[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 101.171754] audit: type=1800 audit(1547910229.218:25): pid=10658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 101.191374] audit: type=1800 audit(1547910229.238:26): pid=10658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 101.210846] audit: type=1800 audit(1547910229.248:27): pid=10658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.247' (ECDSA) to the list of known hosts. 2019/01/19 15:04:06 fuzzer started 2019/01/19 15:04:11 dialing manager at 10.128.0.26:42919 2019/01/19 15:04:11 syscalls: 1 2019/01/19 15:04:11 code coverage: enabled 2019/01/19 15:04:11 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/01/19 15:04:11 extra coverage: extra coverage is not supported by the kernel 2019/01/19 15:04:11 setuid sandbox: enabled 2019/01/19 15:04:11 namespace sandbox: enabled 2019/01/19 15:04:11 Android sandbox: /sys/fs/selinux/policy does not exist 2019/01/19 15:04:11 fault injection: enabled 2019/01/19 15:04:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/01/19 15:04:11 net packet injection: enabled 2019/01/19 15:04:11 net device setup: enabled 15:07:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) syzkaller login: [ 318.724039] IPVS: ftp: loaded support on port[0] = 21 [ 318.896098] chnl_net:caif_netlink_parms(): no params data found [ 318.976976] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.983741] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.992521] device bridge_slave_0 entered promiscuous mode [ 319.002719] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.009251] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.018080] device bridge_slave_1 entered promiscuous mode [ 319.055439] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 319.067912] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 319.101098] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 319.109985] team0: Port device team_slave_0 added [ 319.117320] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 319.126268] team0: Port device team_slave_1 added [ 319.132737] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 319.141807] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 319.328215] device hsr_slave_0 entered promiscuous mode [ 319.552624] device hsr_slave_1 entered promiscuous mode [ 319.603397] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 319.611047] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 319.643539] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.650124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.657389] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.664054] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.765189] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 319.771338] 8021q: adding VLAN 0 to HW filter on device bond0 [ 319.788899] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 319.803779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.815675] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.825000] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.837839] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 319.855045] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 319.861146] 8021q: adding VLAN 0 to HW filter on device team0 [ 319.878247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 319.885549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 319.896222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 319.904593] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.911125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.927572] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 319.939938] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 319.948831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 319.957655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 319.966072] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.972640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.981241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 319.996871] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 320.009088] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 320.022810] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 320.033271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 320.042704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 320.052273] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 320.061144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 320.070396] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 320.084774] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 320.098441] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 320.109193] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 320.119061] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 320.131365] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 320.139536] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 320.148266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 320.156979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 320.166054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 320.174854] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 320.185990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 320.219248] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 320.240477] 8021q: adding VLAN 0 to HW filter on device batadv0 15:07:28 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 15:07:28 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x8c, 0x1, 0x0, 0x0, 0x0) 15:07:28 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) r1 = open(&(0x7f0000000240)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) pipe(&(0x7f0000000280)) 15:07:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) fcntl$setpipe(r0, 0x407, 0x0) 15:07:29 executing program 0: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) seccomp(0x1, 0x0, 0x0) 15:07:29 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2900, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x7fffffff, 0x3, 0x7ff, 0x100000000, 0x80, r1}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={0x0, r0, 0x4, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000940)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000000a40)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000a80)={@empty, 0x49, r2}) r3 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x810) 15:07:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1f000000180081ac02041cecff091ffa1c1400000049778a28761a485ead3a", 0x1f}], 0x1}, 0x0) [ 321.386767] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 15:07:29 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cTu.stat\x00', 0x0, 0x0) r3 = semget(0x3, 0x3, 0x50) semctl$SETVAL(r3, 0x6, 0x10, &(0x7f0000000380)=0xe9) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0xfffffffffffffe61) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000140)={[], 0x8d, 0x7, 0x6, 0x0, 0x7, 0xf006, 0x2000, [], 0x2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) prctl$PR_SET_FPEXC(0xc, 0x80) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x5) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000100)={0x5, 0x0, 0x2, 0x2, 0x1}, 0xc) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0xe0000000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x4e22, @multicast1}], 0x20) r4 = msgget(0x2, 0x42) msgrcv(r4, &(0x7f00000003c0)={0x0, ""/29}, 0x25, 0x2, 0x0) 15:07:29 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cTu.stat\x00', 0x0, 0x0) r3 = semget(0x3, 0x3, 0x50) semctl$SETVAL(r3, 0x6, 0x10, &(0x7f0000000380)=0xe9) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0xfffffffffffffe61) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000140)={[], 0x8d, 0x7, 0x6, 0x0, 0x7, 0xf006, 0x2000, [], 0x2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) prctl$PR_SET_FPEXC(0xc, 0x80) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x5) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000100)={0x5, 0x0, 0x2, 0x2, 0x1}, 0xc) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0xe0000000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x4e22, @multicast1}], 0x20) r4 = msgget(0x2, 0x42) msgrcv(r4, &(0x7f00000003c0)={0x0, ""/29}, 0x25, 0x2, 0x0) 15:07:29 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cTu.stat\x00', 0x0, 0x0) r3 = semget(0x3, 0x3, 0x50) semctl$SETVAL(r3, 0x6, 0x10, &(0x7f0000000380)=0xe9) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0xfffffffffffffe61) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000140)={[], 0x8d, 0x7, 0x6, 0x0, 0x7, 0xf006, 0x2000, [], 0x2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) prctl$PR_SET_FPEXC(0xc, 0x80) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x5) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000100)={0x5, 0x0, 0x2, 0x2, 0x1}, 0xc) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0xe0000000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x4e22, @multicast1}], 0x20) r4 = msgget(0x2, 0x42) msgrcv(r4, &(0x7f00000003c0)={0x0, ""/29}, 0x25, 0x2, 0x0) 15:07:29 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cTu.stat\x00', 0x0, 0x0) r3 = semget(0x3, 0x3, 0x50) semctl$SETVAL(r3, 0x6, 0x10, &(0x7f0000000380)=0xe9) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0xfffffffffffffe61) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000140)={[], 0x8d, 0x7, 0x6, 0x0, 0x7, 0xf006, 0x2000, [], 0x2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) prctl$PR_SET_FPEXC(0xc, 0x80) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x5) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000100)={0x5, 0x0, 0x2, 0x2, 0x1}, 0xc) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0xe0000000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x4e22, @multicast1}], 0x20) r4 = msgget(0x2, 0x42) msgrcv(r4, &(0x7f00000003c0)={0x0, ""/29}, 0x25, 0x2, 0x0) 15:07:29 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cTu.stat\x00', 0x0, 0x0) r3 = semget(0x3, 0x3, 0x50) semctl$SETVAL(r3, 0x6, 0x10, &(0x7f0000000380)=0xe9) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0xfffffffffffffe61) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000140)={[], 0x8d, 0x7, 0x6, 0x0, 0x7, 0xf006, 0x2000, [], 0x2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) prctl$PR_SET_FPEXC(0xc, 0x80) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x5) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000100)={0x5, 0x0, 0x2, 0x2, 0x1}, 0xc) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0xe0000000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x4e22, @multicast1}], 0x20) msgget(0x2, 0x42) 15:07:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cTu.stat\x00', 0x0, 0x0) r3 = semget(0x3, 0x3, 0x50) semctl$SETVAL(r3, 0x6, 0x10, &(0x7f0000000380)=0xe9) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0xfffffffffffffe61) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000140)={[], 0x8d, 0x7, 0x6, 0x0, 0x7, 0xf006, 0x2000, [], 0x2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) prctl$PR_SET_FPEXC(0xc, 0x80) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x5) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000100)={0x5, 0x0, 0x2, 0x2, 0x1}, 0xc) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0xe0000000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x4e22, @multicast1}], 0x20) 15:07:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cTu.stat\x00', 0x0, 0x0) r3 = semget(0x3, 0x3, 0x50) semctl$SETVAL(r3, 0x6, 0x10, &(0x7f0000000380)=0xe9) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0xfffffffffffffe61) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000140)={[], 0x8d, 0x7, 0x6, 0x0, 0x7, 0xf006, 0x2000, [], 0x2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) prctl$PR_SET_FPEXC(0xc, 0x80) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x5) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000100)={0x5, 0x0, 0x2, 0x2, 0x1}, 0xc) ioctl$int_in(r1, 0x5452, &(0x7f0000000400)=0xe0000000) 15:07:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cTu.stat\x00', 0x0, 0x0) r3 = semget(0x3, 0x3, 0x50) semctl$SETVAL(r3, 0x6, 0x10, &(0x7f0000000380)=0xe9) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0xfffffffffffffe61) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000140)={[], 0x8d, 0x7, 0x6, 0x0, 0x7, 0xf006, 0x2000, [], 0x2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) prctl$PR_SET_FPEXC(0xc, 0x80) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x5) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000100)={0x5, 0x0, 0x2, 0x2, 0x1}, 0xc) 15:07:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cTu.stat\x00', 0x0, 0x0) r3 = semget(0x3, 0x3, 0x50) semctl$SETVAL(r3, 0x6, 0x10, &(0x7f0000000380)=0xe9) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0xfffffffffffffe61) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000140)={[], 0x8d, 0x7, 0x6, 0x0, 0x7, 0xf006, 0x2000, [], 0x2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) prctl$PR_SET_FPEXC(0xc, 0x80) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x5) 15:07:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cTu.stat\x00', 0x0, 0x0) r3 = semget(0x3, 0x3, 0x50) semctl$SETVAL(r3, 0x6, 0x10, &(0x7f0000000380)=0xe9) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0xfffffffffffffe61) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000140)={[], 0x8d, 0x7, 0x6, 0x0, 0x7, 0xf006, 0x2000, [], 0x2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) prctl$PR_SET_FPEXC(0xc, 0x80) 15:07:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cTu.stat\x00', 0x0, 0x0) r3 = semget(0x3, 0x3, 0x50) semctl$SETVAL(r3, 0x6, 0x10, &(0x7f0000000380)=0xe9) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0xfffffffffffffe61) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000140)={[], 0x8d, 0x7, 0x6, 0x0, 0x7, 0xf006, 0x2000, [], 0x2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) 15:07:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cTu.stat\x00', 0x0, 0x0) r3 = semget(0x3, 0x3, 0x50) semctl$SETVAL(r3, 0x6, 0x10, &(0x7f0000000380)=0xe9) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0xfffffffffffffe61) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) 15:07:30 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x3, 0x2}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r1, 0x100}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={r1, 0x8adf}, &(0x7f0000000240)=0x8) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000002c0)=0x7, 0x4) seccomp(0x0, 0x0, &(0x7f0000000340)={0x2, &(0x7f0000000300)=[{0x20, 0x0, 0x3, 0x7}, {0x2, 0x5, 0x3, 0x63847f7b}]}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000380)={{0x8f2, 0x8001}, {0x1, 0x1}, 0x100, 0x2}) r3 = add_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="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", 0x1000, 0xfffffffffffffff8) keyctl$assume_authority(0x10, r3) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001540)={r2, &(0x7f0000001480)="793e746f77780ad55ee67c2c8a6886c1b046dc3a20d3bfed1e5a283c3ce9c0517c57c906025022466b67e1854cb55cacd0770746493427dabfc8dc2239638fb6ab807bca", &(0x7f0000001500)=""/56}, 0x18) add_key(&(0x7f0000001580)='.dead\x00', &(0x7f00000015c0)={'syz', 0x3}, &(0x7f0000001600)="5c7ee027f7cf84741323a84edbc51373", 0x10, r3) stat(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r3, r4, r5) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x19) ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000001780)) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f00000017c0)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001840)={&(0x7f0000001800)='./file0\x00', r2}, 0x10) ioctl$RTC_AIE_ON(r0, 0x7001) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000001880)=""/188) rt_sigtimedwait(&(0x7f0000001940)={0x1f}, &(0x7f0000001980), &(0x7f0000001a00)={0x77359400}, 0x8) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001a40)=""/17) ioctl$TCSBRK(r0, 0x5409, 0x0) rt_sigtimedwait(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001b40), 0x8) r6 = fcntl$getown(r0, 0x9) prlimit64(r6, 0xf, &(0x7f0000001b80)={0x2, 0x100}, &(0x7f0000001bc0)) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000001c00)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000001d40)={r7, &(0x7f0000001c40)=""/220}) 15:07:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cTu.stat\x00', 0x0, 0x0) r3 = semget(0x3, 0x3, 0x50) semctl$SETVAL(r3, 0x6, 0x10, &(0x7f0000000380)=0xe9) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) 15:07:31 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cTu.stat\x00', 0x0, 0x0) r2 = semget(0x3, 0x3, 0x50) semctl$SETVAL(r2, 0x6, 0x10, &(0x7f0000000380)=0xe9) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) [ 323.285013] IPVS: ftp: loaded support on port[0] = 21 15:07:31 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cTu.stat\x00', 0x0, 0x0) semget(0x3, 0x3, 0x50) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) [ 323.459508] chnl_net:caif_netlink_parms(): no params data found 15:07:31 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cTu.