f962fd7f96689c05c022489ed2b01993822543ff3aefd02681f76bea087b5d4ebcac922b663791537cabace1fe977f6598b321a737db29da087dff3811d78accca50e0061dd626ffc4d"}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14, 0x67, 0x1, {0x20, 0x2, 0x6}}, 0x14) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x2, 0x0) 20:35:31 executing program 0: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000001000000010000000300000004000000"], 0x18}, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200040, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'netdevsim0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000300)={'vcan0\x00', r4}) 20:35:31 executing program 3: unshare(0x20400) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000080)={0x7966, 0x8, 0x6, 0x6610, 0x2, 0x3}) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r1, 0xfffffffffffffffc, 0x0) 20:35:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 20:35:31 executing program 2: futex(&(0x7f0000000000)=0x2, 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) 20:35:31 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x0, 0x0, {0x5, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x801) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000080)=""/235) 20:35:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) 20:35:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) unshare(0x3ffffffc) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000000)=0x328, 0x4) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x40, 0x100) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000200)={0x5, 0x95d, r3, 0x0, r4, 0x0, 0xf3, 0x1}) 20:35:31 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x2, 0x101000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000180)={0x2, 0x0, 0x1, 0x8}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f00000001c0)={0x2, r2}) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="d4000000e95cc6b5c3d67d68f0f7c4302bb241a54c76706f07c71d4b3146aab55c9720dd8777fca3a09897a1c3ba50ccfa67233ef2f11eb789ba34d2f16ed2384144a8756ee9b9910bf49e39", @ANYRES16=r1, @ANYBLOB="120626bd7000fbdbdf250f00000008000400010001001800010014000300ff01000000000000000000000000000108000500030000002c00020008000600fcffffff080003000700000008000b000a00000008000600ffffffff080005003f0000000800050000090000080006000700000008000400400000000400010050000300080005007f00000108000500ac1414bb0800040001000000080008006800000008000800ff0000000800000000000005080003000100000014000600ff010000000000000000000000000001"], 0xd4}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) 20:35:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) 20:35:31 executing program 0: unshare(0x4000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) connect$netlink(r0, &(0x7f0000000100), 0x6) 20:35:31 executing program 3: socket$packet(0x11, 0x2, 0x300) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000001c0)={0x0, @bt={0x9, 0x400, 0x1, 0x1, 0x2, 0x1, 0x80000001, 0x0, 0x9, 0x5, 0x9, 0x4d, 0x100000001, 0x1000, 0x8, 0x1}}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x402, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000080)) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x3}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') 20:35:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) 20:35:32 executing program 0: unshare(0x8000400) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x7fffffff, 0x20000) getsockname(r0, &(0x7f0000000200)=@can={0x1d, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000300)={@dev={0xfe, 0x80, [], 0x1d}, 0x1e, r2}) r3 = mq_open(&(0x7f0000000000)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x6e93ebbbc80884f2, 0x0, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000140)={[{0xfc, 0x81, 0x8, 0x8, 0x2, 0x7, 0x400, 0x5, 0x5, 0xf4c, 0x5, 0x3, 0x1ff}, {0xf0, 0x7, 0x8, 0x6, 0x8, 0x3, 0x3, 0x5, 0xeb01, 0x9, 0x1f, 0x8, 0x6}, {0x8, 0x9, 0x100000000, 0x5, 0xa9, 0x10000, 0x6, 0x7, 0x10001, 0xfffffffffffffffc, 0x5, 0xffffffffffffffff, 0x5}]}) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) ioctl$TCSBRK(r4, 0x5409, 0x9) mq_notify(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}) 20:35:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x1}}, 0x0) 20:35:32 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xd8, 0x90000) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x5000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r1, 0x310, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x24000000) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_CARRIER={0x8}]}, 0x28}}, 0x0) 20:35:32 executing program 0: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @remote, @dev}, 0xc) sendfile(r0, r2, 0x0, 0x14c) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000001c0)={'veth1_to_hsr\x00', 0x7}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="af000000fc2901c31942ab18739fae796aa991a01d1624ccd07f5209116c6a3fafdfedf984e7fa23c2667d130b47d4d863d45af16bbe51f49b9b6d5027869ef5cbdc29de5ae8a87b8f7944e3f2b29e2a130539c43e0f7fcba4c6a9ea20b9d451ffb2e2076fda87fc1f206da0f7d4d67641ef9b1abd4838b47fd4eb03d0577edc394709a54c965ffa0c2eadb1a9a330c36433fc7fd99c937b83557e6d3e935d286e8b1a00cd988480503a5db896088d930eeb720d8a9bd8"], &(0x7f0000000100)=0xb7) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r3, 0x8, 0x6, 0x8001}, 0x10) 20:35:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 349.389358] netlink: 'syz-executor.3': attribute type 33 has an invalid length. [ 349.452729] netlink: 'syz-executor.3': attribute type 33 has an invalid length. 20:35:32 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x141440, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000180)=[0x7]) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x2, 0x4e23, @empty}, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffc}) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x202041, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000100)={0x2c, @loopback, 0x4e20, 0x2, 'lblcr\x00', 0xa, 0xfff, 0x7a}, 0x2c) 20:35:32 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f00000001c0)=0x80000000) connect$can_bcm(r0, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "388dbba2b150d176"}}, 0x48}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005d40)={'vcan0\x00', 0x0}) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000240)={0x11, 0x1, 0x7}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x20000108}}, 0x0) close(r0) 20:35:32 executing program 3: capset(&(0x7f00000fc000)={0x1998032e}, &(0x7f000047efe8)) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='\n']}) 20:35:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x1}}, 0x0) 20:35:32 executing program 2: getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) r2 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480), 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r2, r3, r4) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000100)={0x40003, 0x0, [0x7ff, 0x8001, 0x8000, 0xffff, 0x100000001, 0x3, 0x401, 0x8]}) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) r5 = gettid() getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x2}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000300)={r6, 0x7, 0x71ce}, 0x8) wait4(r5, &(0x7f0000000180), 0x8, &(0x7f00000001c0)) 20:35:33 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x800, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000200)) readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001500)=""/4096, 0x1002}], 0x1) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, 0x0) readv(r0, &(0x7f0000000c00)=[{&(0x7f0000000a80)=""/182, 0xb6}], 0x1) 20:35:33 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000200)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000600)={0x0, @broadcast, @loopback}, &(0x7f0000000640)=0xc) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000680)={r3, @remote, @empty}, 0xc) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f00000001c0)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20020000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r5, 0x808, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x801) ioctl$sock_SIOCETHTOOL(r4, 0x8970, &(0x7f0000000040)={'veth1_to_bond:\x00', 0x0}) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f00000006c0)={'filter\x00', 0x7, 0x4, 0x480, 0x258, 0x258, 0x0, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000080), {[{{@arp={@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x9, 0x0, 0xffffffff, @empty, {[0x0, 0xff, 0x0, 0xff, 0x0, 0xff]}, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, {[0x0, 0xff, 0xff]}, 0x1, 0x4, 0x100, 0x8, 0x8000, 0x1, 'syz_tun\x00', 'tunl0\x00', {0xff}, {0xff}, 0x0, 0x1}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="510d2d02f5cb", @empty, @empty, @loopback, 0xc, 0xffffffff}}}, {{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0xc43a}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @dev={0xac, 0x14, 0x14, 0x1b}, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xf, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) close(r4) close(r1) [ 350.028861] QAT: Invalid ioctl 20:35:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c"], 0x1}}, 0x0) [ 350.090869] QAT: Invalid ioctl 20:35:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c"], 0x1}}, 0x0) 20:35:33 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x10000, 0x0) r1 = dup2(0xffffffffffffffff, r0) write$P9_RVERSION(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff050000008000000000da5032303030ae4c6535742060f2d7c109dadcffffffffba7cf4cb97a61aaeab9565eb9973f5dd3c40f75a13d5642b743ecda5e4a9939397e39d2375abcc8702000000ab4388b0b9217bb82fecd1620595"], 0x15) ioperm(0x5, 0x9, 0xc848) 20:35:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$inet(0x2, 0x2, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6, 0x10031, 0xffffffffffffffff, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000040)="071f080000000000970600c6fe76cff3e26def23000200000811000013", 0x1d) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x44000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r1) r3 = mmap$binder(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x2000000, 0x182130, r2, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000100)={0x58, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0d630000056304400200000009631040", @ANYRES64=r3, @ANYBLOB="0100000867524702000000000000000563044000000003586272fc3c8fde4245fddccea5de0c420200000001000000000000000000007a085e8be3d46b49590000000000003fef9953b6d5dcd19d38f183ae07a45a42acfa0a6b0f3669dd1f18dcdb6744e1c6fd530582fa94f91e182baf6bce40ca259860384d3673bed211ae48b8cf51049d0778517b5dae3e5075c1df2d6a15faafff6a813bad439123a903d395cc57a147032c5ff2741bda085c5a22dfebfcb53a0afc6e7a3a297134857a7c1adfa7a23e5199246cfdf5f02a8609f37f2021d18993440a36c06693246be194a0ea8338f806e7ba7ee06c7ed2d1a6f5ce5a91"], 0x9c, 0x0, &(0x7f0000000200)="f50c9a42dadbdbf9b2e66252b661049c56439c65f1df53db4c8aa93551870477c0c68efc238bc1838e72ee8fa9a86a7be5ea2d4b3ab462121a2048a94638281d67a11d71721e4593bfb70daa9547287a9702e18196e4c92ddf7b6b955ae8c7b28fb70c9fcf98e7880edc161bf11161c17b99a5f1f2af0e2aef225a68eb41ae56026b65593e207eefe7d42661db72e4aeb468f163698dc1988eb3872a"}) getsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000001000)=""/4096, &(0x7f00000001c0)=0x1000) 20:35:33 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x42180, 0x0) futex(&(0x7f0000000080), 0x6, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) 20:35:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) set_mempolicy(0x3, &(0x7f0000000640)=0xffffffff, 0x4) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000140)={'team_slave_1\x00', 0x8}) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000004c0)="d3", 0x1}], 0x1}], 0x1, 0x0) 20:35:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c"], 0x1}}, 0x0) [ 350.636658] QAT: Invalid ioctl [ 350.679864] QAT: Invalid ioctl 20:35:33 executing program 2: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) futex(&(0x7f0000000080), 0x5, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000100)=0x80, 0x0) 20:35:33 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xf6) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000380)=""/42, 0xf0) fcntl$getflags(r0, 0x403) 20:35:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c29080000000000"], 0x1}}, 0x0) 20:35:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) set_mempolicy(0x3, &(0x7f0000000640)=0xffffffff, 0x4) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000140)={'team_slave_1\x00', 0x8}) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000004c0)="d3", 0x1}], 0x1}], 0x1, 0x0) 20:35:34 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0xa8000, 0x0) getsockopt$inet6_dccp_int(r0, 0x21, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000000c0)={{0x5, 0x7, 0x9, 0x8, 'syz1\x00', 0x100000001}, 0x0, [0x40, 0x4, 0x4, 0x9ef7, 0x3, 0x5, 0x8fa, 0x7, 0x200, 0x1000000000000, 0x6, 0x4, 0x1, 0xffffffffffff8001, 0x7, 0x6, 0x10001, 0x400, 0x0, 0x8, 0x1ff, 0x8, 0x0, 0x20, 0x2, 0x10001, 0x20, 0xffff, 0x2, 0xfff, 0x3a, 0x8001, 0x1ff, 0xa8e, 0xa37, 0x5, 0x400, 0x0, 0x6, 0xe2, 0xffffffffffff0b2a, 0x43, 0x7f, 0x1, 0x4, 0x10000, 0x6, 0x8, 0x401, 0x0, 0x0, 0x1f, 0x9, 0x2, 0xffffffffffff8001, 0xcc, 0x8, 0x5, 0xfffffffffffffff9, 0xffffffffffff8001, 0xfffffffffffffffc, 0x5478, 0x101, 0x6, 0x1c, 0x101, 0x9, 0x3, 0x3, 0x401, 0x80000000, 0x0, 0x80000001, 0x3ff, 0x8, 0x3f, 0x1, 0x8, 0x9, 0x9, 0x8, 0x7ff, 0x216, 0x7fff, 0x80, 0x44, 0x0, 0x5, 0x7ff, 0x0, 0x200, 0x0, 0x2, 0xfff, 0xb97a, 0xffffffff, 0x9, 0x2, 0x9, 0x1, 0x3, 0x101, 0x4, 0x5b293f25, 0x1b45, 0x3, 0x8, 0xfffffffffffffffa, 0x20, 0x6ae, 0x6, 0x9, 0x8, 0x5, 0x89f, 0x7ff, 0x3, 0x2, 0x5, 0x7, 0x1, 0x100000000, 0x9, 0x9, 0x7, 0x0, 0x9, 0x9], {0x0, 0x989680}}) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000640)={0x4, &(0x7f00000005c0)=[{}, {}, {}, {}]}) getpeername$tipc(r0, &(0x7f0000000680)=@id, &(0x7f00000006c0)=0x10) r1 = openat$cgroup_ro(r0, &(0x7f0000000700)='rdma.current\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000780)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000b00)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000ac0)={&(0x7f00000007c0)={0x2f0, r2, 0x2, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x26}}}, {0x14, 0x2, @in={0x2, 0x4e23, @rand_addr=0xa6}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth0\x00'}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x7, @local, 0x80}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x7, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x6}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x91}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA={0x60, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6255}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}]}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8e}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x800}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}]}]}, @TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @mcast1, 0x56a0ed33}}, {0x14, 0x2, @in={0x2, 0x4e24}}}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bridge_slave_0\x00'}}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1e1c60000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xb8b7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb0}]}]}, 0x2f0}}, 0x404c000) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000b40)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000bc0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000cc0)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c00)={0x44, r3, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x20}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2b}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x44000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000d00)={0x20000001}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000d40)='TIPCv2\x00') ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000d80)={0x7ab, 0x688, 0x7, 0x0, 0x0, [], [], [], 0x3, 0x8}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000ec0)={0x800, 0x201, 0x4, 0x2, 0x0}, &(0x7f0000000f00)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000f40)={r4, 0x40}, 0x8) ioctl$RTC_VL_CLR(r1, 0x7014) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000f80)=0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000fc0)={0x7}) timerfd_gettime(r0, &(0x7f0000001000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001140)={0xffffffffffffffff, r0, 0x0, 0xf, &(0x7f0000001100)='broadcast-link\x00'}, 0x30) perf_event_open(&(0x7f0000001080)={0x7, 0x70, 0x4, 0x7, 0x20, 0x7, 0x0, 0x524, 0x2080, 0x4, 0x1f, 0x1, 0x8, 0x3, 0x6, 0x401, 0x81, 0x4, 0x2, 0x20, 0x4, 0x1, 0x0, 0x8001, 0x9, 0x2, 0x1000, 0x0, 0x8, 0x0, 0x7, 0x5, 0x10001, 0x7, 0x0, 0xffff, 0x8, 0x20, 0x0, 0xfffffffffffffffc, 0x4, @perf_bp={&(0x7f0000001040), 0x1}, 0x12000, 0x8, 0x3, 0x8, 0x5, 0x0, 0x5}, r5, 0xe, r0, 0x1) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000001180)=0x3, 0x2) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f00000011c0)) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000001300)={0x2, 0x0, [{}, {}]}) r6 = add_key(&(0x7f0000001400)='.request_key_auth\x00', &(0x7f0000001440)={'syz', 0x0}, &(0x7f0000001480)="b7e371567ee79501cb55ac2b0436f41280e5f1c4e7672f03175d6864ed2c568d753a1077fd30dce590d4adb3e213011775f5797efd95f742e81bf106373cf289dd09d557ea03f4e348a2323a0dabd5bffaa0a610fdc5f6dbd41b07025752f87bb893d928d3224cb2e05907f68ee9dcd5292e0b492445d140ffb5ae5f71dca7ee4227cb98b710374c48da02", 0x8b, 0xffffffffffffffff) r7 = request_key(&(0x7f0000001340)='rxrpc\x00', &(0x7f0000001380)={'syz', 0x1}, &(0x7f00000013c0)='udp:syz0\x00', r6) keyctl$unlink(0x9, r6, r7) [ 351.022141] QAT: Invalid ioctl 20:35:34 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c29080000000000"], 0x1}}, 0x0) 20:35:34 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) 20:35:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1c0000000201030000aa4f4162dce150ac07000000000000", @ANYRES32=0x0], 0x1c}}, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc4400}, 0xc, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="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"], 0x4bc}, 0x1, 0x0, 0x0, 0x800}, 0xc000) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000000c0)={0x401, 0x5, 0x8, 0x0, 0x0, [{r0, 0x0, 0x2}, {r0, 0x0, 0x2}, {r0, 0x0, 0x200}, {r0, 0x0, 0x6}, {r0, 0x0, 0x1}, {r0}, {r0, 0x0, 0x5}, {r0, 0x0, 0x1}]}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x24000, 0x0) timerfd_create(0x8, 0x80800) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000240)) 20:35:34 executing program 0: unshare(0x2000400) r0 = creat(&(0x7f0000000480)='./file0\x00', 0x0) r1 = gettid() fcntl$setown(r0, 0x8, r1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x3, "16b58043b8692f32"}) ioctl$TIOCNXCL(r0, 0x540d) [ 351.260797] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 20:35:34 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c29080000000000"], 0x1}}, 0x0) 20:35:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="ee154ce9062cb24b002c07d98e4bc2be26ead1f3ea49e0ee803fbe9e77f1a112006ce2ed805c115f88ab1112c17e7fd2646f3da5f3fd0da88a62ef6c4270955bead5d98b307e10317509d1a137cec04c7dd957da3b5e56c4b64c7751613af5f02d08c4e8a0e8204782852f9cd7792a097f08b10eece39328873da103d4f3bbacaff285f61c233692ca9883026f054783ee1d9b08719d17fd8b95236a0388ea7d235ca29b8a1512206a432f9f509e509cf546aa5f414139e48a40d3f55bbb190e6990394cad7ccf670e83de3cd8be5572cac494c810dec2d326aa96f24a492656baa939609bbd741d82") open(&(0x7f0000000000)='./file0\x00', 0x803c, 0x0) lremovexattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)=@known='system.posix_acl_access\x00') 20:35:34 executing program 2: futex(&(0x7f00000001c0)=0x1, 0x2000000000000004, 0x0, &(0x7f0000000280)={0x77359400}, &(0x7f0000000240), 0x0) futex(&(0x7f0000000080)=0x1, 0x4, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000000140), 0x1) syz_genetlink_get_family_id$net_dm(&(0x7f0000000180)='NET_DM\x00') 20:35:34 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003"], 0x1}}, 0x0) 20:35:34 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000280)={0x9, @pix_mp={0x0, 0x0, 0x31324d4e}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000080)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x1c) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0xeed2}, &(0x7f0000000140)=0x8) 20:35:34 executing program 2: getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x56}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x8000, 0x4, 0x15b8, 0x9c, r0}, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x2000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000001c0)={r0, 0xeb, "a97f1c201393ba8d7ad3bd5511f7bf391dd10157507d6688992288b5a125cd8b801fddb9f4a95edd101078a31bea8664df6f06b6cc88c2bb7c9f65c4b606218d8b760ff47516715c84595aaa994f28daee0156b68a2a8361130d3f309dc689cb15aacb9b099fd1ee59faa72e3b879d20ef93464f001192fd9f38744bf4d72e9ee49cfee7f1fcd34fb4266ed7887546701ae31abcc564472d50e6808367e8db130164c4ded16a674e8b5a45a66d0796d2b2e1d3446dc20bf1b29847b91af6b5e1de156d7361125c9faac19c7028139432cce4808009f803267f888851716a44ff171a1207f350a1b5cc01dc"}, &(0x7f00000002c0)=0xf3) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) 20:35:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003"], 0x1}}, 0x0) [ 352.015732] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 352.337503] IPVS: ftp: loaded support on port[0] = 21 [ 352.582134] chnl_net:caif_netlink_parms(): no params data found [ 352.660767] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.667511] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.676103] device bridge_slave_0 entered promiscuous mode [ 352.686139] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.692745] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.701207] device bridge_slave_1 entered promiscuous mode [ 352.738463] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 352.750462] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 352.786567] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 352.795457] team0: Port device team_slave_0 added [ 352.802265] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 352.811047] team0: Port device team_slave_1 added [ 352.820510] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 352.829298] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 352.927292] device hsr_slave_0 entered promiscuous mode [ 353.082702] device hsr_slave_1 entered promiscuous mode [ 353.303520] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 353.311243] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 353.347472] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.354177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.361344] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.368364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.481643] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 353.488431] 8021q: adding VLAN 0 to HW filter on device bond0 [ 353.505777] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 353.523227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 353.537371] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.547104] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.562439] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 353.584735] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 353.590957] 8021q: adding VLAN 0 to HW filter on device team0 [ 353.610990] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 353.620657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 353.629768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 353.639731] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.646303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.666874] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 353.683118] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 353.692496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 353.701248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 353.714136] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.720632] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.728566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 353.744926] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 353.753396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 353.768268] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 353.775558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 353.785345] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 353.801791] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 353.809602] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 353.818106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 353.827254] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 353.847642] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 353.856986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 353.867313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 353.886849] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 353.897222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 353.906205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 353.923955] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 353.930065] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 353.966274] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 353.989193] 8021q: adding VLAN 0 to HW filter on device batadv0 20:35:37 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x80001, 0x0) ioctl$int_in(r0, 0x800000800c5011, &(0x7f0000000000)=0xfffffffffffffffd) 20:35:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="f00000001c00130700af000000000000e000000200008d57bac8293cafe3adee9200000000be00000000000000000000000000000000000000000000000000000072d70c1d168db4a50b810e979a52d2e364017995cfa650606edec8ccb8609be805e96d05471042a98dfcb87fa34cd00323f78e0a429b11a226570dbceeb75eea36b9f9ff1dae340e27", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0000000000000000000ffffffffffff000000000000000000000000000000000000ffff00040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000496fa5daefb1c0d9eccaefea0000000000"], 0xf0}}, 0x0) 20:35:37 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x4) 20:35:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003"], 0x1}}, 0x0) 20:35:37 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x80000004}) mmap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0xa, 0x10000032, 0xffffffffffffffff, 0x10000000000) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000080), 0x4) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x15555750, 0x0) [ 354.382375] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.0'. 