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) [ 323.603541] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.610086] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.618571] device bridge_slave_0 entered promiscuous mode [ 323.628761] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.635469] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.643739] device bridge_slave_1 entered promiscuous mode 15:07:31 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) [ 323.687361] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 323.700044] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 323.784058] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 323.793034] team0: Port device team_slave_0 added [ 323.813570] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 323.822407] team0: Port device team_slave_1 added 15:07:31 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) [ 323.829917] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 323.845162] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 323.949136] device hsr_slave_0 entered promiscuous mode 15:07:32 executing program 0: setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) [ 323.999529] device hsr_slave_1 entered promiscuous mode [ 324.044902] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 324.052685] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 324.109847] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.116520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.123707] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.130259] bridge0: port 1(bridge_slave_0) entered forwarding state 15:07:32 executing program 0: setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) [ 324.291414] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 324.297787] 8021q: adding VLAN 0 to HW filter on device bond0 [ 324.326476] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 324.340430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 324.358848] bridge0: port 1(bridge_slave_0) entered disabled state 15:07:32 executing program 0: setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) [ 324.385307] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.404127] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 324.443719] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 324.449838] 8021q: adding VLAN 0 to HW filter on device team0 [ 324.488338] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 324.498592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 324.507433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 324.515855] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.522422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.543885] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 324.557954] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 324.566146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 324.575561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 324.583855] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.590345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.598404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 324.618580] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 324.633620] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready 15:07:32 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) [ 324.647481] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 324.663461] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 324.671511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 324.680964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 324.689911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 324.698809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 324.707988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 324.716763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 324.725396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 324.737472] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 324.757425] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 324.764508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 324.773287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 324.813373] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 324.819458] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 324.851232] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 324.881425] 8021q: adding VLAN 0 to HW filter on device batadv0 15:07:33 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) 15:07:34 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) 15:07:34 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) 15:07:34 executing program 0: socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) 15:07:34 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = dup(r0) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) unshare(0x20400) listen(r1, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) sendmsg$nl_route_sched(r3, &(0x7f0000000400)={&(0x7f00000001c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=@gettfilter={0x5c, 0x2e, 0x123, 0x70bd2d, 0x25dfdbfd, {0x0, r4, {0xf, 0x1f}, {0xffeb, 0xffff}, {0xc, 0xffef}}, [{0x8}, {0x8, 0xb, 0x5}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x4}, {0x8, 0xb, 0xfffffffffffffff9}, {0x8, 0xb, 0x100000001}, {0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40400c0}, 0x4000080) r5 = socket$unix(0x1, 0x1, 0x0) connect(r5, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r6 = gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0xfffffffffffffffe, @thr={&(0x7f0000000040), &(0x7f00000001c0)}}, &(0x7f0000000000)) ioctl$void(r1, 0x5451) getsockopt$IP_VS_SO_GET_TIMEOUT(r5, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000100)=0xc) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) r7 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_G_CROP(r7, 0xc038563b, &(0x7f0000000080)={0x1, 0x0, {0xf95, 0xbe4, 0x0, 0x7d4}}) tkill(r6, 0x1000000000013) setsockopt$inet_tcp_buf(r7, 0x6, 0x21, &(0x7f0000000440)="aebe3734b85678c208661615878bfa4b0a30068904dc8e910290153ac5c6b5d84023b753167aeb00361ba1a07a83e38e3420bc7b305cf598914305d1c2d1d8b8f353cdc1ea05ad4bf27e46d50622628c8281bfc72f83253ac7c11b667781184908c8f80606b3c056d9d8e80f89e9a705130a78f19e9a2484fc8332322d1be64e2fa6fdc4fc62c2e650c5e5411c068066525d0ae3102d11e962a6b055bc08d62448f75aa730cc1e5d2a151e6b6a407f3d6b6a4d7e002c2bedd5350e8398d8a7750a13ce573a817673609409028b7b28081f5b8a29", 0xd4) ioctl$BLKGETSIZE(r3, 0x1260, &(0x7f0000000540)) listen(r1, 0x131) 15:07:34 executing program 0: socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) 15:07:34 executing program 0: socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote, 0x6}], 0x1c) 15:07:34 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) 15:07:34 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) 15:07:34 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) 15:07:34 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x0) 15:07:35 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x0) 15:07:35 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x0) 15:07:35 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:07:35 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote}], 0x1c) 15:07:35 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote}], 0x1c) 15:07:37 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000400), 0x4) 15:07:37 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote}], 0x1c) 15:07:37 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40000, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0xd1, 0x11, 0xffffffff86efe836, 0x7, "e41b49234d11cdb3729eecafa0d8b111e7693cf57e925f857acdcda547403497"}) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/229) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000200)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000000300)=[0xffffffffffffffff, 0xee00, 0xee00, 0xee00, 0xee01, 0x0, 0xffffffffffffffff]) setregid(r2, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='mountstats\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000380)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0xffffffffffffffe0, 0xfe, "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", 0x99, 0x80, 0x7, 0x7, 0x5, 0x8, 0xa267}, r5}}, 0x120) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000540)={0x33, 0x6, 0x0, {0x3, 0x3, 0xa, 0x0, '/dev/vbi#\x00'}}, 0x33) ioctl$EVIOCSFF(r4, 0x40304580, &(0x7f0000000580)={0x57, 0xe2, 0x4, {0x2}, {0x0, 0x100000001}, @const={0x7ff, {0x8a1, 0x7, 0xa99, 0x90}}}) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f00000005c0)=""/155) socket$vsock_dgram(0x28, 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x48a, &(0x7f0000000680)={0x3c1e, 0x100, 0x2}, 0xc) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f00000006c0)={0x87, @multicast2, 0x4e23, 0x4, 'none\x00', 0x5, 0x81, 0x2e}, 0x2c) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, &(0x7f0000000700)={'veth0_to_team\x00', {0x2, 0x4e22, @broadcast}}) getrlimit(0x6, &(0x7f0000000740)) unshare(0x40000000) ioctl$VIDIOC_S_PARM(r4, 0xc0cc5616, &(0x7f0000000780)={0xf, @capture={0x1000, 0x1, {0x0, 0x1f}, 0x8, 0x5}}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000880)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, &(0x7f00000008c0)=0x10) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000900)={0x5, 0x6}) ioctl$BLKRAGET(r4, 0x1263, &(0x7f0000000940)) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000009c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000ac0)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)={0x74, r6, 0x306, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x4}]}, 0x74}, 0x1, 0x0, 0x0, 0x10}, 0x844) openat$null(0xffffffffffffff9c, 0xffffffffffffffff, 0x200, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000b00)=""/127, &(0x7f0000000b80)=0x7f) mount(&(0x7f0000000bc0)=@nullb='/dev/nullb0\x00', &(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)='ext4\x00', 0x1008004, &(0x7f0000000c80)='ppp1]vmnet0lo\x00') 15:07:37 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) [ 329.627768] FAULT_INJECTION: forcing a failure. [ 329.627768] name failslab, interval 1, probability 0, space 0, times 1 [ 329.639408] CPU: 1 PID: 11009 Comm: syz-executor0 Not tainted 5.0.0-rc1+ #7 [ 329.646573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.655964] Call Trace: [ 329.658663] dump_stack+0x173/0x1d0 [ 329.662376] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 329.667627] should_fail+0xa19/0xb20 [ 329.671451] __should_failslab+0x278/0x2a0 [ 329.675770] should_failslab+0x29/0x70 [ 329.679724] __kmalloc_node+0x200/0x1030 [ 329.683848] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 329.689357] ? kvmalloc_node+0x19f/0x3d0 [ 329.693519] kvmalloc_node+0x19f/0x3d0 [ 329.697483] vmemdup_user+0x80/0x250 [ 329.701302] sctp_setsockopt_bindx+0xd3/0x8f0 [ 329.705886] ? local_bh_enable+0x36/0x40 [ 329.710001] ? sctp_setsockopt+0x481/0x13560 [ 329.714466] sctp_setsockopt+0x1f15/0x13560 [ 329.718844] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 329.724102] ? sctp_shutdown+0x270/0x270 [ 329.728236] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 329.733500] ? sctp_shutdown+0x270/0x270 [ 329.737620] sock_common_setsockopt+0x13b/0x170 [ 329.742351] ? sock_common_recvmsg+0x290/0x290 [ 329.747023] __sys_setsockopt+0x493/0x540 [ 329.751243] __se_sys_setsockopt+0xdd/0x100 [ 329.755649] __x64_sys_setsockopt+0x62/0x80 [ 329.760083] do_syscall_64+0xbc/0xf0 [ 329.763896] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 329.769175] RIP: 0033:0x458099 15:07:37 executing program 1: getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000340)=ANY=[@ANYRES32=0x0], &(0x7f00000000c0)=0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x410, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x30d}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000020}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x54, r3, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x608}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000000000000000}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) [ 329.772419] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.791356] RSP: 002b:00007f1d74fa8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 329.799149] RAX: ffffffffffffffda RBX: 00007f1d74fa8c90 RCX: 0000000000458099 [ 329.806473] RDX: 0000000000000064 RSI: 0000000000000084 RDI: 0000000000000003 [ 329.813777] RBP: 000000000073bf00 R08: 000000000000001c R09: 0000000000000000 [ 329.821114] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f1d74fa96d4 [ 329.828434] R13: 00000000004cc9e0 R14: 00000000004da5a0 R15: 0000000000000004 15:07:38 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x2b, "5b650185f818970553c9f4fc01feae615873fc0b07930f9b61d5361015604cc1d683a92b5e125c7e3d61de"}, &(0x7f0000000000)=0x4f) r4 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x80000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000c, 0x31, 0xffffffffffffffff, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_origin(r5, &(0x7f0000000000)='trusted.overlay.origin\x00', 0x0, 0xfffffffffffffe29, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_ENUMSTD(r4, 0xc0485619, &(0x7f0000000140)={0x0, 0x0, "8941529d608add16c1ce0741eaec95ea010ac36fc7a489ee"}) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000400)={0x6, 0x8d9c, 0x10001, 0x8000000003, 0x20}, 0xffffff7a) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f00000001c0)=""/206) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 15:07:38 executing program 0 (fault-call:1 fault-nth:1): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) [ 330.059457] IPVS: ftp: loaded support on port[0] = 21 15:07:38 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000000c0)={0x7e, 0x9, 0xfff, 0x0, 0x0, 0x3}) 15:07:38 executing program 0: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80c0, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) [ 330.393144] chnl_net:caif_netlink_parms(): no params data found 15:07:38 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x7) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000080)={0x80000001, 0x400}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:07:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mice(&(0x7f0000001640)='/dev/input/mice\x00', 0x0, 0x20200) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0x93, "3742d37b64d8f2c9bbafea99571b505f9b6985087535f71114d0fbdbf699b2e2e0eaf0a6a490fd21e0ac844ad6abf976347c0f5df38cf5e1cd05ed56fa06743a839b54cbd0ce57a2b791d23a6363b7e76598d83b3be686d733d8d8213716565d4d450fcf64300de9daa82a869f8b9eb26eee84be258cfc9e1cb6c8dd2bd1c4eb569e57ccaf83aa47154f0ee78c21de4fc84f3a"}, &(0x7f0000000140)=0x9b) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r2, 0x1}, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000016c0)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f00000017c0)=0xe8) sendmsg$nl_route_sched(r1, &(0x7f0000001880)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001840)={&(0x7f0000001800)=@gettclass={0x24, 0x2a, 0x0, 0x70bd29, 0x25dfdbfb, {0x0, r3, {0x9, 0xffef}, {0xfff2, 0xd}, {0xc, 0x8}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@mcast2}, 0x14) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000040)=0x36) [ 330.534918] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.541452] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.549990] device bridge_slave_0 entered promiscuous mode [ 330.562934] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.569440] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.577982] device bridge_slave_1 entered promiscuous mode [ 