20:35:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0xa000) sendmsg$inet_sctp(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2c0, &(0x7f00000001c0)=ANY=[@ANYRES64=r0], 0x10, 0xffffffffffffffff}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x4, 0x70, 0x3, 0x7, 0x6a6, 0x2, 0x0, 0x91c, 0x90088, 0x8, 0x7fffffff, 0xfffffffffffffffb, 0x6, 0x1, 0x6, 0x7, 0xcb, 0x3, 0x1ff, 0x0, 0x8, 0x80000000, 0x4f, 0x4d4, 0x100000000, 0x8, 0xb3c12158000, 0x100000001, 0x8, 0x4, 0xffffffffffffffff, 0x3f, 0x2, 0x80, 0xe3, 0x3, 0x7, 0x100000000, 0x0, 0x7, 0x6, @perf_bp={&(0x7f0000000200), 0x3}, 0xc0, 0x9, 0x100000000, 0x0, 0x0, 0x200, 0x4}, r1, 0xf, r1, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0xfff, @mcast2, 0x5}, r2}}, 0x30) 20:35:37 executing program 2: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x739, 0x20000) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) 20:35:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c29080000000000000000030000"], 0x1}}, 0x0) 20:35:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') readv(r0, &(0x7f0000000640)=[{&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f00000002c0)=""/107, 0x6b}, {&(0x7f0000000400)=""/64, 0x40}, {&(0x7f0000000440)=""/181, 0xb5}], 0x4) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000080)={0x0, 0x6, 0x0, &(0x7f0000000100)=0xfffffffffffffab6}) 20:35:37 executing program 2: futex(&(0x7f0000000000)=0x4, 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080)=0x2, 0x0) 20:35:37 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=@profile={'stack ', '&&useruser\x00'}, 0x9) 20:35:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xd}]}}}]}, 0x3c}}, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101800, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000040)=0x101) 20:35:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c29080000000000000000030000"], 0x1}}, 0x0) [ 355.020726] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 20:35:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f00000002c0), 0xfffffffffffffeb7, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[], 0x3}}, 0x0) 20:35:38 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@known='system.posix_acl_default\x00', &(0x7f00000003c0)='\x02\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x02\x00\xf3\x00\x00\x00\x00\x00', 0xfee4, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x181000, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) 20:35:38 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x6f0, 0xe00) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000100)={0x8, 0x1ff}) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000140)={0x5, 0xfffffffffffffffd, 0x58, 0x6}) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) [ 355.183639] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 20:35:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c29080000000000000000030000"], 0x1}}, 0x0) 20:35:38 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x100000000, 0x60880) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000040)={0x1000, 0xd000}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000080)={{0xffffffffffffffff, 0x3, 0x7, 0x3, 0x5}, 0x5, 0x1, 0xfb4}) getsockopt$netlink(r0, 0x10e, 0x8, &(0x7f0000000100)=""/211, &(0x7f0000000200)=0xd3) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000240)) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000640)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000003c0)={0x214, r1, 0x0, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x100, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffff72e8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x56598e27}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x77}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x451}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xad}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffffc0}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_NODE={0x44, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffffff81}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfd800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}]}]}, 0x214}, 0x1, 0x0, 0x0, 0x48810}, 0x20000000) fcntl$getownex(r0, 0x10, &(0x7f0000000680)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000007c0)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000800)={0x101, 0x55ca8943, r2, 0x0, r3, 0x0, 0x7, 0x4}) getsockname$unix(r0, &(0x7f0000000840), &(0x7f00000008c0)=0x6e) getpgid(r2) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000900)={0x2, 0x7, 0x0, 0x401, 0x0, 0x8e8d, 0x2, 0x7ff, 0x0}, &(0x7f0000000940)=0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000980)={r4, @in={{0x2, 0x4e22, @remote}}, 0x7ff, 0x8, 0x8001, 0x100000000, 0x2}, 0x98) r5 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000a80)={r5, 0x0, 0x9, 0x6, 0xdbb7}) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000ac0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r6, 0x400, 0x70bd2a, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0xc5) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r5) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000c80)={0x4, 0x3, 0x9, 0x9}) sched_getscheduler(r2) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000cc0)={r4, 0x2}, 0x8) r7 = add_key$keyring(&(0x7f0000000dc0)='keyring\x00', &(0x7f0000000e00)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000d00)='.request_key_auth\x00', &(0x7f0000000d40)={'syz', 0x1}, &(0x7f0000000d80)='*cpusetuser\x00', r7) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000e40)={{0x29, @empty, 0x4e20, 0x4, 'wrr\x00', 0x1, 0x8, 0x69}, {@loopback, 0x4e23, 0x5, 0x10001, 0xc9bc, 0x20}}, 0x44) ioctl$RTC_VL_CLR(r0, 0x7014) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000ec0)={r4, 0x4, 0x3, 0x9b}, &(0x7f0000000f00)=0x10) 20:35:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) fsync(r0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="d800000018008105e00f80ecdb4cb904021965030b007c09e87c55a11200e1730000000000000000000000000000812fa8000f00514163e3e53db14ca0508ac1799d58f030035c3b61c1d67f6faf7d71341e2cfbe06bbace801705000000e5a7cef4c02631631fb794643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6dd457765c4f8ae2cdefffb798262f3d40fad95667e04adcdf634c1f215ca8076b6383c37b35ce80ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954bff030e9703db0de796ac5abeb3a79dd14678", 0xd8}], 0x1}, 0x0) r1 = gettid() capget(&(0x7f0000000400)={0x20071026, r1}, &(0x7f0000000440)={0x1f, 0x100000000, 0x5, 0x2f73, 0x2, 0x7d13}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x800, 0x6, [0x8001, 0xd2, 0x2, 0xfff, 0x1a, 0x800]}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={r3, @in={{0x2, 0x4e22, @loopback}}, [0x8, 0xff, 0x5, 0x400, 0x7fffffff, 0x4, 0xff, 0xc08, 0x1, 0xd4, 0x6, 0x8c4, 0x1000, 0x7, 0x7]}, &(0x7f00000003c0)=0x100) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40000, 0x0) setsockopt$IP_VS_SO_SET_DEL(r4, 0x0, 0x484, &(0x7f0000000080)={0x3d, @multicast1, 0x4e23, 0x3, 'sed\x00', 0x10, 0x8, 0x69}, 0x2c) 20:35:38 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000080)=0x5, 0x8) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000100)={0x7, {{0x2, 0x4e22, @rand_addr=0x20}}}, 0x88) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f00000001c0)) 20:35:38 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)}, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000180)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) r1 = accept4(r0, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80, 0x80000) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000140), 0x4) r2 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, &(0x7f0000000040)={0x6, 0x0, 0x1007, 0x0, 0x87, 0x1000, 0xffffffffffffffff, 0x1}) socket$inet(0x2, 0x80007, 0x100) 20:35:38 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x1}}, 0x0) [ 355.734722] netlink: 'syz-executor.3': attribute type 15 has an invalid length. [ 355.818157] netlink: 'syz-executor.3': attribute type 15 has an invalid length. 20:35:38 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'bcsf0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000002640)={0x15, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000fdffffff0000000004000000dc9fc0ff04000000f569c0ff08000000b766ffff41000000d770fffffcffffffe1367b03e3d8020400000000008500000002000000"], &(0x7f00000002c0)='GPL\x00', 0x26, 0x8b, &(0x7f0000000300)=""/139, 0x41f00, 0x1, [], r1, 0xe}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x30) openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x8100, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x2) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x101802, 0x0) kcmp(r0, r2, 0x6, r3, r4) r5 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x9, 0x4000) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r6 = semget(0x3, 0x4, 0x403) semctl$SETVAL(r6, 0x4, 0x10, &(0x7f0000000280)) [ 355.911513] FAULT_INJECTION: forcing a failure. [ 355.911513] name failslab, interval 1, probability 0, space 0, times 1 [ 355.922997] CPU: 0 PID: 12308 Comm: syz-executor.1 Not tainted 5.0.0-rc1+ #9 [ 355.930235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.939618] Call Trace: [ 355.942278] dump_stack+0x173/0x1d0 [ 355.945967] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 355.951217] should_fail+0xa19/0xb20 [ 355.955003] __should_failslab+0x278/0x2a0 [ 355.959311] should_failslab+0x29/0x70 [ 355.963261] kmem_cache_alloc_node+0x123/0xc20 [ 355.967902] ? __alloc_skb+0x218/0xa20 [ 355.971862] __alloc_skb+0x218/0xa20 [ 355.975649] netlink_sendmsg+0xb82/0x1300 [ 355.979892] ___sys_sendmsg+0xdb9/0x11b0 [ 355.984013] ? netlink_getsockopt+0x1460/0x1460 [ 355.988774] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 355.994029] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 355.999466] ? __fget_light+0x6e1/0x750 [ 356.003514] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 356.008779] __se_sys_sendmsg+0x305/0x460 [ 356.013002] __x64_sys_sendmsg+0x4a/0x70 [ 356.018255] do_syscall_64+0xbc/0xf0 [ 356.022058] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 356.027298] RIP: 0033:0x457e29 [ 356.030545] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 356.049493] RSP: 002b:00007f7441e64c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:35:39 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x2) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x3, &(0x7f00000000c0)=0x2) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x1, 0x0) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x77) mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x1013, r1, 0x0) 20:35:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x14, 0xb, &(0x7f0000000100)=@raw=[@ldst={0x2, 0x0, 0x0, 0x0, 0xc, 0xffffffffffffffff, 0xfffffffffffffffc}, @ldst={0x0, 0x3, 0x1, 0x3, 0x0, 0xa}, @alu={0x4, 0x3, 0xa, 0x7, 0xa, 0x100, 0xffffffffffffffff}, @generic={0xa1b0, 0x2, 0xe97, 0x3f, 0x80000000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @exit, @jmp={0x5, 0x3, 0xb, 0xf, 0xa, 0xfffffffffffffff6, 0x4}, @call={0x85, 0x0, 0x0, 0x13}, @call={0x85, 0x0, 0x0, 0x40}, @exit], &(0x7f0000000080)='syzkaller\x00', 0xc9d, 0x0, 0x0, 0x41f00, 0x1}, 0x48) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$VT_RELDISP(r1, 0x5605) inotify_init() futex(&(0x7f0000000000), 0x4, 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) [ 356.057337] RAX: ffffffffffffffda RBX: 00007f7441e64c90 RCX: 0000000000457e29 [ 356.064643] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 356.071989] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 356.079313] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7441e656d4 [ 356.086627] R13: 00000000004c54ac R14: 00000000004d9380 R15: 0000000000000004 20:35:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) timer_create(0x5, &(0x7f0000000280)={0x0, 0x3f, 0x7, @thr={&(0x7f0000000100)="05ae2e2bdfcd22d03f13de8473e23b75a72197fcb99f07ef30c6c275c8d66373ea6c502ec55e5b4724e21cf2d75922244e5b50262a9329673e278fa6e7c42a3b0828e7efce580e7e1ead686764c8f15f35b2d09e897e0c0e1695888ba4583b66", &(0x7f0000000180)="f5f0ba5825073630de8e4e952fd8ea64ecc91311b15ea42601eb064dbb42edeaf85c01e2c5"}}, &(0x7f00000002c0)=0x0) timer_gettime(r1, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x101001, 0x0) getdents(r2, &(0x7f0000000080)=""/99, 0x63) getdents(r2, &(0x7f00000003c0)=""/157, 0x9d) 20:35:39 executing program 3: unshare(0x400) r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, 0xffffffffffffffff) 20:35:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() r2 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x5, 0x101000) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000200)={{0x0, 0x7, 0x3ff, 0x1, 'syz1\x00', 0x81}, 0x4, 0x1, 0x80000000, r1, 0x8, 0x7, 'syz0\x00', &(0x7f0000000180)=['/dev/dmmidi#\x00', '/dev/dmmidi#\x00', '-md5sum{\x00', '!