330.640734] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 330.663514] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 330.732111] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 330.740848] team0: Port device team_slave_0 added [ 330.772323] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 330.780953] team0: Port device team_slave_1 added [ 330.805565] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 330.814330] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 15:07:38 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x2007b) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20080, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x4, 0xe14, &(0x7f0000000080)=0x9e}) 15:07:39 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = socket$unix(0x1, 0x5, 0x0) listen(r2, 0x0) shutdown(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x40002014}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) [ 330.937990] device hsr_slave_0 entered promiscuous mode 15:07:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x108800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) [ 330.992620] device hsr_slave_1 entered promiscuous mode [ 331.035045] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 331.054728] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 331.098742] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.105334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.112553] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.119094] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.237311] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 331.243493] 8021q: adding VLAN 0 to HW filter on device bond0 [ 331.294828] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 331.313802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.323575] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.333369] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.352815] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 331.372492] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 331.378607] 8021q: adding VLAN 0 to HW filter on device team0 [ 331.393913] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 331.401075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 331.409926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.418411] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.424956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.440794] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 331.453569] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 331.466406] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 331.474200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 331.483080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.491365] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.497975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.505761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 331.515224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 331.533630] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 331.546212] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 331.558911] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 331.571695] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 331.579238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 331.589109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 331.598053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 331.607341] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 331.616301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 331.624760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 331.633297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 331.641810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 331.652470] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 331.663090] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 331.669173] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 331.695404] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 331.715062] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 331.864260] IPVS: ftp: loaded support on port[0] = 21 [ 331.967403] IPVS: ftp: loaded support on port[0] = 21 15:07:43 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000780)=""/28, 0x1c) flock(r0, 0x5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000180)) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x1000000000013) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) 15:07:43 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@remote, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xfffffffffffffc44) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x6, 0x801) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000500)={0xfffffffffffffff9, {{0xa, 0x4e22, 0x6, @empty}}}, 0x88) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000200)={0x0, 0xfffffffffffffffd, 0x10}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={r3, 0x200}, 0x8) r4 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x3f, 0x0) getsockopt$inet_dccp_buf(r4, 0x21, 0xd, &(0x7f0000000080)=""/237, &(0x7f0000000180)=0xed) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={@local, @rand_addr="9399ab4dea76bfc16794d0b1dc283312", @rand_addr="49930d19e7a63ec6db19300d16f4a832", 0x7fff, 0x21, 0x8000000, 0x100, 0x1, 0x400010, r1}) 15:07:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) r3 = socket$l2tp(0x18, 0x1, 0x1) socketpair(0x9, 0x0, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r4, 0x0, 0x23, &(0x7f0000000100)={@dev={0xac, 0x14, 0x14, 0xe}, @multicast1}, 0x8) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) 15:07:43 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0x23, 0x8, 0xfffffffffffffc2b, 0x9}) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000180)={{0x3, 0xce2c5f8e62bac244, 0x101, 0x7}, 0x1, 0x10, 0x80, r1, 0x8, 0x610, 'syz1\x00', &(0x7f00000000c0)=['/proc/sys/net/ipv4/vs/cache_bypass\x00', '/proc/sys/net/ipv4/vs/cache_bypass\x00', ':wlan0\x00', '(vmnet1cpuset\x00', 'em1vmnet0ppp1\x00', 'ppp0\x00', '/proc/sys/net/ipv4/vs/cache_bypass\x00', '/proc/sys/net/ipv4/vs/cache_bypass\x00'], 0xb4, [], [0xff, 0x3, 0x1, 0x6]}) fcntl$addseals(r0, 0x409, 0xd) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000002c0)=0x2, 0x4) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000300)=""/24, 0x18, 0x3, 0x6046, 0x0, 0xc87, 0x3}, 0x120) ioctl$KDADDIO(r0, 0x4b34, 0x9) fchmod(r0, 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={r0, 0x10, &(0x7f00000004c0)={&(0x7f0000000480)=""/9, 0x9, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540)=r2, 0x4) write$FUSE_WRITE(r0, &(0x7f0000000580)={0x18, 0x0, 0x2, {0x7f16}}, 0x18) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/btrfs-control\x00', 0x1, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000600)={0x103ff, 0x0, &(0x7f0000ffe000/0x1000)=nil}) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0}, &(0x7f0000000780)=0xc) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f00000008c0)=0xe8) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000ac0)=0xe8) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000bc0)={{{@in=@multicast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000cc0)=0xe8) stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r3, &(0x7f0000000640)='system.posix_acl_default\x00', &(0x7f0000000e80)={{}, {0x1, 0x2}, [{0x2, 0x3, r4}, {0x2, 0x3, r5}, {0x2, 0x1, r6}, {0x2, 0x6, r7}, {0x2, 0x5, r8}, {0x2, 0x1, r9}, {0x2, 0x7, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x1, r12}], {0x10, 0x5}}, 0x6c, 0x1) r13 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000f00)='/proc/self/net/pfkey\x00', 0x88000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r13, 0xc00c642e, &(0x7f0000000f40)={0x0, 0x0, r13}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000f80)={r14, 0x80000, r13}) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000fc0)=""/106) syz_open_dev$mouse(&(0x7f0000001040)='/dev/input/mouse#\x00', 0x400000000000000, 0x400200) setsockopt$inet_mreq(r13, 0x0, 0x24, &(0x7f0000001080)={@remote, @local}, 0x8) 15:07:43 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x5, @empty, 0x9}}, 0x6, 0x3, 0x3, 0x3, 0x8}, &(0x7f0000000000)=0x98) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0x94f, 0x4, 0x0, 0x8001, 0x100000001}, 0x14) 15:07:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000040)={0x8, 0xf21, 0x68, 0x7, 0x8, 0x20}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@filter={'filter\x00', 0x44, 0x1, 0x90, [0x0, 0x0, 0x20000080], 0x0, 0x0, &(0x7f0000000080)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, {}, {0x0, '\x00', 0x1}]}, 0x108) 15:07:43 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={0x0, 0xef4}, &(0x7f0000000080)=0x8) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x80800) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={r1, 0xb4, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x1, @local, 0x3}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e21, 0x6, @local, 0x40}, @in6={0xa, 0x4e21, 0x7fff, @rand_addr="487c71d7956a015d98746ba9f541d69f", 0x6}, @in={0x2, 0x4e24, @broadcast}]}, &(0x7f00000001c0)=0x10) [ 335.759499] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain 15:07:44 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x6, 0x40005) r1 = dup(r0) write$tun(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000919ae52ceeefc2fc203ff07000000000000ffff04200600ff000000200820000000000010ffffffffff0000a152e6963939a6258b882d020000000000000006d5fd7cd6abfc0f7fdd273365a1fc47ffe0a181"], 0x2e) 15:07:44 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x1ff, 0x40400) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000000c0)={0x4, 0x2, 0x4, 0x20100401, {}, {0x7, 0x0, 0x7ff, 0x6, 0x4, 0x80000001, "6c9b999a"}, 0x1f, 0x0, @fd=r1, 0x4}) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:07:44 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) sched_getparam(r0, &(0x7f0000000000)) [ 336.279633] IPVS: ftp: loaded support on port[0] = 21 15:07:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x100000001, 0x981) ioctl$PPPIOCATTACH(r2, 0x4004743d, &(0x7f00000000c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$addseals(r0, 0x409, 0x8) syz_emit_ethernet(0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaa4000000092bf43eae5ac141400ac1423cd0e0090e15133da00000000000000000000000000"], &(0x7f0000000040)) 15:07:44 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x80, 0x800) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000140)={{0x101, 0x8}, {0x3, 0x101}, 0x1000, 0x1, 0x3}) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000080)={0x0, @bt={0xcfed, 0x8, 0x0, 0x2, 0x7fff, 0x1, 0x8, 0x44, 0x4, 0x7, 0x7, 0x81, 0x80000000, 0x3, 0x2, 0x6}}) 15:07:44 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) r1 = geteuid() quotactl(0x5c9d, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)="6b719b6faa2675bcbbf879e59e4ca8b12a108b4fe4327085043068b43ab4ffe064225618b7e96f57497ad2201cec799e5443a2ebc1618202b853ec4f5d305630c960f0d81c0fe91bbf4ba56ed88953377d623c78ef6feff17c636c40e927f0035b2cde7ef7c1ce9625") 15:07:44 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x2) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000080)={0x29, @multicast1, 0x4e23, 0x0, 'rr\x00', 0x21, 0x712, 0x41}, 0x2c) ioctl$UI_SET_SWBIT(r0, 0xc0105500, 0x7fffffffefff) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) [ 336.601340] chnl_net:caif_netlink_parms(): no params data found [ 336.846954] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.853780] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.862411] device bridge_slave_0 entered promiscuous mode [ 336.930075] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.936955] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.945693] device bridge_slave_1 entered promiscuous mode [ 336.999070] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 337.026873] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 337.067161] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 337.076223] team0: Port device team_slave_0 added [ 337.085155] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 337.094236] team0: Port device team_slave_1 added [ 337.100850] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 337.136406] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 337.236124] device hsr_slave_0 entered promiscuous mode [ 337.289456] device hsr_slave_1 entered promiscuous mode [ 337.363638] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 337.371511] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 337.405568] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.412300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.419545] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.426239] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.518197] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 337.525058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 337.535726] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.544771] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.559851] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 337.582013] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 337.597226] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 337.603764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 337.612815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 337.632361] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 337.638538] 8021q: adding VLAN 0 to HW filter on device team0 [ 337.654566] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 337.661991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 337.671016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 337.679559] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.686128] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.703666] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 337.711259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 337.720280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 337.729245] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.735838] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.753827] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 337.761025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 337.777884] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 337.785300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 337.804840] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 337.814597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 337.825059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 337.842777] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 337.850468] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 337.859614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 337.868954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 337.885306] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 337.898224] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 337.906952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 337.915764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.924319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 337.932800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.947737] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 337.954049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 337.982328] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 338.006754] 8021q: adding VLAN 0 to HW filter on device batadv0 15:07:46 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000140)={0x79, 0x0, [0x8, 0x80000000, 0x4e99, 0xa00]}) io_setup(0xbd, &(0x7f0000000080)=0x0) io_getevents(r2, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)={0x77359400}) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) exit(0x0) 15:07:46 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000180)={0x0, @bt={0x7f, 0x0, 0x0, 0x2, 0x8, 0x4, 0x1000, 0x2, 0x100000000, 0x1, 0x4, 0x3, 0x1cc0, 0x3, 0x3, 0xa}}) socket$inet(0x2, 0x80000, 0x50) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x10) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x80001, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f0000000100)={{0x1, 0x401, 0x100000001, 0x7, 0x800, 0x5}, 0x6}) 15:07:46 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) ioctl(r3, 0x200, &(0x7f0000000140)="b9245862f7a946e628d4d9cd61b0145d4cd0e93250bc060f46309b6a282d9b1d3881aa5bef70bc53a4316dc1912a922f7db52320b11e5db277f6906ed15ca6bf895b6536aae74f54c4e729fa6535c57406a5dbb356b4886b15668c3791c8af5ced7884bc497bd6e8fea5da5218a9799063955fa7489482f7d128d47a3993c2c8a06771574950afb107ca") ioctl$TIOCLINUX4(r4, 0x541c, &(0x7f0000000440)) setsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000040)=0x100000001, 0x4) mount(0x0, 0x0, 0x0, 0x4000000000, &(0x7f0000000280)='b\x94\xa03\x1e\xba\xcfj+\xf4Czm\xf4\'\xe3\xdd\xdf\xa3\x90\xb8\x83w\xb6z\x9fK\x12g\xd5lE\xf5J\xe0h|P\xbc\xa7G\f\x80\xf6t\xeb\xc1\xfaD\xfdZ\xfdC \x85\xd8\xc1;\x99\xba\xd8\b\x00\x00\x00\xafF\x15\xf7~\xaer#\x11\xfa\x98\xc4$\x00\a\xe0\f\xcf{0G\x9f\xcb\xee\x9ch\x0e\xea2wh\xa7\xae\xc0\"\xfbH*\x03\xf0R\x86v\r\x93\x91\x14*\a\xf4J\xc6\xa6I\x1a\xea\xfd\xfdN\xa6\x96K\xa7\'\x83\xfd') setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000480), 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:46 executing program 2: r0 = getpid() waitid(0xffff, r0, 0x0, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000080)={0x80000000, 0x3, 0x4, 0x4001000, {}, {0x1, 0x0, 0x3, 0xfffffffffffffffa, 0x873b, 0x6, "b60c7ad2"}, 0x0, 0x1, @planes=&(0x7f0000000040)={0x66b, 0xaa7b, @mem_offset=0x500000000, 0x9}, 0x4}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000002440)='/dev/vga_arbiter\x00', 0x101400, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000002480)={0x78, {{0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}}}, 0x88) 15:07:46 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) ioctl(r3, 0x200, &(0x7f0000000140)="b9245862f7a946e628d4d9cd61b0145d4cd0e93250bc060f46309b6a282d9b1d3881aa5bef70bc53a4316dc1912a922f7db52320b11e5db277f6906ed15ca6bf895b6536aae74f54c4e729fa6535c57406a5dbb356b4886b15668c3791c8af5ced7884bc497bd6e8fea5da5218a9799063955fa7489482f7d128d47a3993c2c8a06771574950afb107ca") ioctl$TIOCLINUX4(r4, 0x541c, &(0x7f0000000440)) setsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000040)=0x100000001, 0x4) mount(0x0, 0x0, 0x0, 0x4000000000, &(0x7f0000000280)='b\x94\xa03\x1e\xba\xcfj+\xf4Czm\xf4\'\xe3\xdd\xdf\xa3\x90\xb8\x83w\xb6z\x9fK\x12g\xd5lE\xf5J\xe0h|P\xbc\xa7G\f\x80\xf6t\xeb\xc1\xfaD\xfdZ\xfdC \x85\xd8\xc1;\x99\xba\xd8\b\x00\x00\x00\xafF\x15\xf7~\xaer#\x11\xfa\x98\xc4$\x00\a\xe0\f\xcf{0G\x9f\xcb\xee\x9ch\x0e\xea2wh\xa7\xae\xc0\"\xfbH*\x03\xf0R\x86v\r\x93\x91\x14*\a\xf4J\xc6\xa6I\x1a\xea\xfd\xfdN\xa6\x96K\xa7\'\x83\xfd') setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000480), 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:46 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000040)=0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) mmap(&(0x7f00002e4000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r2, 0x1, 0x7, &(0x7f0000ac5000), 0x4) recvfrom$unix(r2, &(0x7f0000000200)=""/78, 0x4e, 0x40, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x53, 0x0) r3 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r3, &(0x7f00000001c0)="16", 0x1) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x1, 0x2) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) write$binfmt_elf64(r3, 0x0, 0x0) io_destroy(r1) 15:07:46 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000080)={0x0, @reserved}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000140)) 15:07:46 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) ioctl(r3, 0x200, &(0x7f0000000140)="b9245862f7a946e628d4d9cd61b0145d4cd0e93250bc060f46309b6a282d9b1d3881aa5bef70bc53a4316dc1912a922f7db52320b11e5db277f6906ed15ca6bf895b6536aae74f54c4e729fa6535c57406a5dbb356b4886b15668c3791c8af5ced7884bc497bd6e8fea5da5218a9799063955fa7489482f7d128d47a3993c2c8a06771574950afb107ca") ioctl$TIOCLINUX4(r4, 0x541c, &(0x7f0000000440)) setsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000040)=0x100000001, 0x4) mount(0x0, 0x0, 0x0, 0x4000000000, &(0x7f0000000280)='b\x94\xa03\x1e\xba\xcfj+\xf4Czm\xf4\'\xe3\xdd\xdf\xa3\x90\xb8\x83w\xb6z\x9fK\x12g\xd5lE\xf5J\xe0h|P\xbc\xa7G\f\x80\xf6t\xeb\xc1\xfaD\xfdZ\xfdC \x85\xd8\xc1;\x99\xba\xd8\b\x00\x00\x00\xafF\x15\xf7~\xaer#\x11\xfa\x98\xc4$\x00\a\xe0\f\xcf{0G\x9f\xcb\xee\x9ch\x0e\xea2wh\xa7\xae\xc0\"\xfbH*\x03\xf0R\x86v\r\x93\x91\x14*\a\xf4J\xc6\xa6I\x1a\xea\xfd\xfdN\xa6\x96K\xa7\'\x83\xfd') setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000480), 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:46 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb8fe, 0x2) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x100) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c9c380}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x8) 15:07:47 executing program 0: r0 = accept$alg(0xffffffffffffff9c, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@rc={0x1f, {0x2000, 0x9, 0xff, 0x20, 0x4, 0x5}, 0x200}, 0x80) r1 = socket$inet6(0xa, 0x5, 0x40001) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:07:47 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) ioctl(r3, 0x200, &(0x7f0000000140)="b9245862f7a946e628d4d9cd61b0145d4cd0e93250bc060f46309b6a282d9b1d3881aa5bef70bc53a4316dc1912a922f7db52320b11e5db277f6906ed15ca6bf895b6536aae74f54c4e729fa6535c57406a5dbb356b4886b15668c3791c8af5ced7884bc497bd6e8fea5da5218a9799063955fa7489482f7d128d47a3993c2c8a06771574950afb107ca") ioctl$TIOCLINUX4(r4, 0x541c, &(0x7f0000000440)) setsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000040)=0x100000001, 0x4) mount(0x0, 0x0, 0x0, 0x4000000000, &(0x7f0000000280)='b\x94\xa03\x1e\xba\xcfj+\xf4Czm\xf4\'\xe3\xdd\xdf\xa3\x90\xb8\x83w\xb6z\x9fK\x12g\xd5lE\xf5J\xe0h|P\xbc\xa7G\f\x80\xf6t\xeb\xc1\xfaD\xfdZ\xfdC \x85\xd8\xc1;\x99\xba\xd8\b\x00\x00\x00\xafF\x15\xf7~\xaer#\x11\xfa\x98\xc4$\x00\a\xe0\f\xcf{0G\x9f\xcb\xee\x9ch\x0e\xea2wh\xa7\xae\xc0\"\xfbH*\x03\xf0R\x86v\r\x93\x91\x14*\a\xf4J\xc6\xa6I\x1a\xea\xfd\xfdN\xa6\x96K\xa7\'\x83\xfd') setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000480), 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:47 executing program 4: r0 = msgget$private(0x0, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)={0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000340)={{0x9, r1, r2, r3, r4, 0x80, 0xd50a}, 0xff, 0x4, 0x10000, 0x1000, 0x100000000, 0x3e84170c, r5, r6}) r7 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0xfff, 0x101000) getsockopt$IPT_SO_GET_INFO(r7, 0x0, 0x40, &(0x7f0000000400)={'security\x00'}, &(0x7f0000000480)=0x54) fstat(r7, &(0x7f00000004c0)) msgrcv(r0, &(0x7f0000000540)={0x0, ""/126}, 0x86, 0x3, 0x2800) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r7, &(0x7f0000000740)={&(0x7f0000000600), 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x48, r8, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x14b5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4004}, 0x4000) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r7, 0x6612) setsockopt$inet_sctp_SCTP_NODELAY(r7, 0x84, 0x3, &(0x7f0000000780)=0x5, 0x4) getegid() sendmsg$alg(r7, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000007c0)="40251545b5efcfe378c44e9b3bb274a06506501e0ee342c7fed0ab13daa626734a94b4a2c7a7ed83c07142849b545b9a5c624445fc5c3729326e2d1b4be0fbdef76c2d9977cf60455d95b79f2058eef5c152a2592f8229a239324103ecb44c529a5ae77a0e0b6f927c082534a0776e81edec94e170e14b216ee2bc6f2037fa075c30dccc43e4af3ad6d50f229f921d82a2bdc3fb07cea316c35de8b7af7f9d776fa28335fa1488ae53f8085dc1f8cdbf34866ad37a68d9603490263982f267588ccd501b13f39ce5c28358e8e36319f6ddfe48a4beff3889ccbce483e8", 0xdd}, {&(0x7f00000008c0)="71d96dae836740cc1f3dc6c02c95e34ec16877056f7fb1d6bf031647f2fc7441b87f2781e87e2c5bab7d41da01b2c208b832d7bc7f4fcd9a9e53e492e385c5f73052e32932a62b864b", 0x49}, {&(0x7f0000000940)="b96bbd56ac3e2cf0944b2e033db5cfa72e3386f6cb5c62a86b83c4290d1edbe37cc5155a9f38dd9a6343fe3d95c52f93d3c773dde28bddbf921f45efa979814db4b3c55b8ac9090b9364ffb2ba0c04dafaf6c07887dfbc7da97578f24c8c6cbf9a9058b52950fde4631f95acb381e050a8a5cfadd7a8f8ff6cb63cfbd7d35b6cab408c6f309060956282a6", 0x8b}], 0x3, &(0x7f0000000a40)=[@op={0x18, 0x117, 0x3, 0x929f2bc46e6d8d6}], 0x18, 0x40000}, 0x84) getsockname$inet(r7, &(0x7f0000000ac0)={0x2, 0x0, @local}, &(0x7f0000000b00)=0x10) r9 = accept4$inet6(r7, &(0x7f0000000b40)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000b80)=0x1c, 0x80000) write$sndseq(r7, &(0x7f0000000bc0)=[{0x6, 0x0, 0x200, 0x2, @tick=0x7ff, {0x8, 0x80000000}, {0x5, 0x1}, @time=@time}], 0x30) ioctl$RTC_WIE_ON(r7, 0x700f) kcmp(r5, r5, 0x0, r9, r7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r9, 0x84, 0x70, &(0x7f0000000c00)={0x0, @in6={{0xa, 0x4e22, 0x6, @empty, 0xffffffff}}, [0x2, 0x7fffffff, 0x6, 0x7, 0x7, 0x100000000, 0x2, 0x2, 0x8, 0x2800000000000000, 0xffffffff, 0x1000, 0x6, 0x382]}, &(0x7f0000000d00)=0x100) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000d40)={r10, 0x80}, 0x8) fsetxattr$trusted_overlay_nlink(r7, &(0x7f0000000d80)='trusted.overlay.nlink\x00', &(0x7f0000000dc0)={'U-', 0x2}, 0x28, 0x2) write$FUSE_BMAP(r7, &(0x7f0000000e00)={0x18, 0x0, 0x8, {0xba9a}}, 0x18) setsockopt$inet_sctp_SCTP_NODELAY(r7, 0x84, 0x3, &(0x7f0000000e40)=0x1, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000ec0)={r7, 0x28, &(0x7f0000000e80)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000f00)={r11, 0x6, 0x10}, 0xc) 15:07:47 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ppoll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000080)='hostfs\x00\x1a\x11\b\xf7E', 0x1020020, 0x0) mq_timedsend(r0, &(0x7f0000000240)="1859631d714ed1dde8164891d08cdd0756e3e3d81e71aa534fb686fd9c853facd740e90cd9f22f27ba0f2f28f342f1729024b9bc78722a5ec60f2974dbf18f1e9b04ab0768a6959921f4e263464cdd3d587f3df6f732228e07e4d8dace69bac71c9303ec6e4fe97f7393bca3ea81c50ea0c012c1831591ff4d322e51e384a277d52df6612d54f5358f1d1591ba153c8c1f89fa23e1a0fe01a0da25b55e5c86ab3bf50157a926f4a36458c274b4c4099b1c483516d2f551efc7151c91a4b6746765c925f2963160925090a6957a06a3b40c51bb1ba45f85c28617fa652ff044de", 0xe0, 0x7, &(0x7f0000000040)={0x0, 0x1c9c380}) 15:07:47 executing program 0: r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000001600), 0x80000) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001640)={0x0, 0x8001, 0x7f, 0x4, 0x0, 0x7, 0x0, 0x5, {0x0, @in6={{0xa, 0x4e21, 0x1, @loopback}}, 0x42, 0xffff, 0x8, 0x8, 0x2}}, &(0x7f0000001700)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000001740)={r1, 0x33, "8eecdcfa9e68a469144404a878b75d1c661dfe92acf8505d30984e24b0b53e88a38b33a92fd08b5ee5a5d3437a01eaef4640ec"}, &(0x7f0000001780)=0x3b) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:07:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x13, r1, 0x0) r2 = accept(r0, &(0x7f0000000000)=@ax25={{0x3, @netrom}, [@null, @rose, @bcast, @rose, @bcast, @remote, @null, @bcast]}, &(0x7f0000000100)=0x80) setsockopt$TIPC_MCAST_BROADCAST(r2, 0x10f, 0x85) getsockopt$sock_buf(r0, 0x1, 0x37, &(0x7f0000000240)=""/244, &(0x7f0000000080)=0xf4) 15:07:47 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) ioctl(r3, 0x200, &(0x7f0000000140)="b9245862f7a946e628d4d9cd61b0145d4cd0e93250bc060f46309b6a282d9b1d3881aa5bef70bc53a4316dc1912a922f7db52320b11e5db277f6906ed15ca6bf895b6536aae74f54c4e729fa6535c57406a5dbb356b4886b15668c3791c8af5ced7884bc497bd6e8fea5da5218a9799063955fa7489482f7d128d47a3993c2c8a06771574950afb107ca") ioctl$TIOCLINUX4(r4, 0x541c, &(0x7f0000000440)) setsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000040)=0x100000001, 0x4) mount(0x0, 0x0, 0x0, 0x4000000000, &(0x7f0000000280)='b\x94\xa03\x1e\xba\xcfj+\xf4Czm\xf4\'\xe3\xdd\xdf\xa3\x90\xb8\x83w\xb6z\x9fK\x12g\xd5lE\xf5J\xe0h|P\xbc\xa7G\f\x80\xf6t\xeb\xc1\xfaD\xfdZ\xfdC \x85\xd8\xc1;\x99\xba\xd8\b\x00\x00\x00\xafF\x15\xf7~\xaer#\x11\xfa\x98\xc4$\x00\a\xe0\f\xcf{0G\x9f\xcb\xee\x9ch\x0e\xea2wh\xa7\xae\xc0\"\xfbH*\x03\xf0R\x86v\r\x93\x91\x14*\a\xf4J\xc6\xa6I\x1a\xea\xfd\xfdN\xa6\x96K\xa7\'\x83\xfd') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:47 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @loopback}, {0x2, 0x4e23, @rand_addr=0x4}, 0x4, 0x0, 0x0, 0x0, 0xdaa, &(0x7f0000000000)='team0\x00', 0x4, 0x4411, 0x5}) r1 = socket$inet6(0xa, 0x6, 0x2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x0, 0x0) nanosleep(&(0x7f0000000180), &(0x7f00000001c0)) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:07:47 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) ioctl(r3, 0x200, &(0x7f0000000140)="b9245862f7a946e628d4d9cd61b0145d4cd0e93250bc060f46309b6a282d9b1d3881aa5bef70bc53a4316dc1912a922f7db52320b11e5db277f6906ed15ca6bf895b6536aae74f54c4e729fa6535c57406a5dbb356b4886b15668c3791c8af5ced7884bc497bd6e8fea5da5218a9799063955fa7489482f7d128d47a3993c2c8a06771574950afb107ca") ioctl$TIOCLINUX4(r4, 0x541c, &(0x7f0000000440)) setsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000040)=0x100000001, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:47 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)=""/246) dup3(0xffffffffffffffff, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) 15:07:47 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4122, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x800000009) 15:07:48 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) ioctl(r3, 0x200, &(0x7f0000000140)="b9245862f7a946e628d4d9cd61b0145d4cd0e93250bc060f46309b6a282d9b1d3881aa5bef70bc53a4316dc1912a922f7db52320b11e5db277f6906ed15ca6bf895b6536aae74f54c4e729fa6535c57406a5dbb356b4886b15668c3791c8af5ced7884bc497bd6e8fea5da5218a9799063955fa7489482f7d128d47a3993c2c8a06771574950afb107ca") ioctl$TIOCLINUX4(r4, 0x541c, &(0x7f0000000440)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:48 executing program 0: r0 = socket$inet6(0xa, 0x8, 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000300)=[@in6={0xa, 0x4e22, 0x5, @rand_addr="9e37f15dd657c9fbd34e24032a302efe"}], 0x1c) ioctl$KDDISABIO(r0, 0x4b37) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x400500, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f00000002c0)=0x4) getsockopt$inet6_dccp_int(r1, 0x21, 0xdc1d0bc9cc2472c5, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x2, 0x5}, &(0x7f0000000140)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={r2, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x19}]}, &(0x7f0000000240)=0x10) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000080)={0x3, 0x6}) write$P9_RLOPEN(r1, &(0x7f0000000280)={0x18, 0xd, 0x2, {{0x18, 0x0, 0x6}, 0xf9}}, 0x18) ioctl$KDDELIO(r1, 0x4b35, 0x6) ioctl$TCFLSH(r1, 0x540b, 0x1) 15:07:48 executing program 2: r0 = socket(0xa, 0x8, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) [ 340.511034] IPVS: ftp: loaded support on port[0] = 21 [ 340.994119] chnl_net:caif_netlink_parms(): no params data found [ 341.065810] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.072570] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.081406] device bridge_slave_0 entered promiscuous mode [ 341.090980] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.097630] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.106302] device bridge_slave_1 entered promiscuous mode [ 341.145274] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 341.157936] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 341.191939] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 341.200977] team0: Port device team_slave_0 added [ 341.208058] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 341.217314] team0: Port device team_slave_1 added [ 341.224457] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 341.234015] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 341.310662] device hsr_slave_0 entered promiscuous mode [ 341.404903] device hsr_slave_1 entered promiscuous mode [ 341.563660] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 341.571494] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 341.608938] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.615753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.623052] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.629589] bridge0: port 1(bridge_slave_0) entered forwarding state [ 341.745096] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 341.751252] 8021q: adding VLAN 0 to HW filter on device bond0 [ 341.769928] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 341.788678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 341.800545] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.811273] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.826529] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 