@^uservmnet0\\wlan0\x00', 'eth0\x00', '/dev/dmmidi#\x00', '/dev/dmmidi#\x00', '/dev/dmmidi#\x00'], 0x63, [], [0x4, 0xfffffffffffff001, 0x7d7, 0xff]}) rt_sigprocmask(0x0, &(0x7f0000136000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000040fe0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) rt_sigprocmask(0x2, &(0x7f0000000000), &(0x7f0000000040), 0x8) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x5, 0x101080) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4, {0x7}}, 0x18) 20:35:39 executing program 2: futex(&(0x7f0000000100), 0x4, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) 20:35:39 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x40000, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r2, 0x0) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:35:39 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000009060000000000000000fafff5"]) 20:35:39 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f00000001c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x9, 0x30}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r1, 0x3}, 0x8) futex(&(0x7f0000000000), 0x4, 0x80000000000, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000100)={0x2, 0x1f, 0x80, 0x1}) 20:35:39 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0xfff, 0x3, 0xe722, 0x100000000, 0x10001, 0x8}, 0x40}, 0xa) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x2) read(r0, &(0x7f0000000100)=""/99, 0x2a) 20:35:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa500"], 0x1}}, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/184) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000200)) 20:35:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@assoc={0x18, 0x117, 0x4, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX=r1], 0x12) recvmmsg(r1, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1}}], 0x1, 0x0, 0x0) 20:35:40 executing program 2: mlockall(0x1) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xfffffffffffffff9, 0x18042) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2d, 'rdma'}]}, 0x6) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r0, 0x10, &(0x7f0000000240)={&(0x7f0000000140)=""/225, 0xe1, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r1, 0x4) futex(&(0x7f0000000000), 0x88fa8b1e46bf0482, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000100)=0x200, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) 20:35:40 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x30d040, 0x0) socket$pptp(0x18, 0x1, 0x2) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x1, 0x0) ioctl$TIOCSBRK(r1, 0x40044591) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f0000000100), &(0x7f0000000140), 0x8) prctl$PR_GET_CHILD_SUBREAPER(0x25) unshare(0x20020400) poll(&(0x7f0000000000)=[{}, {}], 0xac, 0x0) 20:35:40 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) unshare(0x2000400) close(r0) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) recvmsg$kcm(r0, 0x0, 0x0) 20:35:40 executing program 4: syz_emit_ethernet(0x4, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYPTR, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="f674c9956868f857fabb41cdbab9f6e2f8c89a3fc0ba5c2826501bf0d05dc533e27263b2679107a56ff073f1c76a831f77360b7ff8a04566773f244e0f2681896b1a657f3413b9d68b330e8b75ca364e4e814459e4ef036a5d4a762983b8bc8b58", @ANYRES32, @ANYPTR, @ANYRESHEX, @ANYRES64], @ANYRESOCT], 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) 20:35:40 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x8000, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000100)=[0x0, 0x5]) futex(&(0x7f0000000000)=0x2, 0xfffffffffffffffc, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x80000000000000) 20:35:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x1}}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x9, 0x4080) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000240)=""/136, &(0x7f0000000300)=0x88) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x801}, 0x20000010) 20:35:40 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r0, &(0x7f0000000180)=@HCI_VENDOR_PKT, 0xfffffffffffffe9f) 20:35:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x28c000) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000140)=""/137, &(0x7f0000000040)=0x89) sendmsg$nl_route(r0, &(0x7f000001bfc8)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) [ 357.645031] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 357.656215] bond0: lo is up - this may be due to an out of date ifenslave [ 357.664273] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 20:35:40 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) utimes(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000140)={{}, {0x0, 0x2710}}) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f00000000c0)={0x8, 0x9ea1, 0x1, 0x40, 0x10001, 0x80000000}) r3 = accept(r1, &(0x7f00004e4000)=@hci, &(0x7f00003e9ffc)=0x6) sendto$inet6(r3, &(0x7f0000000780), 0xffffffffffffff2c, 0xc840, 0x0, 0x311) 20:35:40 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x800010002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x54, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x6, @empty, 0x1}, @in6={0xa, 0x4e23, 0xffff, @ipv4={[], [], @broadcast}, 0x7}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @local, 0x3}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={r2, 0x2}, 0x8) r3 = getpid() r4 = open(&(0x7f0000000080)='./file0\x00', 0x111102, 0x2) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x430000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r5, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3000000}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x1, @local, 0x7fff}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f00000001c0)={r6, 0x8}, &(0x7f0000000200)=0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) kcmp(r3, r3, 0x40000003, r0, r0) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x100000001, 0x8d}}, 0x30) 20:35:40 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x208000, 0x0) ioctl$TIOCCONS(r0, 0x541d) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0x6, 0x7}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r1, 0x400}, &(0x7f0000000200)=0x8) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x44000, 0x0) 20:35:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0xfffffd41) write$FUSE_STATFS(r0, &(0x7f0000000100)={0x60, 0xfffffffffffffff5, 0x5, {{0x7494, 0x9, 0x7a, 0x2, 0x1, 0x5, 0x6, 0x7f}}}, 0x60) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 20:35:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="140500000000000000c0654e620fda6181942702006e78650000000000000000"], 0x1}}, 0x0) 20:35:41 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x8001, 0x1) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x9, 0x5, [0x1f, 0x9, 0xd08, 0x4, 0x1202e507]}, &(0x7f0000000140)=0x12) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000180)={r1, @in={{0x2, 0x4e20, @rand_addr=0x1}}, 0x1, 0x66, 0x2, 0x4, 0x80}, &(0x7f0000000240)=0x98) 20:35:41 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x800010002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x54, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x6, @empty, 0x1}, @in6={0xa, 0x4e23, 0xffff, @ipv4={[], [], @broadcast}, 0x7}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @local, 0x3}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={r2, 0x2}, 0x8) r3 = getpid() r4 = open(&(0x7f0000000080)='./file0\x00', 0x111102, 0x2) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x430000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r5, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3000000}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x1, @local, 0x7fff}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f00000001c0)={r6, 0x8}, &(0x7f0000000200)=0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) kcmp(r3, r3, 0x40000003, r0, r0) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x100000001, 0x8d}}, 0x30) 20:35:41 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x8000000200000001, 0x8010200201000088) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x6d, &(0x7f0000000140)=@assoc_value, &(0x7f0000000180)=0xffffffffffffff81) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000100)={0x2, 0x100000001}) 20:35:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x1, &(0x7f0000ffb000/0x3000)=nil, 0x1) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xffffff51, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x1}}, 0x40) [ 358.454376] Unknown ioctl -1073195493 20:35:41 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2, 0x0) getsockname$tipc(r0, &(0x7f0000000100)=@name, &(0x7f0000000140)=0x10) 20:35:41 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x800010002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x54, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x6, @empty, 0x1}, @in6={0xa, 0x4e23, 0xffff, @ipv4={[], [], @broadcast}, 0x7}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @local, 0x3}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={r2, 0x2}, 0x8) r3 = getpid() r4 = open(&(0x7f0000000080)='./file0\x00', 0x111102, 0x2) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x430000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r5, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3000000}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x1, @local, 0x7fff}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f00000001c0)={r6, 0x8}, &(0x7f0000000200)=0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) kcmp(r3, r3, 0x40000003, r0, r0) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x100000001, 0x8d}}, 0x30) [ 358.525702] Unknown ioctl -1073195493 20:35:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x48) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7fff, 0x0) write$smack_current(r0, &(0x7f0000000100)='keyring)\']\x00', 0xfe73) 20:35:41 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20080}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r1, 0x100, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x54}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4000001) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x1}}, 0x0) r3 = msgget$private(0x0, 0x20) msgctl$MSG_STAT(r3, 0xb, &(0x7f0000000040)=""/16) 20:35:41 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x800010002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x54, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x6, @empty, 0x1}, @in6={0xa, 0x4e23, 0xffff, @ipv4={[], [], @broadcast}, 0x7}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @local, 0x3}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={r2, 0x2}, 0x8) r3 = getpid() r4 = open(&(0x7f0000000080)='./file0\x00', 0x111102, 0x2) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x430000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r5, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3000000}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x1, @local, 0x7fff}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f00000001c0)={r6, 0x8}, &(0x7f0000000200)=0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) kcmp(r3, r3, 0x40000003, r0, r0) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x100000001, 0x8d}}, 0x30) 20:35:42 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x40000, 0x0) uname(&(0x7f00000001c0)=""/144) clock_gettime(0x5, &(0x7f0000000280)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000140)={0x9, 0x6, 0x10000, {r1, r2+30000000}, 0x80000000, 0x9}) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000100)={0x5d, 0x100000000, 0x1, 0x0, 0x0, [{r0, 0x0, 0x2}]}) 20:35:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000005c0)="9c", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r1}, &(0x7f00000000c0)=""/83, 0x53, &(0x7f00000001c0)={&(0x7f0000000040)={'md5-generic\x00'}, &(0x7f0000000180)}) 20:35:42 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000000c0)="9092134642507807cdd1be1015a52a26502de93a090b4e912d86cf84266a97d4e94bd7cdb165f498fb92ddecd22b92904f6acf8bd1010bbfab69e0166e53be4f381e1266adcc0089cc75de4db8618994d547fbcb9fe0bf7bbf0bcf20c890ccaf12858b1277d9317bd3cf00dc5954ec8f88714f0daf39a7fc1d94b75e95b3e03b7a306c8ff0f2ccf812c7d6fbcaa26a4280d723d1a090ae7c7f573196b7adbb28e511f8b577667e6a7b1a07b44beff777453cc7112287b7082d937e1a39122b219c07d87f09", 0xc5) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) 20:35:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x1}}, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x802, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x10) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) getpeername$tipc(r1, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 20:35:42 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x800010002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x54, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x6, @empty, 0x1}, @in6={0xa, 0x4e23, 0xffff, @ipv4={[], [], @broadcast}, 0x7}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @local, 0x3}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={r2, 0x2}, 0x8) r3 = getpid() r4 = open(&(0x7f0000000080)='./file0\x00', 0x111102, 0x2) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x430000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r5, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3000000}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x1, @local, 0x7fff}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f00000001c0)={r6, 0x8}, &(0x7f0000000200)=0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) kcmp(r3, r3, 0x40000003, r0, r0) 20:35:42 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000100)={'veth0_to_hsr\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000140)={0x1d, r1}, 0x10) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) 20:35:42 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x800010002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x54, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x6, @empty, 0x1}, @in6={0xa, 0x4e23, 0xffff, @ipv4={[], [], @broadcast}, 0x7}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @local, 0x3}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={r2, 0x2}, 0x8) r3 = getpid() r4 = open(&(0x7f0000000080)='./file0\x00', 0x111102, 0x2) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x430000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r5, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3000000}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x1, @local, 0x7fff}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f00000001c0)={r6, 0x8}, &(0x7f0000000200)=0x8) kcmp(r3, r3, 0x40000003, r0, r0) 20:35:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000000)={'gre0\x00', @ifru_addrs=@in={0x2, 0x4e20}}) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x1000, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000000200)=0xe8) r4 = getegid() write$FUSE_ATTR(r2, &(0x7f0000000240)={0x78, 0x0, 0x5, {0x7ad, 0x80000000, 0x0, {0x3, 0x401, 0x48e353b8, 0x30c, 0x8000, 0x9, 0x9, 0x20, 0x3a, 0x1, 0x9, r3, r4, 0xffffffffffffffff, 0x7f}}}, 0x78) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f00000002c0)=0x38, 0x4) r5 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f0000000080)={0x7}) 20:35:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000240)={0x0, 0x0, @pic={0x0, 0x3ff, 0x0, 0x8, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, 0x7ff, 0x0, 0x784}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000080)={[0xd005, 0x6000, 0x10006, 0x6000], 0x1, 0x80, 0xffff}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) 