341.847753] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 341.856217] 8021q: adding VLAN 0 to HW filter on device team0 [ 341.873455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 341.882067] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.888590] bridge0: port 1(bridge_slave_0) entered forwarding state [ 341.926013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 341.934646] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.941172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.989269] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 341.999231] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 342.011344] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 342.027931] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 342.037953] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 342.048430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 342.057341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 342.085626] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 342.107219] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 342.115296] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 342.124603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 15:07:50 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x2, 0x7, 0x0, 0x6, 0x2}, 0x10}}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in=@multicast1, 0x0, 0x0, 0x0, 0x6, 0x9}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000080)) sendmmsg(r1, &(0x7f0000007e00), 0x6b7cadb88b1d56, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xcef, 0x40400) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x40000400408200) 15:07:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x3000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0xa04, 0x70bd25, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x40) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3327, 0x0) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000040)=0x3) 15:07:50 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) ioctl(r3, 0x200, &(0x7f0000000140)="b9245862f7a946e628d4d9cd61b0145d4cd0e93250bc060f46309b6a282d9b1d3881aa5bef70bc53a4316dc1912a922f7db52320b11e5db277f6906ed15ca6bf895b6536aae74f54c4e729fa6535c57406a5dbb356b4886b15668c3791c8af5ced7884bc497bd6e8fea5da5218a9799063955fa7489482f7d128d47a3993c2c8a06771574950afb107ca") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:50 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="a4ed88161de4e30d1b0fc46fc2a8ffe8f13d5de855cbc90efb65d70d11261272b264d62fa268a7de8f73e3db0af0cb2c162a0384651b6ccc99511e05c7d2925ff8aa3a0586cf44f642f187c390e71b2f19c7142cc15613eb82", 0x59}], 0x1) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000ac1414aa0b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/mixer\x00', 0x2, 0x0) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f00000001c0)=0x40) 15:07:50 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f00000000c0)={0x0, 0x9, 0x7fffffff, [], &(0x7f0000000080)=0x6}) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) [ 342.467883] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 342.503670] capability: warning: `syz-executor2' uses 32-bit capabilities (legacy support in use) 15:07:50 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x1000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:07:50 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:50 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.sched_relax_domain_levRe\a', 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)={'\x00', "1a8258040fe5a6f62cfedecc7ca49bb06ec0c7d5d74e6cc40b9ea9b8e427b87de133c2ec36162ded9345e1f68d54e84a9628c649c77d11c694dc72e3e3a9c334fef8a693c3c20a66a5177b57d49e8df2ca383f4a2944d20ffce529de4659bcc15ed6e7facdfa55addf514dc9fee3cbca5bce93a91a7f94f9025d4dbefd525cbf3ec85ec923b60db76726cc7c80efe6d2a375afc3e27cf60d2c1094e66d970aff13e09b1ff138d9a637d3a1ce409b6d10be474f505df8c35d47372632f2ec5d634d5ddce726"}, 0xa531) 15:07:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) 15:07:51 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffffffff, 0x4200) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000080)={0xa, 0x0, [{0xc000000f, 0x3, 0x0, 0x401, 0x0, 0x3, 0x1}, {0xe, 0x2, 0x6, 0x9, 0x0, 0x2, 0x101}, {0xa, 0xcf6, 0x3, 0xdd0, 0x7fff, 0x4, 0x3}, {0x20c0f51013d25724, 0xffffffff, 0x1, 0xb72, 0x1000, 0x9, 0x8000}, {0x0, 0xffff, 0x2, 0x8, 0x68, 0x10000, 0x1}, {0x7, 0x4c, 0x3, 0x2, 0x4, 0x526b, 0x6}, {0x80000007, 0x101, 0x4, 0xe2, 0x3ae4, 0xc5b, 0x2}, {0x80000019, 0x7fffffff, 0x4, 0x6, 0x100000000, 0x8}, {0xc000000f, 0x0, 0x4, 0x10001, 0x0, 0x2, 0x100000001}, {0x4000000a, 0x2, 0x1, 0x5, 0x3, 0x9, 0x5}]}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000240)=0x8, 0x8) 15:07:51 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='scalable\x00', 0x9) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bond_slave_1\x00', 0x1}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00', 0x10) sendto(r0, &(0x7f00000001c0)="96", 0x1, 0x0, 0x0, 0x0) 15:07:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x1007}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r4, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r5, r1}}, 0x18) 15:07:52 executing program 0: r0 = socket$inet6(0xa, 0x23, 0x7) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:07:52 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:52 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) 15:07:52 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) socket$inet_smc(0x2b, 0x1, 0x0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) 15:07:52 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:52 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) r1 = socket(0x1, 0x80807, 0x8) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000000)=0x200, 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f00000000c0)=0x2) 15:07:52 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) socket$inet_smc(0x2b, 0x1, 0x0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) 15:07:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) 15:07:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) write$uinput_user_dev(r1, &(0x7f0000000240)={'syz1\x00', {0x3, 0x1ff, 0xfffffffffffff737, 0x8}, 0xd, [0xb9, 0x664, 0x3, 0x6, 0x5, 0x2, 0x200, 0x3, 0x100, 0x100000001, 0xb78, 0x3fffffffc0, 0x5, 0x0, 0x86, 0xa80c, 0x63cd, 0x2, 0x5000000000000000, 0x6, 0x60000000000000, 0x4, 0x5, 0x401, 0x8000, 0x8, 0x4, 0x800, 0x1c00000000000000, 0x0, 0x401, 0x2, 0x51e, 0x1, 0x0, 0x6, 0x1000, 0x3, 0x80000000, 0x1, 0xb914, 0x40, 0x3, 0x0, 0x0, 0x7, 0x8, 0x8001, 0x1ff, 0x3b4c, 0x0, 0x6f, 0x3, 0x0, 0x2, 0x0, 0x4, 0x3, 0x4, 0x2, 0x3f, 0xfff, 0x7, 0x8], [0x4, 0x1, 0x6, 0xc8b9, 0x80000001, 0x1ff, 0x1, 0x8, 0x4, 0xc6, 0x9, 0x27, 0xfffffffffffffffe, 0x90, 0x3ff, 0xfffffffffffffffa, 0x8856, 0x8001, 0x3, 0x3f, 0x1, 0x4, 0x3, 0x401, 0xb361, 0x941, 0x5, 0xcb0a, 0x80000001, 0x3, 0x7, 0x7ff, 0xffffffffffff0001, 0xfffffffffffffff9, 0xfffffffffffffff8, 0x10531ef5, 0x1, 0x7, 0x1, 0x1, 0x2, 0x200, 0x1, 0x100000000, 0x80, 0x6, 0xc3d, 0x80, 0x9, 0x6d6, 0x100000000, 0x6, 0x2, 0x101, 0x6, 0x979, 0xfffffffffffffe01, 0x6, 0x5, 0x5, 0x100, 0x0, 0x2, 0xdb1], [0x4, 0x4bc, 0x800, 0x6, 0x2, 0x487c, 0x0, 0xca, 0xffffffffffffffff, 0xd92b, 0x1dfbc00000, 0x9640000, 0x1, 0x7f, 0x40, 0x7fffffff, 0x3, 0x6, 0x400, 0x8000, 0xfffffffffffffffa, 0x5, 0x2, 0x80000001, 0x401, 0xc948, 0x5, 0x40, 0x9, 0xfff, 0x7f, 0xfffffffffffffffa, 0x1ff, 0x1000, 0xca6, 0x5, 0x8000, 0x9, 0x7, 0x2, 0x100, 0x6, 0x3, 0x4, 0x100000001, 0x100000001, 0x1, 0x8001, 0xdd3, 0x101, 0x439, 0xffffffffffffff00, 0x7fffffff, 0x5, 0x7, 0x0, 0x9, 0xffffffff, 0xfff, 0xffffffffffffffea, 0x1, 0xfff, 0x1ff, 0x8be], [0x8, 0x2, 0x10000, 0x2, 0x621, 0x4, 0x9, 0x80000000, 0x8, 0xfffffffffffffffa, 0x7fffffff, 0x0, 0x4, 0x3, 0xfffffffffffffffe, 0x7, 0x5, 0x3, 0x1ff, 0x0, 0x1f, 0x1, 0x10000000000000, 0x3, 0x6, 0xb15, 0x7, 0x6, 0xffffffffffffff53, 0x1, 0x100, 0x800, 0x5, 0x20, 0x0, 0x0, 0x4, 0x7, 0xb9b, 0x2, 0x0, 0x3, 0x2, 0x8000000, 0x0, 0x5, 0x10001, 0x60, 0x0, 0x100, 0x7, 0x7f, 0xde2, 0x1ff, 0xffff000000000000, 0xffffffffffffffff, 0x1117, 0x5, 0x9, 0x1f, 0x4, 0x100000000, 0x7, 0x4]}, 0x45c) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000200)="390000001200090417feb1ae7aa77cf40000ff3f0800000045009db9120c007b05000400410168849ef79a0a4955e91ee538d2fd0000000000", 0x39}], 0x1) 15:07:53 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:53 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0), 0x0, &(0x7f0000000040)}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffff9c, 0x28, &(0x7f0000000240)}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000001180)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000002340)=""/128, 0x80}, {&(0x7f0000000700)=""/133, 0x85}], 0x7, &(0x7f0000002500)=""/249, 0xf9, 0xfff}, 0x40) r3 = socket$kcm(0xa, 0x4, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) r5 = getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='io.stat\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) r6 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000005c0)='cpuacct.usage_all\x00', 0x0, 0x0) r8 = perf_event_open(&(0x7f00000003c0)={0x3, 0x70, 0x4, 0x401, 0x9ac6, 0x6, 0x0, 0xe35b, 0x10, 0x9, 0x8c32, 0x81, 0x1f93, 0x3ff, 0x3, 0x5, 0x1d, 0x2, 0x7c08, 0x0, 0x910d, 0x80, 0x1, 0xfffffffffffffd2f, 0xffffffffffff0000, 0xfffffffffffff800, 0x2, 0x3f, 0x100000, 0x3, 0x2c780000000, 0x5, 0x9, 0x9, 0x10000, 0x7fffffff, 0x8000, 0x1, 0x0, 0x20, 0x1, @perf_config_ext={0x1f}, 0x242, 0x7, 0x0, 0x2, 0x7f, 0x401, 0x5}, r5, 0x0, r7, 0xb) close(r4) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) r10 = perf_event_open$cgroup(&(0x7f0000000340)={0x7, 0x70, 0x3, 0x68, 0x6, 0x1, 0x0, 0x20, 0x82154, 0x3, 0x6, 0x0, 0x2, 0x0, 0x9, 0x8, 0x0, 0x1, 0x6, 0xffff, 0x8000, 0x82e, 0xfffffffffffffff7, 0x80, 0x20, 0x5, 0x0, 0xb0, 0x100, 0x3, 0x35, 0x3, 0x7f, 0x2, 0x6, 0x1, 0x8, 0x5, 0x0, 0x9, 0x6, @perf_config_ext={0x2dc, 0x43d}, 0x4, 0x3, 0x2, 0x2, 0x3, 0x1000, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz1\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(r10, 0x2403, 0x1f) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000006c0)={r9, 0x1, 0x8}, 0xfffffffffffffff8) bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={&(0x7f00000002c0)='./file0\x00'}, 0xfffffffffffffe14) openat$cgroup_int(r7, &(0x7f0000000640)='\x89high\x00\x00\x00\x00\x00\x00\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40082404, &(0x7f0000000580)=0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x2}, 0xfffffffffffffd8e) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000000)) 15:07:53 executing program 0: r0 = semget(0x3, 0x0, 0x40) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x7e]) r1 = socket$inet6(0xa, 0x5, 0x0) semget(0x1, 0x0, 0x80) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) signalfd4(r1, &(0x7f0000000080)={0x28f755fb}, 0x8, 0x80000) [ 345.320853] netlink: 'syz-executor4': attribute type 4 has an invalid length. 15:07:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) 15:07:53 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:53 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x40000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000180)=[@in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e23, 0x5, @loopback, 0x9}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0x2, @mcast2, 0x1}], 0x68) r1 = socket$inet6(0xa, 0x5, 0x0) sendto$inet6(r1, &(0x7f0000000080)="a7321490d6d7788a40c87f37f43b64cc4c14245ca0a767792963d0eb444d9b35ea71f5fd211e6fd2e8f8467c654a582b37a10b49650c59e14015206522fe066ae289fd0df8ab2c9656ce8c96c97ae039c92e3ed56269645bb4e26f2213467d4a9e8ec90987812764ef1f5e741640b9d4cc19b03bf477b6b8798c99728e4d2230de065d3e7d77dd13f08a6ccecc35ceb85d54487721", 0x95, 0x40, &(0x7f0000000000)={0xa, 0x4e24, 0x200, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:07:53 executing program 4: keyctl$search(0xa, 0x0, &(0x7f0000000040)='\x00\xba\xe0M]\x91W\x7f\x96\x95KY\x12\xc5\xf7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x16000) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x10000, {0x400, 0x0, 0x2, 0x6, 0x88}}) 15:07:54 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:54 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x37, &(0x7f0000000040)=r0, 0x348) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000080)=0x7, 0x4) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000140)=@in6={0xa, 0x4e23}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000001dc0)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000100)={r2, 0x1, 0x6}, 0x10) 15:07:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:07:54 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x40000000}) epoll_pwait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x200, 0x0, 0x0) 15:07:54 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7d4c, 0x400) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000080)=""/171, &(0x7f0000000140)=0xab) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000180)='ip6gretap0\x00') r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 15:07:54 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:54 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000000000)=0xe8) bind$can_raw(r0, &(0x7f0000000200)={0x1d, r1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000280)={0x0, 0xfffffffffffffeff, 0x5, 0x3, 0x2, 0x1, 0x8, 0x401, {0x0, @in={{0x2, 0x4e23, @empty}}, 0x7, 0x8, 0x7, 0x1, 0x40}}, &(0x7f0000000340)=0xb0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000380)={r4, 0xffff, 0x30}, &(0x7f00000003c0)=0xc) bind$can_raw(r0, &(0x7f0000000040), 0x10) bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r2}, 0x10) 15:07:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:07:54 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000000c0)=0x24) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r2, 0x3fff8000}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e21, @loopback}], 0x10) 15:07:54 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:54 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f00000000c0)=0x5, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000100), &(0x7f0000000140)=0x4) 15:07:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x81) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x600400, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000080)={0x2, 0x1, 0xffffffff, 0x0, 0xa}) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 15:07:55 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x1, @pix={0x0, 0x0, 0x33524742}}) 15:07:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:07:55 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x12)\x00', 0x3, 0x2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000180)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x7040c}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000080)={0x2f7, 0xffffffffffff0000, 0x8, 'queue0\x00', 0xfff}) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f0000000000)) 15:07:55 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x308, 0x101800) write$P9_RWSTAT(r1, &(0x7f0000000080)={0x7, 0x7f, 0x1}, 0x7) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:07:55 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7361c86d2000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='team0\x00') clone(0x802102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x200040) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000180)=[0x3, 0xffffffffffffff81]) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3400000011000102000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140043007465616d307f000000000000007afee6fa367c531e25f41c48ea0000000000"], 0x34}}, 0x0) recvmmsg(r1, &(0x7f00000037c0), 0x15b, 0x0, 0x0) 15:07:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:07:55 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) socket$rxrpc(0x21, 0x2, 0xa) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000240)) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:55 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x100000001) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x4800) connect$bt_rfcomm(r2, &(0x7f0000000140)={0x1f, {0x37f, 0x3, 0x3, 0x400, 0xc900, 0x4}}, 0xa) sysfs$1(0x1, &(0x7f0000000100)='/dev/audio\x00') ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f00000000c0)={0x3, r2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:07:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000007480)='cgroup.threads\x00', 0x2, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x28013, r3, 0x0) 15:07:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x1100085) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:07:56 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) socket$rxrpc(0x21, 0x2, 0xa) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:56 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffa, 0x82) write$binfmt_misc(r2, &(0x7f0000000440)={'syz0'}, 0xfffffd70) ioctl$int_in(r3, 0x5452, &(0x7f0000000240)=0x8000) sendfile(r2, r1, &(0x7f0000000140), 0x100000001) 15:07:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x1100085) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:07:56 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x0) 15:07:56 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) socket$rxrpc(0x21, 0x2, 0xa) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:56 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000300)={'filter\x00', 0x0, 0x3, 0xf5, [], 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000200)=""/245}, &(0x7f0000000100)=0x78) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000380)=ANY=[@ANYBLOB="02000000000000feff00000000000008f00055070e0000000000000419000600cd38731e39f3b83ce8316bcb4f3d860000000000000000000000bdff705c41000000800000"]) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x10000, 0x0) 15:07:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x5d6417016baba048, 0xb) read$FUSE(r0, &(0x7f0000000080), 0x1000) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:07:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x1100085) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:07:56 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) getsockname$unix(r0, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x1100085) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:07:57 executing program 4: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KDGKBLED(r3, 0x4b64, &(0x7f0000000000)) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f0000000140)=""/18) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x7b, &(0x7f0000000040)={r1}, &(0x7f0000000100)=0x8) close(r2) write$FUSE_BMAP(r3, &(0x7f00000002c0)={0x18, 0x0, 0x6, {0x6}}, 0x18) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r2, &(0x7f0000000bc0)=[{&(0x7f0000000180), 0x8, &(0x7f0000000140), 0x0, &(0x7f0000000280)=ANY=[@ANYPTR, @ANYRESDEC=r1], 0x1c}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000200)={r5}, &(0x7f0000000240)=0xc) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f0000000300)={0xfffffffffffffc01, 0x8, 0x8}) 15:07:57 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x4) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000100)=0x800) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:07:57 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:57 executing program 2: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0}, 0x68) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='cmdline\x00') ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000000)={0x14ea5c1, 0x0, 0x7}) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000480)) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x40) read$FUSE(r0, &(0x7f00000022c0), 0x13c0) 15:07:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x1100085) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:07:57 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x23}}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e20, @rand_addr=0x6}], 0x70) 15:07:57 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x1100085) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:07:57 executing program 2: r0 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f00000002c0)=0x1c) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000300), &(0x7f0000000340)=0x4) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000003c0)=""/199) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) r4 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) write$vhci(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="045375847dbeb7ae0ac06fc4e4c62f8e96d96317b607ffbe923b7200941735dd398625eb8e817170b515072fe51b72de764b46b0e54434fb1377c4f22599cbfe104fef938b061acc7b42153860f99d4f641b272f6bf987fe61bf9d9ccd73607221f73dfe1a1d85ba30efaff4450eb22b73e0af5c9cc2f353402e20cd4deeb1b450f0c5e27525dac02823c43ad64798c9bd53bd4f1bae8d392af4d3c8783ae97d044c8298363d04f14e67977d3db37eba164ab28590bdff0033cc6e50e3c36412cbdaab136e3712b2e48465732884d2c9"], 0xc7) setsockopt$sock_int(r2, 0x1, 0xa, &(0x7f00000004c0)=0x3, 0x0) 15:07:58 executing program 0: r0 = socket$inet6(0xa, 0x4, 0x48) accept$packet(0xffffffffffffff9c, &(0x7f0000004700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004780)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@dev}}, &(0x7f0000004880)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000048c0)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@local, 0x4e22, 0xc7, 0x4e23, 0x9, 0xa, 0x80, 0xa0, 0x2e, r1, r2}, {0x6, 0xfffffffffffffffa, 0x7, 0xbcbf, 0x1f, 0x1, 0xfffffffffffffffa, 0x1}, {0x1, 0x293d8afb, 0x7fff, 0x8000}, 0x5, 0x0, 0x3, 0x1, 0x1, 0x3}, {{@in6=@loopback, 0x4d6, 0x6c}, 0x2, @in6=@loopback, 0x34ff, 0x6, 0x0, 0x0, 0x0, 0x5, 0x9}}, 0xe8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e21, @remote}], 0x10) 15:07:58 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:58 executing program 3: r0 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:07:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KDGKBLED(r3, 0x4b64, &(0x7f0000000000)) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f0000000140)=""/18) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x7b, &(0x7f0000000040)={r1}, &(0x7f0000000100)=0x8) close(r2) write$FUSE_BMAP(r3, &(0x7f00000002c0)={0x18, 0x0, 0x6, {0x6}}, 0x18) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r2, &(0x7f0000000bc0)=[{&(0x7f0000000180), 0x8, &(0x7f0000000140), 0x0, &(0x7f0000000280)=ANY=[@ANYPTR, @ANYRESDEC=r1], 0x1c}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000200)={r5}, &(0x7f0000000240)=0xc) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f0000000300)={0xfffffffffffffc01, 0x8, 0x8}) 15:07:58 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000400000000000000000000000000000000000009c005245296f39ef3a7dc9b2fc5eec82da1368fd4f4df5c5d507f1ca7c3979eddfe53c7bbb2dd9023de35fe7f83fd21c5946c39b29dc0289481da4e88e2b206823151fa52c10420e3ba2928cb21a39f2e45885226a35678b3e2dad1734a11e1a225d182fbe8b2a95219d67da62d094"], 0x18}], 0x1, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18}], 0x18}], 0x1b5, 0x0) 15:07:58 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) recvmmsg(r0, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/108, 0x6c}, {&(0x7f0000000100)=""/201, 0xc9}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/4096, 0x1000}], 0x4}, 0x8134}, {{&(0x7f0000002200)=@tipc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000002280)=""/245, 0xf5}, {&(0x7f0000002380)=""/153, 0x99}, {&(0x7f0000002440)=""/105, 0x69}], 0x3, &(0x7f0000002500)=""/158, 0x9e}, 0x5}, {{0x0, 0x0, &(0x7f0000002840)=[{&(0x7f00000025c0)=""/154, 0x9a}, {&(0x7f0000002680)=""/82, 0x52}, {&(0x7f0000002700)=""/228, 0xe4}, {&(0x7f0000002800)=""/64, 0x40}], 0x4}, 0x6}, {{0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000002880)=""/224, 0xe0}, {&(0x7f0000002980)}, {&(0x7f00000029c0)=""/74, 0x4a}, {&(0x7f0000002a40)=""/70, 0x46}, {&(0x7f0000002ac0)}, {&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/182, 0xb6}, {&(0x7f0000003bc0)=""/2, 0x2}], 0x8, &(0x7f0000003c80)=""/91, 0x5b}, 0x3}, {{&(0x7f0000003d00)=@xdp, 0x80, &(0x7f0000003e40)=[{&(0x7f0000003d80)=""/96, 0x60}, {&(0x7f0000003e00)=""/59, 0x3b}], 0x2, &(0x7f0000003e80)=""/235, 0xeb}, 0xffffffffffffffff}, {{&(0x7f0000003f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f0000006380)=[{&(0x7f0000004000)=""/4096, 0x1000}, {&(0x7f0000005000)=""/6, 0x6}, {&(0x7f0000005040)=""/4096, 0x1000}, {&(0x7f0000006040)=""/232, 0xe8}, {&(0x7f0000006140)}, {&(0x7f0000006180)=""/121, 0x79}, {&(0x7f0000006200)=""/88, 0x58}, {&(0x7f0000006280)=""/85, 0x55}, {&(0x7f0000006300)=""/78, 0x4e}], 0x9, &(0x7f0000006440)=""/254, 0xfe}, 0x6}, {{&(0x7f0000006540)=@pppol2tpin6, 0x80, &(0x7f0000006740)=[{&(0x7f00000065c0)=""/176, 0xb0}, {&(0x7f0000006680)=""/179, 0xb3}], 0x2, &(0x7f0000006780)=""/79, 0x4f}, 0x892}, {{&(0x7f0000006800)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000007980)=[{&(0x7f0000006880)=""/209, 0xd1}, {&(0x7f0000006980)=""/4096, 0x1000}], 0x2, &(0x7f00000079c0)=""/54, 0x36}, 0x10000}, {{&(0x7f0000007a00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000008a80)=[{&(0x7f0000007a80)=""/4096, 0x1000}], 0x1, &(0x7f0000008ac0)=""/4096, 0x1000}, 0xd60b}, {{&(0x7f0000009ac0)=@nfc, 0x80, &(0x7f000000af40)=[{&(0x7f0000009b40)=""/4096, 0x1000}, {&(0x7f000000ab40)=""/200, 0xc8}, {&(0x7f000000ac40)=""/23, 0x17}, {&(0x7f000000ac80)=""/6, 0x6}, {&(0x7f000000acc0)=""/240, 0xf0}, {&(0x7f000000adc0)=""/106, 0x6a}, {&(0x7f000000ae40)=""/239, 0xef}], 0x7}, 0x5}], 0xa, 0x40012000, &(0x7f000000b240)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:07:58 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:58 executing program 3: r0 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:07:58 executing program 2: r0 = memfd_create(&(0x7f0000000140)='/d-\x1b\xb3\x82\xf9/J\xb0p*\xd8\x00\xea\x03\x83\xd8\x16\x88Qt\xceh\xeb\xb2\xc4\xfbf\xe1\xd5\xe5\x9aS\x964\xb5L/\xdb\xb4\xec\xd7C\xed\xcf\f\x01\x15\xae!T\x9eU\xee\xc6]3\xdb\xadx\x19\xf0w}y\x0f\xc3\xf2\xea;\x93\xe9\x13\x97E\xd8i\f6\xb6\xf9\\\xbd\xd1\\\x19\x0e\x93\x05\nC\x1b8)\xe3\x9b{\x8bT\x8a\xec\a\xc9-;\xf55n\xd1~\x7f\xa8eB\xc40&l\'a\x19\xdf\xad\x9aan\xaa\xc1h\x9e\x9a\xa94\xdcI{\xa9\xf3\x00u\xfb\x83\xa2An\x1cN\x05w\xcb\x811A\x98G\x87j\x02\x8cC\xed#\xb8+\xf2G6\xe5\xe8\x88<2\x92\x13&\x96\xe6\xdbl\xb0\x99\x9e\xe8Q\xd3\xe9S0\xb9\xb0\'\xf5\x05\xecV}\x89Z\n\xc5.\xf5\xa7\xe1\x97\x9dq\xe8\xa6\x99\x9d8b\xd3\xd9\xbe\x02D\x13\x19b\x7fm2\xed\xad\x04\x80\x12GM\x9dZ@=\xc9\x14\xf8\xdcb\x92@\xd1\xbb\xd2\xa331\x19\x8a\xc8:\xa1\xe6\xc2)', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) r1 = getpgrp(0x0) r2 = syz_open_dev$audion(&(0x7f0000000400)='/dev/audio#\x00', 0x3, 0x40) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f0000000440)={0x0, 0x800, 0x724ba579, 0x6fa, 0x4, 0x6}) capset(&(0x7f0000000000)={0x200f1526, r1}, &(0x7f0000000080)={0x7fffffff, 0x7, 0x3, 0x4, 0xd8, 0xffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x200280, 0x100) sendmsg$nl_netfilter(r3, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400200}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xec, 0x2, 0xb, 0x200, 0x70bd2c, 0x25dfdbfb, {0x1, 0x0, 0x4}, [@nested={0x28, 0x18, [@typed={0x14, 0x93, @ipv6=@mcast1}, @generic="85900671e25f4192c172bebe11da"]}, @generic="88a4e05130f5dfa4cfb72e2d6e1972c0986d1e2a619ecbb678b1300be8a5bafb1a34d4c89ec425a762b4500367a706a0a3dba27b339033bca84a9aa13d133c8e6df014fee67a957f106cbda5481bdcce56895616a20318d1a129f034baa3c674541ca36201609c87f2466be98d9b1012ac44bd92a4773627e4293d70930b1ea3a8ce9ba9f3756984f8c53f867397144fc98e789fb4", @nested={0x18, 0x12, [@typed={0x14, 0x10, @ipv6=@local}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x4014}, 0x20048001) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x77359400}) 15:07:59 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x404001, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000000c0)={r0, r2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:07:59 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:59 executing program 3: r0 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:07:59 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:59 executing program 3: r0 = syz_open_dev$loop(0x0, 0x1, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:07:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") clone(0x40000, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x2f, @rand_addr=0x5, 0x4e22, 0x1, 'lblc\x00', 0x0, 0x8000, 0x48}, 0x2c) 15:07:59 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r2 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x9, 0x400000) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f0000000180)) r3 = getgid() fchown(r0, r1, r3) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140), 0xfcdd) 15:07:59 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:59 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000013ff4)=@assoc_value={0x0}, &(0x7f0000002000)=0x8) close(0xffffffffffffffff) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000040)={r1, 0x3f, "bc7cc59da1386b574ac15be7e4efd5c78ef0d536c547a50ea83897b22f2bc837be7a161363ee7a659e176bd0d1ee403de571b99c01be255646f8310cf6405f"}, &(0x7f00000000c0)=0x47) [ 351.759742] sctp: [Deprecated]: syz-executor2 (pid 11781) Use of struct sctp_assoc_value in delayed_ack socket option. [ 351.759742] Use struct sctp_sack_info instead 15:07:59 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:07:59 executing program 3: r0 = syz_open_dev$loop(0x0, 0x1, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:07:59 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x6) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000080)={0x16, 0x3a, 0xd, 0x14, 0xb, 0x0, 0x1, 0xcc}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) [ 351.957930] sctp: [Deprecated]: syz-executor2 (pid 11791) Use of struct sctp_assoc_value in delayed_ack socket option. [ 351.957930] Use struct sctp_sack_info instead [ 352.014531] IPVS: set_ctl: invalid protocol: 47 0.0.0.5:20002 15:08:00 executing program 3: r0 = syz_open_dev$loop(0x0, 0x1, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:00 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:08:00 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e24, 0xe01, @mcast2, 0x7}, @in6={0xa, 0x4e23, 0x8, @ipv4={[], [], @loopback}, 0x7}], 0xfd59) 15:08:00 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x80200000006, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0xfffffffffffffff9, 0x9, 0x1, "1760550f540400f0eb0300ef1e20000400000000000000000000da00"}) 15:08:00 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x9, 0x8, 0x66, 0xffffffffffffffff, 0x0, 0x1ff, 0x10000, 0x8, 0x3, 0x3, 0xcb, 0x2, 0xfffffffffffffff8, 0x0, 0x6, 0x739a, 0x5d7, 0x3, 0x0, 0xa0fc, 0xfffffffffffff166, 0xdbb, 0x61, 0x7fffffff, 0x4, 0x800, 0x6, 0x0, 0x80000001, 0x5, 0xc74, 0x3, 0x5, 0x9, 0xdb0, 0x4, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x300, 0x4, 0xffffffffffff0001, 0x7, 0x8, 0x8, 0x934c}, r2, 0x2, r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x80, 0x1e8) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xc8, r4, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x400}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xa00000000000}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x78, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'hsr0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8e60}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x379241fc}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0xc8}, 0x1, 0x0, 0x0, 0x40080c1}, 0x20004000) connect$inet6(r1, &(0x7f00000000c0), 0x1c) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000040)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 15:08:00 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:08:00 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:00 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080), 0x85ae162afcc15dbf) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40800, 0x2) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000040)=0x8000, 0x4) 15:08:00 executing program 2: clone(0x18000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x1d, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r2, r0, 0x7, r1, &(0x7f0000000080)) 15:08:00 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x4e502, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x400000000000080, 0x1, 0x80000005}}, 0x14) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@filter={'filter\x00', 0x44, 0x1, 0x90, [0x0, 0x0, 0x20000080], 0x0, 0x0, &(0x7f0000000080)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, {}, {0x0, '\x00', 0x1}]}, 0x108) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}}}, &(0x7f0000000400)=0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={r2, @in6={{0xa, 0x4e22, 0x100000001, @rand_addr="b37d40688f6356d7defa112690fc4656", 0x8000}}, 0x20000000000, 0x20, 0x7fffffff, 0x4a, 0x11}, 0x98) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0x100, @loopback, 0x7ff}}, [0x461, 0x4, 0x9, 0x7, 0x0, 0x8, 0x7, 0x8, 0x9, 0xffffffffffffffff, 0x2, 0xffffffffffffff00, 0x10001, 0xed, 0x1ff]}, &(0x7f0000000000)=0x100) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000300)={r3, 0xef51, 0x100000001}, 0x8) 15:08:00 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:08:01 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) r1 = fcntl$getown(r0, 0x9) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r1) [ 353.039820] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain 15:08:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) [ 353.186121] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain 15:08:01 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:08:01 executing program 2: clone(0x18000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x1d, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r2, r0, 0x7, r1, &(0x7f0000000080)) 15:08:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000000), 0xc, &(0x7f0000000880)={&(0x7f0000000080)=ANY=[]}}, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xf4, r1, 0x200, 0x42, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2040000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffffd}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x1}, 0x844) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000280)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x314}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r2, 0xa04, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4048080}, 0x90) getsockopt$netlink(r0, 0x10e, 0xc, &(0x7f0000000040)=""/4, &(0x7f0000000000)=0x1e3) 15:08:01 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080), 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x80080, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f0000000100)={0x3, 0x0, @raw_data=[0xfff, 0x50, 0x8, 0x9, 0x8, 0x3, 0x7fff, 0x1, 0x5, 0x5, 0x4, 0x6, 0x2, 0xfbb, 0x2, 0xe746]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0x44, 0x37, &(0x7f00000001c0)="3b026bc609fb836e1c99e47645baf85e351d7651288636329b3ce74701a08ef200860752ddc14900c999996ca56c6d46dfb75b65144c01f3440e1a2de26b56dde09fa807", &(0x7f0000000240)=""/55, 0xfc}, 0x28) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) uselib(&(0x7f0000000180)='./file0\x00') r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000000)={0x3, 0x401, 0x9, 0x7}, 0x10) 15:08:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:01 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:08:01 executing program 2: clone(0x18000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x1d, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r2, r0, 0x7, r1, &(0x7f0000000080)) 15:08:01 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e22, 0x3ff, @mcast2, 0x6430dac3}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x2c) 15:08:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:02 executing program 1: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:08:02 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000040)=0x800, 0x1) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100, 0x0) 15:08:02 executing program 2: clone(0x18000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x1d, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r2, r0, 0x7, r1, &(0x7f0000000080)) 15:08:02 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x448400, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x4e24, 0x5, @remote, 0x7fffffff}, {0xa, 0x4e22, 0x5, @ipv4={[], [], @broadcast}, 0xffffffffffffffff}, 0x1f, [0xfffffffffffffc6f, 0x1, 0x3, 0x400, 0x2, 0x400, 0x81]}, 0x5c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0xfffffffffffffe62) getsockopt$inet6_int(r0, 0x29, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = gettid() ptrace$getregs(0xe, r2, 0x9, &(0x7f00000000c0)=""/163) 15:08:02 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:02 executing program 1: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:08:02 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x4) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000080)={0x10001, 0x100000001, 0xaf}) 15:08:02 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x7fffffffff, 0x4) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x13f698e4b9e299b7, 0x1, 0x0, 0xffffffffffffff06) socket$nl_netfilter(0x10, 0x3, 0xc) 15:08:02 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:08:02 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) [ 354.825004] hrtimer: interrupt took 32824 ns 15:08:03 executing program 1: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) [ 354.907288] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:08:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r3, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) listen(r3, 0x6) listen(r3, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r4 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_timeval(r2, 0x1, 0x0, &(0x7f0000000100), 0x10) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000140)=0x4, 0x4) 15:08:03 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x80000) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x3, @remote, 0x5}, 0x1c) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000040)={0x80, 0x1, 0x80000000}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x0) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f00000000c0)) 15:08:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:03 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:08:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYRES16], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='bond0\x00', 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000001300)=[{0x0, 0x0, &(0x7f0000000100), 0x2d3, &(0x7f0000000100)}], 0x492492492492805, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@initdev, @in6}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000000080)=0xe8) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@l2, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000200)}}], 0x400001f, 0x0) 15:08:03 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x7fffffff, 0x0, 0x20, 0xfffffffffffffffc}, {0x5, 0x1, 0x4c, 0xffffffff}]}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x60) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x4, 0x400000) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e23, 0x1000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xaca}, {0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, 0xc01, [0x5, 0x101, 0x7, 0x5, 0xa2ad, 0x3, 0xffff, 0x7]}, 0x5c) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x8}) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) 15:08:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:03 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)={0x57, 0x5, 0x0, {0x4, 0x91fa}, {0x1, 0x800}, @ramp={0x9, 0x1, {0x4, 0xe3, 0x8001, 0xffffffffffff1f4c}}}) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x7, 0xfffffffffffffffc, 0x3, 0x3}]}) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000100)=0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000180)={0x7, 0x7f, 0x2}, 0x7) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000240)={0x0, 0x9}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000002c0)={r2, 0x8, 0x401, 0x2d7}, &(0x7f0000000300)=0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000340)=0x4, 0x8) sendmsg$key(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0x2, 0x11, 0x0, 0x2, 0x11, 0x0, 0x70bd2d, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x6e6bb5, 0x9, {0x6, 0x7f, 0x1, 0x3055, 0x0, 0x2c, 0x0, @in6=@mcast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_x_sa2={0x2, 0x13, 0x44, 0x0, 0x0, 0x70bd29, 0x3501}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e21, @loopback}}]}, 0x88}}, 0x8000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000004c0)={r3, 0xa2, "2b1de8a220c223c88dc9e3b57cc9e7d0192a7e639d8e9eae81ac268a18d03dbef57f4d786fc84d9aa35e59688b401cd1eb3ed43e19e10311436a305f22713297940a5b872314cce6846b519e81c4fb9a2af69820feec02cd47fa3f3665f5221586cd2c8b522a5485257f02a107d9e00c42d507a4e2c3d0d88d71c173bd6cdab2fb453c5c6eeb7879e2b98381dfeb617f356fe7fb175c8d829bb56b329168c7ed5507"}, &(0x7f0000000580)=0xaa) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000005c0), &(0x7f0000000600)=0x8) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000640)='/dev/video35\x00', 0x2, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x2, 0x1) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000006f80)={@loopback, 0x0}, &(0x7f0000006fc0)=0x14) sendmsg$xdp(r0, &(0x7f0000007180)={&(0x7f0000007000)={0x2c, 0x7, r6, 0x21}, 0x10, &(0x7f0000007140)=[{&(0x7f0000007040)="0bfe3e4cdcd875a725ded3594802242e5b3f2dc6e757649014a6e0fdbfee5def3767c6495ecd0a65f26991544676eadc456c00c33d2b3b61f7fe5e42082c71a88f133cfcfb18898fc34c6c7aac97e1acc69788daa3f5fbe394164c412611c666addec4ce4a77bdcebfcbdc2eda3d049b72d5f3b7e24912ea3438ecec9367853ab45de2148cfa8af4550b00b0aaed6aa9c9d2f0386df596d9cb64d059bba36d602d888fa9026cc17f2c8260a8fe5d6eacbd8be9", 0xb3}, {&(0x7f0000007100)="5a29b55ac6d66d50864a75cafec06b82b443ca73f02a89ab791b2f81005163cdf104370e1a54aec31b08f229590605b7590b2996b7f9d65f102bf5c6", 0x3c}], 0x2, 0x0, 0x0, 0x40000}, 0x1) close(r5) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000071c0)={r4, @in={{0x2, 0x4e21, @local}}, 0xfff, 0x1f}, &(0x7f0000007280)=0x90) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x200, 0x4) fsetxattr$trusted_overlay_nlink(r1, &(0x7f00000072c0)='trusted.overlay.nlink\x00', &(0x7f0000007300)={'U-', 0x3}, 0x28, 0x3) r7 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000007340)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@local, 0x4e23, 0x8, 0x4e24, 0x8, 0xa, 0xa0, 0x20, 0x8, r6, r7}, {0x8, 0x2, 0x3, 0x80000000, 0x3, 0x8, 0x4, 0x100000001}, {0x9, 0x9, 0x3, 0x1}, 0x2, 0x6e6bbe, 0x0, 0x1, 0x3, 0x2}, {{@in=@multicast2, 0x4d6, 0x32}, 0xa, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3500, 0x3, 0x1, 0x7f, 0x3, 0x1, 0xfffffffffffffeff}}, 0xe8) ioctl$CAPI_INSTALLED(r1, 0x80024322) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000007440)={0x0, 0x0, 0x3}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000007480)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000074c0)={r8, r9}) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000007500), &(0x7f0000007540)=0x4) ioctl$KVM_SET_SREGS(r5, 0x4138ae84, &(0x7f0000007580)={{0x0, 0x3004, 0xd, 0x3, 0x80000001, 0x1f, 0x4, 0x1, 0x4, 0xffffffffffffffff, 0x80000001, 0x4}, {0x6000, 0x2000, 0x10, 0x49d0, 0x101, 0xffffffffffff30d8, 0x5, 0x80, 0x3ff, 0x401, 0xfffffffffffffffa, 0x3}, {0x1, 0xf007, 0xf, 0x0, 0x6, 0x1e, 0x2, 0x8, 0x1, 0x3, 0xb9, 0x2}, {0x2000, 0x5000, 0x3, 0x95, 0x0, 0x7, 0x6, 0xffff, 0x7, 0x5, 0xffffffffffffffe0, 0xfff}, {0x10000, 0x1, 0xe, 0xffff, 0x0, 0xfffffffffffffa89, 0x7, 0x20, 0x9, 0x6, 0x9, 0x7}, {0x6000, 0x17000, 0xf, 0x7, 0x0, 0x7, 0x7fff, 0xfffffffffffffff8, 0x800, 0x2, 0x8001, 0x40}, {0x13000, 0x1, 0x1f, 0x10000, 0xe4fb, 0x101, 0xcc94, 0x100, 0x0, 0x32da, 0x547b, 0x2}, {0x0, 0x4000, 0xb, 0x800, 0xd783, 0x200, 0xf037, 0x0, 0x3, 0x91, 0x200}, {0x12000, 0x10f000}, {0x0, 0x15000}, 0x4, 0x0, 0xd000, 0x80, 0xf, 0x1000, 0x10d004, [0xe37, 0x4, 0x4, 0x1]}) [ 355.731802] kauditd_printk_skb: 3 callbacks suppressed [ 355.737444] audit: type=1326 audit(1547910483.778:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11951 comm="syz-executor0" exe="/root/syz-executor0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45aefa code=0x0 15:08:03 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x800000000105082) sendfile(r0, r0, 0x0, 0x102000000) 15:08:03 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:08:04 executing program 2: mq_open(&(0x7f0000000100)='.\xd2\x00', 0x0, 0x0, 0x0) 15:08:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:04 executing program 2: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x8, 0x0, &(0x7f0000000600)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB="00ec"]], 0x0, 0x0, 0x0}) 15:08:04 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x200, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:08:04 executing program 4: syz_genetlink_get_family_id$nbd(0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000001980)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0x9}, {0x6}]}) 15:08:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) [ 356.504409] audit: type=1326 audit(1547910484.558:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11951 comm="syz-executor0" exe="/root/syz-executor0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45aefa code=0x0 [ 356.556367] binder: 11980:11982 unknown command 536870912 [ 356.562298] binder: 11980:11982 ioctl c0306201 20000040 returned -22 [ 356.621098] binder_alloc: binder_alloc_mmap_handler: 11980 20ffc000-20ffe000 already mapped failed -16 15:08:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) [ 356.687954] binder: BINDER_SET_CONTEXT_MGR already set [ 356.693458] binder: 11980:11982 ioctl 40046207 0 returned -16 [ 356.716490] binder: 11980:11998 unknown command 536870912 [ 356.722356] binder: 11980:11998 ioctl c0306201 20000040 returned -22 15:08:04 executing program 0: r0 = accept(0xffffffffffffffff, &(0x7f0000000300)=@alg, &(0x7f00000002c0)=0x80) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x6, 0x1, 0x200, 0x80}, {0xffff, 0x9, 0x1, 0x7}]}, 0x10) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TCFLSH(r1, 0x540b, 0x40005) write$vhci(r2, &(0x7f00000001c0)=@HCI_EVENT_PKT={0x4, "039d3ac4c726332688dd14592937e5a352e0b4d8572410902e3fa4245d85831433ecbc8220644497b4f7ae04e41c39e7a713c631f7cdbb72281aedffe4e1fd7a71be8b8c70a5f4aa8b5213b18f908e58f925e3a39f72fb4b293397d453bae33d9a53a52bb670ca434a05527de6fca22d926c55f50aaddd64"}, 0x79) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:08:04 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="020dfff91000000000000000000000000800120000000100000000000000000006000000000000000000000000000000e000000100000000000000000000000000000000000000000000200000000000030006000800080002000080ac14ffbbf00000000000000003000500000000000200423b1d632b91c520000000000000578f611ac318fd154b80e183886a5b3abe5f2d551aea3c38c64cad265dd103b96dedbacf2b1937d5eb0a9b42e380c213ade110427bf2e27f220cc0ca3d0e897cf3530c63008f68304db7aa67b93dfffdf0de3033ca7ab3de1b012b3f46d103e8acb09c5c288265d60868ff3229db52488d82d7ddc80758eac9351ef6fe001555f1fdec9ee35bc88d5feb8f488fafe893c4039d30a7dfa650d9a3a7962ed772d5d1f2db4fbc8243a4dcc9b0c8d456178cd5b42926fd40289ce0"], 0x139}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x2e565d7c36d98a1, 0x0) [ 357.279910] IPVS: ftp: loaded support on port[0] = 21 [ 357.408310] chnl_net:caif_netlink_parms(): no params data found [ 357.457204] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.463750] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.471498] device bridge_slave_0 entered promiscuous mode [ 357.480378] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.486998] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.495385] device bridge_slave_1 entered promiscuous mode [ 357.520107] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 357.531656] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 357.556455] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 357.565052] team0: Port device team_slave_0 added [ 357.571005] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 357.579408] team0: Port device team_slave_1 added [ 357.585533] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 357.593904] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 357.655190] device hsr_slave_0 entered promiscuous mode [ 357.702853] device hsr_slave_1 entered promiscuous mode [ 357.753335] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 357.760828] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 357.781666] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.788206] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.795408] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.802138] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.865634] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 