20:35:42 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x400000, 0x0) write$eventfd(r0, &(0x7f0000000300)=0x1ff, 0x8) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="147c000000"], 0x1}}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') prctl$PR_SET_FPEMU(0xa, 0x3) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000340)=0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1080008}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r2, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1000}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xf7c}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000005}, 0x1) 20:35:42 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x1, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f00000001c0)={0xa, 0x6, 0x8001, 0x8, '\x00', 0x45f}) syz_open_pts(r0, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000080), &(0x7f0000000140)=0x30) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xa000, 0x2, &(0x7f0000ff1000/0xa000)=nil) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000300)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x64, r1, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x17ea4b26}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x8004}, 0x20044000) 20:35:42 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x800010002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x54, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x6, @empty, 0x1}, @in6={0xa, 0x4e23, 0xffff, @ipv4={[], [], @broadcast}, 0x7}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @local, 0x3}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={r2, 0x2}, 0x8) r3 = getpid() open(&(0x7f0000000080)='./file0\x00', 0x111102, 0x2) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x430000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r4, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3000000}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x1, @local, 0x7fff}}}, &(0x7f0000000180)=0x84) kcmp(r3, r3, 0x40000003, r0, r0) 20:35:42 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x5) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8ew\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x480, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000080)=ANY=[@ANYBLOB="0500000007e1ff00ffffffff000000001b0000000000000000000000000000000000000000000000ffffffffffffff1f00000000000000040000000000000000000100000000005100000000000000000000000000000000"]) write(r1, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x8000004, 0x11, r1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3d, 0x0, &(0x7f0000000000)) 20:35:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x110, 0x70bd2b, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c010}, 0x40000) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000340)={0x1, @win={{}, 0x0, 0x0, &(0x7f0000000080)={{}, &(0x7f0000000040)={{}, &(0x7f0000000000)}}, 0x0, &(0x7f0000000240)}}) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x1}}, 0x0) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x7ff, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000140), &(0x7f0000000180)=0x4) 20:35:43 executing program 2: futex(&(0x7f0000000000)=0x100001, 0x4, 0x1, &(0x7f0000000140)={0x77359400}, &(0x7f0000000080)=0x2, 0x2) 20:35:43 executing program 0: r0 = socket(0x11, 0x800000003, 0x600081) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000180)={0x2, @raw_data="20da6ea05cda2e6c33dedc933941a806e64aef25ae4b67562ddd3e87df7144282c99d2145a5994e62ab7720459b92cf9d86c738a0ebeb3b26595209346960c18693a92d5acbf58cb4258ec85f91db9478561e4a88104fb6e4e68a399f9d0c30d059819d9422272f2c74ff42ad8bca2217e7bfa1affef1a518f423a2201d6aad4a8a920d5aa895000c6739afb12f503319a76792df7769511dc56384e3976a753d00bca7077d2849d8726fd0101e39d4d236002541188df333c35b1049efad4beee460531ae860842"}) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = dup2(r0, r0) ioctl$UI_SET_MSCBIT(r2, 0x40045568, 0x2c) write$tun(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="000000070000000000ffffffffffff000000000000d7b52e2ab5df0000000000000000000000000000000000"], 0x2c) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000080)={0x3, 0x0, [], {0x0, @reserved}}) write$selinux_attr(r2, &(0x7f0000000000)='system_u:object_r:pam_exec_t:s0\x00', 0x20) 20:35:43 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x800010002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x54, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x6, @empty, 0x1}, @in6={0xa, 0x4e23, 0xffff, @ipv4={[], [], @broadcast}, 0x7}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @local, 0x3}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={r2, 0x2}, 0x8) r3 = getpid() open(&(0x7f0000000080)='./file0\x00', 0x111102, 0x2) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x430000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r4, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3000000}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4000) kcmp(r3, r3, 0x40000003, r0, r0) 20:35:43 executing program 4: r0 = socket$inet(0x28, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x801, 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000080)={0x0, @reserved}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x288000, 0x0) 20:35:43 executing program 2: futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000000080), 0x1) 20:35:43 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) accept$alg(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[]}, 0x1, 0x0, 0x0, 0x4}, 0x0) 20:35:43 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x800010002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x54, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x6, @empty, 0x1}, @in6={0xa, 0x4e23, 0xffff, @ipv4={[], [], @broadcast}, 0x7}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @local, 0x3}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={r2, 0x2}, 0x8) r3 = getpid() open(&(0x7f0000000080)='./file0\x00', 0x111102, 0x2) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') kcmp(r3, r3, 0x40000003, r0, r0) 20:35:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x400, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30f) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x600100, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="30000000100001f7000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008000e74b7932c16801b000000000008"], 0x30}}, 0x0) 20:35:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000080)=0x0) close(r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x1e, 0x2, 0x0) io_submit(r1, 0x200000000000014c, &(0x7f00000004c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 20:35:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000fec000/0x14000)=nil, 0x14000}, &(0x7f0000000140)=0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x1}}, 0x0) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000180)) 20:35:44 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x800010002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x54, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x6, @empty, 0x1}, @in6={0xa, 0x4e23, 0xffff, @ipv4={[], [], @broadcast}, 0x7}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @local, 0x3}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={r2, 0x2}, 0x8) r3 = getpid() open(&(0x7f0000000080)='./file0\x00', 0x111102, 0x2) kcmp(r3, r3, 0x40000003, r0, r0) 20:35:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 20:35:44 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x1}}, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$describe(0x6, r0, &(0x7f0000000140)=""/85, 0x55) 20:35:44 executing program 0: r0 = socket(0xa, 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000140)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="430000001eb4a51ad17947829b6f324b36b6cf03d05435f2155d844cecb6cd8c5dc10eeed93e0cdf8f31706c38c46d8b99fe378afb57266758e01a60b45099f70bcbd17518802c6f94511f87fdd8a3bf900be14563b08a5d9fec29a6a229762d302ec654a89e850d60698d9f00b6bd3705d80e38cc6fe1f51e623b929c09ffcfa0c43e275eac08bb0761c5df80b49d267e4d0881aca689f88946bc89be197055d591d88ddb3634caed436a59a0dce89a985150ef66f75dab06e2ef6a359738845daf51d291ce35fe00cc2484f2b8446039c4448dc69f8bf823ab"], &(0x7f00000000c0)=0x4b) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000100)=r3, 0x4) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000540)={@dev, r2}, 0x14) [ 361.232948] protocol 88fb is buggy, dev hsr_slave_0 [ 361.238748] protocol 88fb is buggy, dev hsr_slave_1 20:35:44 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x800010002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x54, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x6, @empty, 0x1}, @in6={0xa, 0x4e23, 0xffff, @ipv4={[], [], @broadcast}, 0x7}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @local, 0x3}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={r2, 0x2}, 0x8) r3 = getpid() kcmp(r3, r3, 0x40000003, r0, r0) 20:35:44 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) futex(&(0x7f0000000000), 0x80, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={r1, @broadcast, @loopback}, 0xc) 20:35:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x581080) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000440)) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES64=0x0, @ANYRES16=r0, @ANYRES64=r0, @ANYRES32=r0], @ANYPTR64, @ANYRESOCT=r0, @ANYRES32, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYBLOB="88d3f030081517c308988d6234911b5b89a09326601d4ebe48d93b6b624a781a76956e606ee912adfb1684ed7f8359e8f7db543a5d672229b0a87525569a0c218188b1d9cee89a2fbf730abd220d3c738e25284553de373c0f583e73ceffaa40121d40", @ANYRES64=r0, @ANYRES64=r0, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYPTR64, @ANYRES16=r0, @ANYRESOCT=r0, @ANYPTR64, @ANYRESHEX, @ANYRES32, @ANYRES32=r0], @ANYRESDEC=r0, @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYPTR]], @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYRESDEC=0x0, @ANYBLOB="0d2382b73d4b98dcea826e4fd1fb430a622b6a196493caaf55798f078158906d2b16086c85daea5ba5ee7ff17c3ba69e447f7116fdb439941f41f780c16a1aef1783e83a7d1b83677471dcca782deeef8a84f63bc46a4513ed20eee03cfece9e0862f4472a519a7a8294c9c66e8d815963310e308c8530044d3a6ae59e95fdc23dae4f27b3b95eeefc8e530dd5bc5ae045462d072c968d769bbb43e09f33224e7174b09989f773026b72fdb2a8da51764a58e42c9150f44af90b31af52e4a2732fcdf13972e3e27e1c6f1080e8f933ba7e48eb71f751228c40ee4fcdd65778373cd572287613b73276"], @ANYRES64=r0], 0x7}}, 0x8001) 20:35:44 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x7, 0x0, 0x0, 0x1}]}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 20:35:44 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x800010002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x54, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x6, @empty, 0x1}, @in6={0xa, 0x4e23, 0xffff, @ipv4={[], [], @broadcast}, 0x7}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @local, 0x3}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={r2, 0x2}, 0x8) kcmp(0x0, 0x0, 0x40000003, r0, r0) [ 361.782793] protocol 88fb is buggy, dev hsr_slave_0 [ 361.788435] protocol 88fb is buggy, dev hsr_slave_1 20:35:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="140015001000434f29ba1533821a1578177816331334d7211fa5a77c6fbfa0afe2d4b5620decae06a8ff28e2fe43f2292486e525d45ab48f3cf1c880bb8ff610f5d96984bbe0e399a256a18bc7412c6b4aa7870f94f098b1e763f51b832d65687710eecffbd1a3d9e2668d0d617cbaf48485655495d2427945bfc1ee16cb74de462df737e6a5ee49677897ba52361ccc2c4401f6e4d1a6e529e52a2210b4e05a65851b9e9b69523e976c5e826e479e5c75820861c82e1363af838ac257e2a3986a419282fb1a6fbff73ad606915cba40235e43ca226895f9374d820af7f1d4b8cad67a2a93169db117756e8686f210496d7d296e4db1"], 0x1}}, 0x0) r1 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x800) read$alg(r1, &(0x7f0000000300)=""/191, 0xbf) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f0000000140)=@v1={0x1000000, [{0x100000001, 0x42d5d92d}]}, 0xc, 0xa4678a5d190c0ca8) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x7, 0x400) bind$alg(r2, &(0x7f0000000640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(ctr-aes-neon,sha224-avx2)\x00'}, 0x58) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000040)=0xff) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000600), 0x4) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000580)={0x0, 0x1, &(0x7f00000003c0)=""/97, &(0x7f0000000440)=""/133, &(0x7f0000000500)=""/95, 0x3000}) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000180)={0x1, @dev={0xac, 0x14, 0x14, 0x14}, 0x4e20, 0x2, 'nq\x00', 0x20, 0xffb, 0x2}, 0x2c) 20:35:45 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x800010002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x54, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x6, @empty, 0x1}, @in6={0xa, 0x4e23, 0xffff, @ipv4={[], [], @broadcast}, 0x7}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @local, 0x3}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={r2, 0x2}, 0x8) kcmp(0x0, 0x0, 0x40000003, r0, r0) 20:35:45 executing program 0: unshare(0x400) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@generic={0x3, 0xf97a, 0xd1}) listen(r0, 0x7fffffff) 20:35:45 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x800010002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x54, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x6, @empty, 0x1}, @in6={0xa, 0x4e23, 0xffff, @ipv4={[], [], @broadcast}, 0x7}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @local, 0x3}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={r2, 0x2}, 0x8) kcmp(0x0, 0x0, 0x40000003, r0, r0) [ 362.342925] protocol 88fb is buggy, dev hsr_slave_0 [ 362.348645] protocol 88fb is buggy, dev hsr_slave_1 [ 362.582946] protocol 88fb is buggy, dev hsr_slave_0 [ 362.588798] protocol 88fb is buggy, dev hsr_slave_1 [ 362.663274] protocol 88fb is buggy, dev hsr_slave_0 [ 363.306097] net_ratelimit: 1 callbacks suppressed [ 363.306117] protocol 88fb is buggy, dev hsr_slave_0 [ 363.317030] protocol 88fb is buggy, dev hsr_slave_1 [ 363.862861] protocol 88fb is buggy, dev hsr_slave_0 [ 363.868406] protocol 88fb is buggy, dev hsr_slave_1 [ 364.423133] protocol 88fb is buggy, dev hsr_slave_0 [ 364.428579] protocol 88fb is buggy, dev hsr_slave_1 20:35:48 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000)=0x4, 0x4) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f00000000c0), 0x4) 20:35:48 executing program 4: syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, 0x0) 20:35:48 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x800010002, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x54, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x6, @empty, 0x1}, @in6={0xa, 0x4e23, 0xffff, @ipv4={[], [], @broadcast}, 0x7}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @local, 0x3}]}, &(0x7f0000000340)=0x10) r1 = getpid() kcmp(r1, r1, 0x40000003, r0, r0) 20:35:48 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x24000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x400, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8001}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) fcntl$setsig(r0, 0xa, 0x31) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000001c0)={[0x10001, 0x73, 0xffffffffffffffff, 0x11, 0x7f, 0x0, 0x1f, 0x8, 0x1, 0x1ff, 0x8, 0xe, 0x7fff, 0xc9, 0x3], 0xd000, 0x40000}) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000280)) write$P9_RLERRORu(r0, &(0x7f00000002c0)={0x1d, 0x7, 0x2, {{0x10, '/dev/sequencer2\x00'}, 0x8}}, 0x1d) sendto(r0, &(0x7f0000000300)="d2cd0f84003dea4c85461688fad3f8cfe59a681b73fc8d8663e4c3361dbe6d32aac0888dd8621900b15caa9d67625413e3c342ea3f22dd0ed1614bf561e6beb66eb5dcc5769e398525e86692af1ad479e45a9d55800c260006e4af13dddf840ce80dc6c0970f2c0f228d46cb16eff7f9e4ef1af13def0ea9f5c2611fcb0eedd6fa4d213ad27ccd22605989fe8971d7a06fdccd1d507fb47c03f6cd51bb07eb78d6976a4fbc22b6bff360b83fb17b6d318a93138f9c9ea75d404837751cf97b6996bfe4fae6b922eb5241676709959cc8d902bd0203bd1a89e5", 0xd9, 0x4, &(0x7f0000000400)=@ipx={0x4, 0x5, 0x4, "ff0524971cb3", 0x7}, 0x80) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000480)={0x5}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f00000004c0)={0x80000000000000, 0x5000, 0x0, 0x1, 0x14}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000500)=@assoc_value={0x0}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000580)={r2, 0x54cf8ad4}, &(0x7f00000005c0)=0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x1, 0x1, 0xc26, &(0x7f0000000600)=[0x0, 0x0, 0x0], 0x3}, 0x20) bind$bt_rfcomm(r0, &(0x7f0000000680)={0x1f, {0x10000, 0x17c, 0x0, 0x9, 0x200, 0x666}, 0x8000}, 0xa) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000006c0)=0x0) ptrace$setregset(0x4205, r3, 0x7, &(0x7f0000000740)={&(0x7f0000000700)="599b9db1d85caa1ef825c70a4be953e52f57e22caa277c688d3dc13aebb4ec922afc40aaf58883cacdd7bba2", 0x2c}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000007c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000980)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0xc20a0200}, 0xc, &(0x7f0000000940)={&(0x7f0000000800)={0x118, r4, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xcd}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x10001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}]}, @TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x96}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x21}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x20000001}, 0x4010) write$UHID_INPUT(r0, &(0x7f00000009c0)={0x8, "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", 0x1000}, 0x1006) socketpair(0x8, 0xa, 0x5, &(0x7f0000001a00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000001a40)={r6}) getpeername$packet(r6, &(0x7f0000001a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001ac0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000001b00)={{{@in=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000001c00)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@mcast2, @in=@local, 0x4e21, 0x9, 0x4e24, 0x4, 0x0, 0x20, 0x20, 0xff, r7, r8}, {0x3, 0x1f, 0x1ff, 0x0, 0x4, 0x6, 0xb05e}, {0x200, 0x9a, 0x9, 0x4}, 0x1000, 0x0, 0x0, 0x0, 0x1, 0x3}, {{@in6=@remote, 0x4d5}, 0xa, @in6=@loopback, 0x3507, 0x4, 0x3, 0x3, 0x8, 0x1, 0x10001}}, 0xe8) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000001d40)={r0, 0x0, 0xfffffffffffff000}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001d80)={'nr0\x00', 0x100}) prctl$PR_SET_FP_MODE(0x2d, 0x3) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001dc0)=0x100) 20:35:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x40, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f00000000c0)=0xc4) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000133cd7211fa5a77c2908000002000000000000000000"], 0x1}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 20:35:48 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) r0 = socket(0x1f, 0x80f, 0x80000000) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000002c0)={@initdev, @loopback}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000280)={0x48b, 0x1, 0x6e65e6c1, 0x2, 0x6, 0x0, 0x10000, 0xfffffffffffffe00, 0x7, 0xfffffffffffffff8, 0x8}, 0xb) io_setup(0x0, &(0x7f0000000080)=0x0) io_pgetevents(r1, 0x10000000, 0x3, &(0x7f0000000100)=[{}, {}, {}], 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x64591d8e}, 0x8}) 20:35:48 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) 20:35:48 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x800010002, 0x0) r1 = getpid() kcmp(r1, r1, 0x40000003, r0, r0) 20:35:48 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000240)={@initdev={0xac, 0x1e, 0x1, 0x0}, @local, r2}, 0xc) migrate_pages(r1, 0x3, &(0x7f0000000180)=0x8, &(0x7f00000001c0)=0x7fff) 20:35:48 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="00b10100d501040000000000000000ff0000004000000000000000000000000000000000000000c223c583e1f522a0e9c006db8cb8d97fab8e35bde5963ba844dd3670f6db43c3165fb2365526aa1bd9474bd1dca660f55245b0ebe01b96525bd315d394a9365273b52ef94090877131974056cb0105684b80952ef2d8ce99566416af4cff42f233c4c5ea6f63041ace0f1a"], 0x92) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40000, 0x0) 20:35:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x2153cd08508d5f4b, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000ab16d8ead8551e6e4b00ab60959241227637c0c0c3d326be538710001334d7a5a77c29080000000400000000030000000000"], 0x1}}, 0x0) 20:35:48 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044327, 0x0) r1 = getpid() kcmp(r1, r1, 0x40000003, r0, r0) 20:35:49 executing program 0: r0 = socket(0x40000000002, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='bridge0\x00', 0x10) sendmsg$unix(r0, &(0x7f0000000840)={&(0x7f00000005c0)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x8804) sendto$unix(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) [ 366.153470] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! 20:35:49 executing program 4: syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) 20:35:49 executing program 2: 20:35:49 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capi20\x00', 0x2, 0x0) r1 = getpid() kcmp(r1, r1, 0x40000003, r0, r0) [ 366.621412] IPVS: ftp: loaded support on port[0] = 21 [ 366.724033] chnl_net:caif_netlink_parms(): no params data found [ 366.771949] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.778454] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.786439] device bridge_slave_0 entered promiscuous mode [ 366.794559] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.800982] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.809603] device bridge_slave_1 entered promiscuous mode [ 366.834865] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 366.845137] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 366.867715] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 366.875727] team0: Port device team_slave_0 added [ 366.881600] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 366.889889] team0: Port device team_slave_1 added [ 366.895649] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 366.904502] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 366.966251] device hsr_slave_0 entered promiscuous mode [ 367.002477] device hsr_slave_1 entered promiscuous mode [ 367.043061] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 367.050395] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 367.071315] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.077813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.085018] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.091476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.155239] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 367.161358] 8021q: adding VLAN 0 to HW filter on device bond0 [ 367.173020] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 367.184446] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 367.194496] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.201847] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.210465] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 367.225218] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 367.231296] 8021q: adding VLAN 0 to HW filter on device team0 [ 367.245210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 367.253408] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.259817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.285142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 367.295900] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.302480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.319618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 367.339432] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 367.348500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 367.366676] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 367.384091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 367.396847] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 367.403091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 367.424798] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 367.442812] 8021q: adding VLAN 0 to HW filter on device batadv0 20:35:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) connect$netlink(r1, &(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000005010100000000000000000000000000"], 0x14}}, 0x0) 20:35:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x400, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) bind$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x2711, @hyper}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x1}}, 0x0) 20:35:50 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x144c2, 0x0) accept$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf32(r0, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00', 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U-', 0x7}, 0x28, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r1, 0x400, 0x1) fcntl$setown(r1, 0x8, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000280), &(0x7f00000002c0)=0xc) execveat(r1, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x4, 0xfffffffffffffffc, 0x3, 0x20, 0x0, 0x58}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x40c0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_ima(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.ima\x00', 0x0, 0x0, 0x0) 20:35:50 executing program 2: futex(&(0x7f00000001c0), 0x8, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)=0x0) sched_getattr(r0, &(0x7f0000000180), 0x30, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x42, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0x9, 0x0, 0x1, r1}) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000100)={0x7f, 0x8}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000200)={0x8001009, 0x8}) 20:35:50 executing program 4: r0 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfffffffffffffe5b) r1 = gettid() ptrace$peekuser(0x3, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0xffffffffffffff41) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) sched_yield() write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0xffffffffffffff15) tkill(r1, 0x1000000000016) 20:35:50 executing program 3: r0 = getpid() kcmp(r0, r0, 0x40000003, 0xffffffffffffffff, 0xffffffffffffffff) 20:35:50 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000400)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000006ff0)=@in={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) 20:35:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x2e1) connect$inet6(0xffffffffffffffff, 0x0, 0x0) timer_create(0x15957d4b1cf289ae, &(0x7f00000002c0)={0x0, 0x40, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) timer_create(0x5, &(0x7f0000000340)={0x0, 0x12, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000380)) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x1c, 0x7, @tid=0xffffffffffffffff}, &(0x7f0000000400)=0x0) timer_getoverrun(r1) setitimer(0x1, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) msgget(0x1, 0x4a0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getgroups(0x1, &(0x7f0000000000)=[0xffffffffffffffff]) tee(0xffffffffffffffff, r0, 0x5, 0x2) setgid(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x30, r4, 0x100, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000090}, 0x8000) 20:35:50 executing program 3: r0 = getpid() kcmp(r0, r0, 0x40000003, 0xffffffffffffffff, 0xffffffffffffffff) 20:35:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0)={0xfffffffffffffffa}, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x1}}, 0x0) 20:35:50 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x400800, 0x0) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) 20:35:51 executing program 5: socket(0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x222) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) dup2(r1, r0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) io_setup(0x0, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f00000004c0)) [ 368.026438] syz-executor.4 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 20:35:51 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ipv6_route\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x3301, 0xdd) 20:35:51 executing program 3: r0 = getpid() kcmp(0x0, r0, 0x40000003, 0xffffffffffffffff, 0xffffffffffffffff) 20:35:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c0200000000000000000003000000192d8907b92a131e6103c51ed960a312e4d85f3c713f88fa059325a512fafa7485a5bb06e27fdbda40ec925a320f10707ffb6956497a053125fe108cfa43a55908be6a813dae1fff9158f9b2531470e8daf27af55b8e651eaba6e1a5d0d734058e9a0f02b123a59f95012371a812af83e073cdcc935ffb5184ea268637b38dc6229910ec09a5bf0bfcf483561346a3d0c3715918d0670af9951b2f9d8916d20e271bd1ca5dc83ae9083b492f443c5867a02b40e798834d6bd4a5bca0b437b4803b43aa0d174c02"], 0x1}}, 0x0) 20:35:51 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x100, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000100), 0x4) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = add_key(&(0x7f0000000140)='.dead\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="c0c513db407fb1374af438cc0107328a9d4c7c9fe71130d8fb4e923c02a2bcf19fd5798728b06a6e804df1d9c44d67", 0x2f, 0xfffffffffffffff9) r3 = add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="9ae0f4b8bbcd76305326664f228c119539b5e2179d2cce20200785328ec439ae970b2511cf2a54fb48d5429c9af4e56cdbb73ac2018854585d", 0x39, 0xfffffffffffffffe) keyctl$link(0x8, r2, r3) 20:35:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 20:35:51 executing program 3: r0 = getpid() kcmp(0x0, r0, 0x40000003, 0xffffffffffffffff, 0xffffffffffffffff) 20:35:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000380)) 20:35:51 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) unlink(0x0) lsetxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setgroups(0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) setresuid(0x0, 0x0, r0) 20:35:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000ee035ba242fef9c892a3cc2b7d01f59e0f9dace9470fb7655a84c7433a2a6c112161d20edceb6ff30e870f0cd72645d1632181541e767094801c504a5a685e5af479f41462fa9f3d8580808a0c4a7c1dbfc966eed86e4e83dd5ec042dd3adee6"], 0x1}}, 0x0) 20:35:51 executing program 2: uname(&(0x7f0000000100)=""/223) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) 20:35:52 executing program 3: r0 = getpid() kcmp(0x0, r0, 0x40000003, 0xffffffffffffffff, 0xffffffffffffffff) 20:35:52 executing program 5: syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) syz_open_dev$cec(0x0, 0x1, 0x2) 20:35:52 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x400001, 0x100) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000140)=r1) 20:35:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) fremovexattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="6f73002ef50e81afc3b62bf9df850f49a1869ee2c2fbc41e14035561d7f1376e58014fb731b5a6028d398bf2d47a8223984e6297898639bd0e6da256c9a5a3d7fae1b480ce7217922e8c168d4590f871ea1daddb53f80000002a4d94c842d5a3d0bcad34979993cea0bf96b262ea2802cc17cd4c5c1e3c95ebf8337fc78463459a64bc9b78b3ddc9462f38ad189355adbeda4e392edb5dc54426cda6"]) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77cff0f0000000000000000030000009b005a0ea879232e3ba737"], 0x1}}, 0x0) 20:35:52 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) timer_create(0x0, 0x0, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = accept(r1, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @local, 0x0, 0x0, 'sed\x00', 0x0, 0x0, 0x2c}, {@multicast1}}, 0x44) 20:35:52 executing program 3: r0 = getpid() kcmp(r0, 0x0, 0x40000003, 0xffffffffffffffff, 0xffffffffffffffff) 20:35:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) mlockall(0x3) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x1}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x80000000000000, 0x600000000, 0xb44, 0x4, 0xfff}) 20:35:52 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="3900ec087500bcfd6f68303cd3309d02031d1f4c6144820168f05a6430009abb9a7d07470200d58bb38109a8c46e67eb361d94305d4572bf75"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:35:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) write$sndseq(r0, &(0x7f0000000000), 0xffd7) 20:35:52 executing program 3: r0 = getpid() kcmp(r0, 0x0, 0x40000003, 0xffffffffffffffff, 0xffffffffffffffff) 20:35:52 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x311180, 0x0) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000100)={0x6, "1db05c39ebfae47176a782a47d78059013f36d3f988f0f04e671e38812f6e8f4", 0x4, 0x1000, 0x9, 0x0, 0x3}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000180)={0x4, 0xff}) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0xf9, 0x10000) 20:35:52 executing program 3: r0 = getpid() kcmp(r0, 0x0, 0x40000003, 0xffffffffffffffff, 0xffffffffffffffff) 20:35:52 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f00000001c0)={0x77359400}, &(0x7f00000000c0), 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000100)) 20:35:53 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) chdir(&(0x7f0000000340)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0) 20:35:53 executing program 4: write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) gettid() 20:35:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0xfde4, &(0x7f0000000240)={&(0x7f0000000740)=ANY=[@ANYRES32=r0, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRESDEC=r0, @ANYRESOCT=r0, @ANYRES32=r0, @ANYBLOB="a5e5d8743777c70acd3a4ef2335d43f85cd1157c9badbf29eacff4e74ab769ed0b9af9282adf35899fe76f063b34a29ce968f361ab12ab88f42d2d4f2062c1e653bd92fe68687d330ce81972827b6677a3e80c1515d4c3d97b66240c018608cbfecd3ad7ae0972460d715baa7bdd98170ff2d6b4ebc50196c2520684ea22fc02958f18d59491d22313dda33f5d6dac3dabbcdc4b5cf45f07fa52ef01740b9f98516e9ccd75192a512afb9d75e095ce550dab8f5036f6be3721b6785f56551709ef2005690eff", @ANYBLOB="86b93bfbbe9dd237753046de864b50caf335d88c4c1718a88a3ac5d3c581da34c733bbf796de776a220eacf68db93afbf974a88bf6a996cf6967f8e3a347a1b7b63b37be183fd034fee6282c682d6d0d5b73d9e408d8c61cf41f78132534f9e7f93d963d135d0dc5b5309b220c93b65812fe0135c74b30e17a61654bc8bf86dbec4fd0410462d6e793ef7c2a623306", @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYRES16=0x0], @ANYRESDEC=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRESDEC=0x0, @ANYRES16=0x0], @ANYBLOB="7327bc501054a193589371edc4cdcd25ee1aa15e5b0778d42aa0d7307fc0e85938f7d35d734b77166a8ae1500d686910e3f5882ea7b9e8a1648369b99b749d69fc1119855fd275c0a3233d054bd393f9af8aba177513fdcd30dce9b182b517ea52ea0397d1745f5fa4fe3fed9c616f519808942e4cbde0306b4d7740e311ded29b06790de3288b783ff23a8fabc6df0f56cbb4d074d5d04936879a4d7e79af007b9fc47fd815543993b315d61a9c505bfd8955e9f68fc388a4c36fad7b4f9dde5aa618117c1e0cdb5e92ec8face1051e46db58c974d5a41525bc4d13113b7a42b1286161bebd4a901edaca08bbbf0827f4f16c0140ac4c", @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYPTR64, @ANYRESOCT, @ANYRESHEX=r0, @ANYPTR]], @ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES32=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR64, @ANYRESDEC=r0], @ANYRES16, @ANYRES64], @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYRESHEX, @ANYRES64=0x0, @ANYRES64=r0], @ANYRESDEC, @ANYRES32=r0, @ANYRES64=r0], 0x1}, 0x1, 0x0, 0x0, 0x83}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x2c2080) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x3bcc, 0x661}, {0x2, 0x9}, {0x81, 0xd6}, {0xc534000000000000}]}) 20:35:53 executing program 3: r0 = getpid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 20:35:53 executing program 2: futex(&(0x7f0000000080), 0x4, 0x0, &(0x7f0000000040), &(0x7f00000000c0), 0x0) pselect6(0x40, &(0x7f0000000000)={0x46, 0x5a, 0xd60, 0x1, 0x4, 0x5, 0x26e, 0x78f}, &(0x7f0000000100)={0x9, 0x100, 0x7, 0x3bf, 0x9, 0x3, 0xf7d0, 0x9}, &(0x7f0000000140)={0x5, 0x2, 0x5, 0xd2a7, 0x1786, 0x3, 0x8, 0x300000000000}, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0)={0x401}, 0x8}) 20:35:53 executing program 4: write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) gettid() 20:35:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 20:35:53 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xe2813a, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x0, 0x8}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={r1, 0x3f}, 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe58, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1400002f728a940003ff00000000000000844ad2f86de47f9c00ffbfbb1a83d60cfa"], 0x1}}, 0x0) 20:35:53 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="315da3d8e75ea6e8abf40f07e92e04f772cbb985e0ffdaf0454673a71cf8403ad025eaa2c3fdc131c264af0d1c7f81e3f7677ceb3915bfd62a8269226e203899b107079563fc58e50dc193e44049c68f0b37a2bb43803c2b73d4175ebc9de05b740c9866bce8235b0df15215f5d3f718ef3e2d73629c3e4b1e01face8529e4db9691b496ece3d7951e6f8d4a89fdf0855200b824362d1d2e99af3c248818b0d07089bb53bab55550121369bc9ea119340425ef748fbe33c1b548e53e4549fd64872459a653192f3cb7a3", 0xca}], 0x1, 0xa) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x0) 20:35:53 executing program 3: r0 = getpid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 20:35:53 executing program 5: open(&(0x7f00000000c0)='./file1\x00', 0x40140, 0x81) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) execveat(r0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0) 20:35:53 executing program 4: write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) gettid() 20:35:53 executing program 4: write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) gettid() 20:35:53 executing program 3: r0 = getpid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 20:35:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = gettid() sendmsg$nl_generic(r0, &(0x7f0000001400)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x1298, 0x23, 0x0, 0x70bd25, 0x25dfdbfe, {0x4}, [@generic="ff1ac6467598600f7c84e350c389c65d5d3e29f4c3a34f838162ec8a1e47aea14953138890c1ce25b749", @generic="d7a5c4813d4be9db65054bb7777e41428e4b13921acd34c59fc02c77e985ba660388fe", @nested={0xfc, 0x1, [@generic="4d381f21aeba9c7b38777725dcbc5cd49d4cfcbf2a1588b0761dea6475642819f6acccb51e91cae4c760d08a299332b4b7a61bd1972c79affdaa78a22e6c3389bcbd34c59c57fde4bee50a56091f3c2af428c53bbd555d62a6d8cd97a2e2e8581eaafdae5ed255ecbec032d3de124ba64bf2273c4d4ffacfa3a358de3ccd6c787368a17d2dc60483da20f6fc368672af6da3bbbf0ce0d27b018db474a2b99e34466a49dd6ac116a468248cf6e7d67616d1b36a80b84a3f7d0e3bf69b05db7c86af0ff04b6ffd7ab579ce2fc90f21e51cee4932da63d2936d3691d1ba830f54048f260d4c588a975c4bbc2c4272f56ee07ec9980cb4a2"]}, @typed={0x8, 0x7a, @ipv4=@empty}, @typed={0xc, 0x24, @u64=0x2}, @typed={0x8, 0x13, @pid=r1}, @nested={0x111c, 0x7c, [@generic="7375cec1f3e514cf36263df406f035a7d0f9ca3657765fbad202483089557aea799b30fd7e347fbc2cbb410a800f7f86df2d9705e781727011e6d040fdf1d2c5013f2725a6467be65a952801af69ecce01ecd414f5bc5d4257749e10a5b582ade0c86ebb70d732d614", @typed={0x8, 0x1d, @fd=r0}, @generic="bbb72ac72c11733e14e091371c118a819d455ca248e7161310a57e0ec72efa2c68651a29fcc53f38d7c581742fb979775e73191f717dae28fee62daa3557698b7e9538144ec6271157b28444dcd03cafa860083767850e0527490b8c0a24a8dbc0cbf2f0a9c9b3d2fa17e553863cc17a4445f66ff13f4567a38ed33adf387de4039b6a6be9d278dc23eb48b199ff4f623cbfe83ea40553f628e5ce79c085397127565e823ad00ed324fb4791254220dc31c5be5a015b6f0dc4b0927d1e34c6e424760964da63b93bacfbbf56a5bce2a4de460d5de2906a1279833c1e298c9a0a6f95dd0761dd204133d19661bc5e3e89ef12f9fd906fa7d22f31ab8a4010e9dd0bbb92d20ce303fe1cf9b97aaf90a472ede6ac528c68cfc89c76866905b4b36c69f564069ff746e868fc643f419b0c0d780eb10d5039138f33a66824cc0df646e3d7e782c1efab752d81c14ea1328deffd2e02dcd00dd207e3d3b312f85073f64edda7738144efcf1bcbb23019010c7e51d69da55b2a82fd117826204a22429cf6caf406603caf42e25907a169a8479eca1f8ab49ec4354a6f9021da8253835fb7414f0e4bf15edd8e84308ba503f72ee008d5281a4684b11f177107cebc36a24ada58a061400b3a3eaf0c499717ad4307e2be9288a3fd14c18f6e075d9d1c7eb6762691738dcf737cedf80be01c71afdaa5bb1bfb67ce55e804ca619814d59d44c214412d19c521bca9cddb88bf4569993776d3dd8cf38385fc275080971216e2ffcc7c938a59a28e9db5ae8eabfa2e53c48b8c084f6033b76ae8385437586a4fcf834f1df6ef953c146fd7df3de5281cf8ae05ea680ec071c225fbe9f3e349a628f52fee444be6e8750bd02382d2103baa7fef5a975800759ada795e142e74e46cff9a6b9a6359c292ed55dac399a01010ea66840f64ad280f043cf9d233c6340234d87ac5d58dfcf4d4feaabf032cbfbf79b69459f685279a113ab04edeb8fad2f97ef2ce197fc8056bf8448f367ae7414a49e0a7a8aec811e9eb8115fbb0df714da764007f20000a400807ad00593e9eb5cb97c684f7594b66b9911a8e99053927f6eb0a3bf3502f95f0a3b8f10662021c169d9c2789d14f26ec0f4ea369dfa39c513697c79f7f4452cc0d623bf05cef5caf0cfd9cd325cbbcde3a29b66ac331cbed69289094044ecba59793c0487d49cd14bec4c81ec7e79fafe8c91af0e3afcbbae9ed672ab92a3dd58b8d65d12f527b8297bd0ce75c6fdf1084d6ef3b069fb11fe7a180c1fcd9da1c156b21a682957a50d37e2996002bb6b963d00a7d78f892ab552f84922fe95ea56f87c131f436df05e54cccb960b006cd4e1db551096632fafb84291251d9ca2b3bbccc308e987854a875cb2af8ef26b51a862c2d44db47aa858fe98a08cfb35394c8b4c6cf6925eb6b9a4befb122e4c35c8b0cb89b8dad00bcf5a4137c89d70cbd88486ea2db62423d70bb5b0bc23764add95a3be0bba37e56a8d66639de98be03bc92ab4c9d3625f434ab892fee4bb06a29e0f1678281d03ddb7119c01ed69cfaacd9910f7f4cc655387e7998cfaf64b96c31040a928afa2e83e684c894c3276f2d32b4285a82a946dc71ec26e17bbd6c9ea347d0fccf0e0cf1609b85121d6ebc7f054200912bb96e47d4382be4112e536dd6717605e59747c31466ab700395f748f9277626fd7c1463eff65455e5479852d06859ea66cd493133b52f6c802a4f202df1fc88568d9253849eac2c53293f6a31b19d8e32e3ef0ccf8ebce5450079b4273d3d2f41ccbaea3d129a0c0cac25c78ee8c90442a0b1412747e385208e825fb7cc771443425ab27bcbad8ec4875a9c4043409b59551156f0846076bb7bf3e353417d2b058325fe579f7723c91ad3fe6d711c9a459a257454ac936ff6535e6b831e901c4e1896c2d3ca6427d867b68946deca377638d0902bcfa92ec0531dab73940627a82897550db8d4ee80d37612971157c4acb9400e7cf03179ad881fa78e00372dacdc0ca9c4856641f1589872e9c973cb7f95e2ffdcd986f78aa9c113b553ba4419a35c0fe2dc4e4a1feb5f1239ddd641e0e76a7b8da920922a71d4fd2400bbd46cfd8a561990240e7c05003e5c3490ada83e2e12158177864869946111b34617df056218a2d0ba739fa8d184319f35d0db96fb3e7d6dfcf8b27b34e7f8831fa80928ec7dfb88f7ea526fac38b1c033aa0e3ec683c5cca578b9004427cdcfdbb8ef02cadd80e874862cd5012011981dc4d58b130f885f6e2b765de287c53dda4286b135706405ce773252de6a231eac3e1d0a0d3bd54f543c3395f0fff7e8b92d7ab3a88cec3692e0926d2d77e7544faaa5fed06ebb47966dac848f09bde3af8de9a0edeb97acde7c2a18b20099f683b8fde9b87dc385a43cddec047103f949c092d4ce617975a9365b4316f318bfe5453e47274294aa7111718f1891c6613759ea27c4db68b48a9c4f960f7745f4fc8be379efebf19ea2427c388506815cc5bc671785034a406689b59bd66bd287b92baf26c8777f4d40bd0996f0caaca8c5334df0faeb34d2c2e13f4ace0450526d8575535a1f332bf47815a290da29ad498a38a0924b2272f8f9a2f86a75d86a5d0d9cde0e996b3dcdb987a589285e4ec85f918f765122236b7ad89c2571708e411de237f35db8478bee06b5b195369b32ef8077bd880683dd18c38e313142378313828b0998104cad4d5b865181b9647f542dcbfd270d336a60877f83fc7ada7df4280f1541972a1bd4d08883361f2a13d1d094ab8b4828ac7ca494754a4fce30bff86365fa3122a3698a78ef89871fe68d6dd69d35fa6898f1e5e8a1afa21e25e4122a3541cc992e38256f3e9e787c22a967ef23b47057df939a14aa6ecff5284452491761dcd138f03377af8bbe8cccd3cf0b35aa53ce9860a868a829a782e9a61ab76b87955564ec531348f3040c27da8300a973b05739717e16e1ec0eba5af1c867b3a7cc9af8406237597b291f823c13fff7b16926b06d61582abbc8931fa4f68dcef3be1f1b1ef60c841ef58f364b46cfb4efe5af32de5db3ee62566a45412e47fb8255acfc961808b6fe001ef073164c688a8184d3d9235da76219d72955e040db86877c5fe1be6a07483a551d03a55d80794766a24e26aef2a654cb6830dbdecf81da9c64e01294946c3209fbab73a0ef5131c30236d7b7f0d6ded6c98c8c3d44597c91d6447674f15f9352ab0e850016ccedab165850d86fd894fb341f931f6de6391594bd7f9e86ae6819b5ba1921ab90d786089434496ac74ba3d10a1bf74eca54c4e009efc1f96f8bdfdcd4cdde93d43c20f2b483628b8de701970b5472eb9b125299b6a9031c6349d477c1084e6afee83324aedc38a22b03e24b3263dc7677ffa9e3ba035223d6638dc66c94f07803c580005a68c511d5716215ab9fa0efe71ada284780ed8e18109ff47de2c1931ef44da59e8f827e8f695e2b8d5125e6d3c84f3d5b7fac8605b1e236bae45692fea9f3f6377ee3dc77d67b72ff3a99bb38c1d354a904d844294187bae9a79867d505b8b4286e44c5d6a4b61d7e367d39009ede115ebd2938aa3a5d2bf6588965528de7f15dc4f9716c3a1046d41e9a41aef7087fe6e0d40e8f02a7cc05b33fabb50ee5913851f5e9d57d99d9ae1d7e1bdcb27aef920d23d2f1e732303fe0b92d4933edb6c5f290719c8eb0c3efff021f606d6a581823c100030a09abfffa77275cf3f1e633cb5472ec597219ca0b1fb047d0212357258cc460b8cfb61a3d9887ca4597098c22ac7cca594d33e123ff780e592a6d546eb1b815e1983d98ac48149f3f544ba65d62da9cd26a91bce4956860b8ed8e07d6e8fea7afec9b3f8d49d750f979bc9fb4a9684e99d0862d47b349501dc411ed440202d1070cc7b8ceef88a0e8f4b1b25cf23b9b9387c8e930a31abd82014fcc302543c6f5952934cb9e08bb8472b834bb648b528164b20b373310ecceecc8b0c8cb41abc15714ec329e1489159957a695d37b635a6bd7a7e483c0855272c6a4cde5611cdf79444d4f0dcf4ca0b4b1c749fdf9b1c8b0bebc7c2512aada09312c3ae4f004ee39bf48ef16cf0c0b84c2a9f0939a95ff3e293e1e685e607187ae66d25102da050f2c32ecb7b087cdd8b557a0905310038adad1128c62dc8e25a1f94d1c1c07aa352200bfb7d4b42e4cdef1b6fa3ea01779a3910b97e426f1d80bf4a97ac524714a2c9a0a4f945193dc9b6b407814018afa1efe1b03c0d7fadd33c0f1d77fccdb603c1a1dc0b60fd11e1f79b355d873331cb86659bed7a27b103c329fea0a4b3b8705aaaac4c10f0b27a0de4faeb4ac2421227b59b172d00ac2cd37e1426a3d34b81e9762ca31b9dfc4244694a442172734564e85edd7d65c69435c7fdafdbdea15547f404c58c63e069a35e893bc05d2fdf77aca880d6d2bb1136ef081a7340ef3a71646e177a091cc67f625ab502a15350edde331c5c6158b6aa37dff229c3dcb44dd7dc91d6c4603c0005bbb278073dfbd4ab007936201bd6ac27a73813b4234c9bb8a3fd596c945ea9489beb9aab86d242103df17421e866401b2b7fe49aac2789e0832f4d717d80cd6491b661e968a1538baba976472b634c1f705d9cdd140155c97a2ce056e0469556c6ea2d81a0f41601a95ce10393f728d2b6b6bba0c70b564af6d5d16f7c6b69a947a87ddb6cc44ea40132479fc992f76c74e566398bf60afc431026c49c66281e14a90030dbbe5664aab1b4f7ef0b2684996754a24efed253e0d8ebfca0e1b9f4eba759044b3ff85235b09dbc78dd3cb5a2b59b29bfc31c219d24392dfe3e6cfd37cd32998c1ffdf4a56ce458c5a7c2fc1675711822921407cf7bada606d310076f9627d08157329603e4f6fdf0ca78ee6bcd807f9b72c0c577f543417b384b4c074244aeb01f046e09deab09ffb7125787ac3a7e477b61337d3ec22c6e13055954c4dfd88d30197066693655fc63edf284cf66c2ec2bc01f06a41653d280dd5514a15dc57ab1127e8fa7f5c2b10fdb77289754c0e3c100117ef4afc5c173029876a0b8233b001c1fc93934fef02bb5f145a9ef828e3664e39d565b756980470efdb50e05eb7be7cb38508fc4a7c86545861166c634ad5032701baec6d9e6a65bd220aa866dd5546e415b009d00640bb8a5906b0184a5ea94ae46a1502686c237a0fd87ed3bd778b748ca24e54ad1ac7113db908e2b75861a97c10ad0ab0a110d3047f7f45d978a72e54cd1743a3c9b0da73b64d935d95b375b9048e767a418f21a3c2aa04f032f69564ed7fe52a21753567a8333e93183728583d7b7d06f197d0c9a5d8ddf2559944fc9a01ad3184ae54b8e98ac8ccb07e6124d3d96820c79a9a50cc694beb0c6c0984cc4322a7ea8848d386581021669c67be9048a216a487752b332dba325d14e02f316983c019e3e086b3b645ab4e0af4f06aab27fcd8047b7b7934823d1b2108d139d86e8b59fb75c8a821207313551f818a7600b3d2f3c2fb39307ca4aaf098f611f42cdf2b95d128dc16191c4204b3412ba7cf86a1d5351137bc7c5d349ebc6e5e67ae31df3371d073703e336d3cbc76f8ec14b72efc11a241c7c3c71da30dc4cb8f9ebd19eba7484ea36e32ffb6b5bc1398255f43186b4f04fb0092e2b80f7f94cc1b49459bbb7b555da736b34bc9d9f6cd62cbf9f5f1099140f43e72628ef69ecad6f935b2fe28db2701ff33d291ffd6fa6fdf31faa7b636f1a03cf611bcb094b2e50faead567357c52178f764ec5db8e4f6a75baafc6d1e715901", @typed={0x14, 0x40, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @typed={0x8, 0x4c, @ipv4=@empty}, @generic="3b8a464354718756ca7166db015071e7a7f73e3e0c8b4a3677007b60ab468ba500cd329bfb4f9edeb687fe6a447d3747486d8ca6c2dfe3f36d0b5d08b3ffddab0fc61add3e9847901ba98be6b52fd4095f9fe3ab6e732226b5ffb3a2cf0ec1b0d127fcaf21c1c47342689b0b875d280ea51299cb45a5c8b1392d0822d70db1f0b480c4", @typed={0x8, 0x70, @fd=r0}]}]}, 0x1298}}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x1}}, 0x0) 20:35:54 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000200), 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x280, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000400)={0x0, 0x6}, &(0x7f0000000440)=0x8) syslog(0xf, &(0x7f00000005c0)=""/214, 0xd6) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000480)={r1, 0x10001, 0x6737}, 0x8) mq_timedsend(r0, &(0x7f0000000140)="72505ae07ae2de56a07fdd6308647f6ebbb3075c6b1acd6496042db84568f0f1563d2f2d62a357684bd6869a8937d9c9e029d114a686d428ab59352bbc43c89ac5cdeba1e4f9ea03711a763101", 0x4d, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x2a001) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x81, 0x100) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x36d48000000000, 0xf14, 0x80000001, 0xff}, &(0x7f00000000c0)=0x98) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000003c0)={'veth1_to_bridge\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="fd4253df4e02e7f0fd94e30f5bf8a8df37000000ff7f0000053a56e00000000185020000000000008ed986aa2f23897034d85b21128f3e064a309d92aecbf546b19393e00ff9ffffffffffffffa8e5a7df08682f75c708303fe0b7dfbd499a8bbf76c0a641826a74822888fabefdbdf9da228eb21e4b681b0924487411055d3125ae7e6cc805c710c9ae241ece7689c17e4de8d28c5b3cca0ec3ec7442810e282dc47a63ea0663b8a74c244c5e68b9bea971f98189ded4e6de852794a6f62d3ab1f9b9f0fefaddb7d98c22cf0000000000000000cad3cc2fc79783c6c6c473ac084fda3680564a38f91318"]}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000740)=0x0) fcntl$lock(r0, 0x6, &(0x7f0000000580)={0x3, 0x3, 0x20, 0x3, r3}) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000300)={r2, 0xfffffffffffffffb, 0x81, 0x800}, &(0x7f0000000340)=0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000380)={0x62, @multicast2, 0x4e20, 0x4, 'nq\x00', 0x10, 0x10000, 0x1f}, 0x2c) 20:35:54 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(0x0, 0x1, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000100)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000d501040000000000000000ff0000004000000000000000000000000000000000000000c223c583e1f522a0e9c006db8cb8d97fab8e35bde5963ba844dd3670f6db43c3165fb2365526aa1bd9474bd1dca660f55245b0ebe01b96525bd315d394a9365273b52ef94090877131974056cb0105684b80952ef2d8ce99566416af4cff42f233c4c5ea6f63041ace0f1a"], 0x92) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40000, 0x0) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000140)={0x6, 0x71, "3f91a1b01f210e0c6a1157a479ccb698b12a59582e34f9502c7be4793496860345c954f5ab557557e610b52de105363a7c57c05d81d939095e8e75274de8c272cc3f7e97342999be81e1c90c488a00f8c4b889973ce4ee52613b1d6db5e6eb53374b34f579e2fa0b2ad36c698b29aa7d10"}) 20:35:54 executing program 5: syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) 20:35:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f0000000900)=ANY=[@ANYBLOB="00000000000000001800120008000100736974000c00020008000a0003000000"], 0x1}}, 0x0) 20:35:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0x10001) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f00000000c0)={0x200, 0x400, 0x7, 0x9, 0x10, 0x7f}) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000010001334d7211fa5a77c2908000000000000000003000000"], 0x1}}, 0x0) [ 371.147892] ================================================================== [ 371.155325] BUG: KMSAN: uninit-value in gue_err+0x482/0xb00 [ 371.161057] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.0.0-rc1+ #9 [ 371.167733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.177094] Call Trace: [ 371.179719] dump_stack+0x173/0x1d0 [ 371.183379] kmsan_report+0x12e/0x2a0 [ 371.187231] __msan_warning+0x82/0xf0 [ 371.191063] gue_err+0x482/0xb00 [ 371.194475] ? fou_build_header+0x690/0x690 [ 371.198814] __udp4_lib_err+0x12e6/0x1d40 [ 371.203035] udp_err+0x74/0x90 [ 371.206254] ? __udp4_lib_err+0x1d40/0x1d40 [ 371.210599] icmp_unreach+0xb65/0x1070 [ 371.214534] ? icmp_discard+0x30/0x30 [ 371.218346] icmp_rcv+0x11a1/0x1950 [ 371.222007] ? local_bh_enable+0x40/0x40 [ 371.226079] ip_protocol_deliver_rcu+0x584/0xba0 [ 371.230867] ip_local_deliver+0x624/0x7b0 [ 371.235070] ? ip_local_deliver+0x7b0/0x7b0 [ 371.239402] ? ip_protocol_deliver_rcu+0xba0/0xba0 [ 371.244347] ip_rcv+0x6b6/0x740 [ 371.247651] ? ip_rcv_core+0x11c0/0x11c0 [ 371.251738] process_backlog+0x756/0x10e0 [ 371.255914] ? ip_local_deliver_finish+0x320/0x320 [ 371.260861] ? rps_trigger_softirq+0x2e0/0x2e0 [ 371.265456] net_rx_action+0x78b/0x1a60 [ 371.269470] ? net_tx_action+0xca0/0xca0 [ 371.273549] __do_softirq+0x53f/0x93a [ 371.277376] ? ksoftirqd_should_run+0x30/0x30 [ 371.281884] run_ksoftirqd+0x26/0x50 [ 371.285800] smpboot_thread_fn+0x4d0/0x9f0 [ 371.290065] kthread+0x4a1/0x4e0 [ 371.293442] ? cpu_report_death+0x190/0x190 [ 371.297767] ? schedule_tail+0x1b2/0x410 [ 371.301841] ? kthread_blkcg+0xf0/0xf0 [ 371.305742] ret_from_fork+0x35/0x40 [ 371.309476] [ 371.311100] Uninit was created at: [ 371.314648] kmsan_internal_poison_shadow+0x92/0x150 [ 371.319757] kmsan_kmalloc+0xa6/0x130 [ 371.323566] kmsan_slab_alloc+0xe/0x10 [ 371.327458] __kmalloc_node_track_caller+0xe9e/0xff0 [ 371.332569] __alloc_skb+0x309/0xa20 [ 371.336289] alloc_skb_with_frags+0x1c7/0xac0 [ 371.340793] sock_alloc_send_pskb+0xafd/0x10a0 [ 371.345386] sock_alloc_send_skb+0xca/0xe0 [ 371.349733] __ip_append_data+0x34cd/0x5000 [ 371.354069] ip_append_data+0x324/0x480 [ 371.358057] icmp_push_reply+0x23d/0x7e0 [ 371.362126] icmp_send+0x2e74/0x30c0 [ 371.365848] ipv4_link_failure+0x5e/0x220 [ 371.369996] arp_error_report+0x106/0x1a0 [ 371.374153] neigh_invalidate+0x359/0x8e0 [ 371.378304] neigh_timer_handler+0xdf2/0x1280 [ 371.382806] call_timer_fn+0x285/0x600 [ 371.386725] __run_timers+0xdb4/0x11d0 [ 371.390617] run_timer_softirq+0x2e/0x50 [ 371.394697] __do_softirq+0x53f/0x93a [ 371.398491] ================================================================== [ 371.405847] Disabling lock debugging due to kernel taint [ 371.411293] Kernel panic - not syncing: panic_on_warn set ... [ 371.417186] CPU: 1 PID: 16 Comm: ksoftirqd/1 Tainted: G B 5.0.0-rc1+ #9 [ 371.425246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.434602] Call Trace: [ 371.437208] dump_stack+0x173/0x1d0 [ 371.440854] panic+0x3d1/0xb01 [ 371.444100] kmsan_report+0x293/0x2a0 [ 371.447923] __msan_warning+0x82/0xf0 [ 371.451753] gue_err+0x482/0xb00 [ 371.455161] ? fou_build_header+0x690/0x690 [ 371.459493] __udp4_lib_err+0x12e6/0x1d40 [ 371.463703] udp_err+0x74/0x90 [ 371.466911] ? __udp4_lib_err+0x1d40/0x1d40 [ 371.471246] icmp_unreach+0xb65/0x1070 [ 371.475166] ? icmp_discard+0x30/0x30 [ 371.478973] icmp_rcv+0x11a1/0x1950 [ 371.482631] ? local_bh_enable+0x40/0x40 [ 371.486728] ip_protocol_deliver_rcu+0x584/0xba0 [ 371.491529] ip_local_deliver+0x624/0x7b0 [ 371.495725] ? ip_local_deliver+0x7b0/0x7b0 [ 371.500056] ? ip_protocol_deliver_rcu+0xba0/0xba0 [ 371.504999] ip_rcv+0x6b6/0x740 [ 371.508303] ? ip_rcv_core+0x11c0/0x11c0 [ 371.512380] process_backlog+0x756/0x10e0 [ 371.516567] ? ip_local_deliver_finish+0x320/0x320 [ 371.521513] ? rps_trigger_softirq+0x2e0/0x2e0 [ 371.526108] net_rx_action+0x78b/0x1a60 [ 371.530121] ? net_tx_action+0xca0/0xca0 [ 371.534198] __do_softirq+0x53f/0x93a [ 371.538030] ? ksoftirqd_should_run+0x30/0x30 [ 371.542539] run_ksoftirqd+0x26/0x50 [ 371.546269] smpboot_thread_fn+0x4d0/0x9f0 [ 371.550535] kthread+0x4a1/0x4e0 [ 371.553921] ? cpu_report_death+0x190/0x190 [ 371.558248] ? schedule_tail+0x1b2/0x410 [ 371.562332] ? kthread_blkcg+0xf0/0xf0 [ 371.566242] ret_from_fork+0x35/0x40 [ 371.570680] Kernel Offset: disabled [ 371.574319] Rebooting in 86400 seconds..