357.871771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 357.883245] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 357.896068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 357.905563] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.913360] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.921780] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 357.936894] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 357.943187] 8021q: adding VLAN 0 to HW filter on device team0 [ 357.955535] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 357.965982] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.972603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.986617] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.994863] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.001377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.036200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 358.045890] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 358.063869] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 358.085248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 358.093947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 358.107961] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 358.114341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 358.134975] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 358.152308] 8021q: adding VLAN 0 to HW filter on device batadv0 15:08:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:08:06 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000), 0x0) 15:08:06 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 15:08:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:06 executing program 5: clone(0x2902001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) 15:08:06 executing program 4: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x6, &(0x7f00003efff0)={0x0, 0x0, 0x2fffd}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) r3 = memfd_create(&(0x7f0000000280)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r3, 0x0) read(r2, &(0x7f0000000140)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 15:08:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) unshare(0x400) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, 0x0) r2 = socket$inet6(0xa, 0x5, 0x200000000000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e22, @empty}], 0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@int=0x1c0, 0x4) 15:08:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:06 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000200)=@known='trusted.overlay.upper\x00') 15:08:06 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:08:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace(0x4207, r3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x8001}) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setregset(0x4209, r4, 0x20000004, &(0x7f0000000040)={0x0}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 358.673503] sctp: [Deprecated]: syz-executor0 (pid 12042) Use of int in max_burst socket option deprecated. [ 358.673503] Use struct sctp_assoc_value instead 15:08:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) [ 358.906180] ptrace attach of "/root/syz-executor4"[11217] was attempted by "/root/syz-executor4"[12054] 15:08:07 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 359.037990] ptrace attach of "/root/syz-executor4"[11217] was attempted by "/root/syz-executor4"[12059] 15:08:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 15:08:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:07 executing program 0: r0 = socket$inet6(0xa, 0x80a, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e23, 0x614, @dev={0xfe, 0x80, [], 0x16}, 0x4}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e21, 0xff, @rand_addr="7fc3ab7ee2f81dbc67476f966820c8fa", 0xe8}, @in={0x2, 0x4e20, @rand_addr=0x6}, @in6={0xa, 0x4e23, 0x5, @empty, 0x3}, @in={0x2, 0x4e20, @remote}], 0xb4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) setsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f0000000040)=0x978, 0x4) 15:08:07 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000080)) add_key(&(0x7f0000000140)='id_legacO\x05', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="8e065c10a57b82c350d949ea8cf782bcc24ca6a099b8a8a4d031f58a4d65e883935b8ae9b3f65ef5bdfc548004b029f1000642a19c46924ec12e84c1eaf2509b181b577ba0af0ef6647fc0e35e4da54d49f64bde120d45527095cb973ac0c0dc0b2b3cdda4d52d8e20558670fbbf2f2430208b1fc9e5313960ab6f88f8911d475c887754a6d416ff81b78b2a030d1c354c8c5bba687b06ea1222d32e6a2e15db39faa01cd77ab349440da5ef14b318d6e1964d189f041390d191fb2a46b7045c2b6ccc447b425fdfdb6c6187c74071f78394d2a8777f54a1b444f0011e771d1577167d4e777c3b4e16e3bd1ca397d56d79e6e1f6a42cca0c64", 0xf9, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)=0x4) setns(0xffffffffffffffff, 0x0) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x7f) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)="10ec", 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{}]}, 0x10) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) 15:08:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:07 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:08:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:07 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e22, 0x2, @local, 0x2}, @in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e22, 0x2c4b, @rand_addr="b370a22e3c7482dded9cc3abad72f198", 0x81}, @in6={0xa, 0x4e20, 0x2, @loopback, 0x6}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e23, 0x10000, @dev={0xfe, 0x80, [], 0x12}, 0xfffffffffffff801}], 0xd0) 15:08:07 executing program 5: 15:08:07 executing program 4: 15:08:08 executing program 1: 15:08:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:08 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1ff, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:08:08 executing program 5: 15:08:08 executing program 4: 15:08:08 executing program 1: 15:08:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:08 executing program 5: 15:08:08 executing program 1: 15:08:08 executing program 4: 15:08:08 executing program 5: 15:08:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r1) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:09 executing program 1: 15:08:09 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x440100) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000140)={0x5, @sliced={0x3, [0x6, 0x547, 0x1000, 0x3f, 0x362f, 0x0, 0xffffffffffff7fff, 0x6, 0xffffffff, 0xfffffffffffffffc, 0xffffffffffffff9c, 0x26, 0x6c83, 0x272, 0x0, 0x6, 0x401, 0x1f, 0x81, 0x10000, 0x2, 0x4, 0x6, 0x6, 0x9, 0x1f, 0x364, 0x4, 0x8aca, 0xffffffffffffffff, 0x20, 0x40, 0x9, 0x0, 0xfffffffffffffeff, 0x71a2, 0x5, 0x8001, 0x9, 0x200, 0x4, 0x7, 0x7, 0x1, 0xfffffffffffffffa, 0xb50, 0x401, 0x7], 0x6}}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f00000000c0)={0x8, 0xae6, 0x5, {r2, r3+30000000}, 0xfff, 0xffffffff}) 15:08:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:09 executing program 4: 15:08:09 executing program 5: 15:08:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r1) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:09 executing program 1: 15:08:09 executing program 4: 15:08:09 executing program 5: 15:08:09 executing program 0: accept(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000000)=0x80) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000340)) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100900}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x114, r1, 0x4, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffff7ab0}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8f}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb1b4}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x71fa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x26}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x40000}, 0x4) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:08:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:09 executing program 4: 15:08:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r1) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:09 executing program 5: 15:08:09 executing program 1: 15:08:10 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e21, 0x100000001, @remote, 0x2}, @in6={0xa, 0x4e21, 0x6, @mcast1, 0xffff}], 0x38) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000000)={0x9, 0x4f, 0x8, 0x0, 0xfab3, 0x5, 0x0, 0xffffffffffff8001, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000000c0)={r2, 0x80000000}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080), 0x0) 15:08:10 executing program 4: 15:08:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:10 executing program 5: 15:08:10 executing program 1: 15:08:10 executing program 4: 15:08:10 executing program 0: recvmmsg(0xffffffffffffff9c, &(0x7f0000001980)=[{{&(0x7f0000000080)=@rc, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/16, 0x10}, {&(0x7f0000000100)=""/219, 0xdb}, {&(0x7f0000000200)=""/146, 0x92}, {&(0x7f00000002c0)=""/151, 0x97}, {&(0x7f0000000380)=""/10, 0xa}], 0x5, &(0x7f0000000440)=""/245, 0xf5}, 0x2}, {{&(0x7f0000000540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/115, 0x73}, 0xffff}, {{&(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1}, 0x1}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001740)}, {&(0x7f0000001780)=""/52, 0x34}, {&(0x7f00000017c0)=""/45, 0x2d}, {&(0x7f0000001800)=""/159, 0x9f}], 0x4, &(0x7f0000001900)=""/71, 0x47}, 0x9}], 0x4, 0x40000000, &(0x7f0000001a80)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000001ac0)=[@in6={0xa, 0x4e21, 0x4da60bfb, @loopback, 0x5}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e23, 0x3ff, @mcast1, 0x3}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e24, 0x10001, @rand_addr="d0b8463cdfe452666a99804e04f2d0d1", 0xffffffff00000001}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x18af, @remote, 0x3}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1f}}], 0xc0) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:08:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:10 executing program 5: 15:08:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010ae42, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 15:08:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:10 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 15:08:11 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x2) pipe(&(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:08:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:11 executing program 4: 15:08:11 executing program 5: 15:08:11 executing program 1: 15:08:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:11 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$netlink(r0, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:11 executing program 5: 15:08:11 executing program 4: 15:08:11 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000140)={0xfffffffffffffffd, 0x5}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000100)={{0xffffffffffffffff, 0x40, 0x4, 0x9, 0x8, 0x100000000}, 0xbe0, 0x1, 0x5}) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000080)=ANY=[@ANYBLOB="03000000000000000400000001000000060000000100000007000000090000000900000000000000000000000000000007000080070000000500000009000000010000f7320000000a000000000000000000000000000000010000401f0000000100000008000000000000000001000000000080000000000000000000000000"]) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:08:11 executing program 1: 15:08:11 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$netlink(r0, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:11 executing program 5: 15:08:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:12 executing program 1: 15:08:12 executing program 5: 15:08:12 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$netlink(r0, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:12 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x100, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000240)={0x0, 0x4, 0x5, 0x10, &(0x7f0000ff9000/0x4000)=nil, 0x8001}) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0xff, 0x3, 0x24a0e07bf11351ab, &(0x7f0000ffb000/0x4000)=nil, 0x1}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0x22, "b3e6e9dc7b57bf9c69560c0451561ba482fdf859db0f23fadba9ef6f8d8247ef98a978ce50f4fd40f91395b3923d8f36258774ebaa0b5006b752de51e2a5e24c25549216fe529df3d5718059631b"}, &(0x7f0000000000)=0x56) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={r2, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) get_thread_area(&(0x7f00000001c0)={0x1, 0x20001000, 0x1400, 0xb6, 0x3f, 0x8, 0x20000000000000, 0x7be, 0x11, 0x9}) 15:08:12 executing program 4: 15:08:12 executing program 1: 15:08:12 executing program 5: 15:08:12 executing program 4: 15:08:12 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x81b}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0x1, 0x30}, 0xc) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:08:12 executing program 1: 15:08:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:12 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:12 executing program 5: 15:08:12 executing program 4: 15:08:12 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000080)=0xf75) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000000c0), 0x4) 15:08:13 executing program 1: 15:08:13 executing program 5: 15:08:13 executing program 4: 15:08:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:13 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:13 executing program 4: 15:08:13 executing program 1: 15:08:13 executing program 5: 15:08:13 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+', 0x9da}, 0x28, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e23, @rand_addr=0x1}], 0x10) 15:08:13 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:13 executing program 1: 15:08:13 executing program 4: 15:08:13 executing program 5: 15:08:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$netlink(r0, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:14 executing program 1: 15:08:14 executing program 0: r0 = socket$inet6(0xa, 0x2, 0xd351) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:08:14 executing program 5: 15:08:14 executing program 4: 15:08:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$netlink(r0, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:14 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x27) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000240)={0x0, 0x0, 0x5, [], &(0x7f0000000200)=0x7}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @local}}, [0x1, 0x401, 0x7, 0x1ff, 0x719, 0x1, 0x100, 0x1, 0x3, 0x10001, 0x3, 0x8, 0x8, 0xffff, 0x7]}, &(0x7f0000000000)=0x100) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000180)={r2, 0x200, 0xdadd}, 0x8) 15:08:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:14 executing program 5: 15:08:14 executing program 1: 15:08:14 executing program 4: 15:08:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$netlink(r0, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:14 executing program 5: 15:08:14 executing program 4: 15:08:14 executing program 1: 15:08:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1ff, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(0xffffffffffffffff, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:15 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x4180, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000100)={0x1, 0x5, [{0x80000001, 0x0, 0xa56}]}) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffff7, 0x2240) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000080)={0x1, 0x0, {0x37, 0x8, 0x5, 0xf, 0x2, 0xa9, 0x2, 0xba, 0x1}}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:08:15 executing program 5: 15:08:15 executing program 1: 15:08:15 executing program 4: 15:08:15 executing program 5: 15:08:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(0xffffffffffffffff, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:15 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x80001, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000002b40)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x3da) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) r2 = getpid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000100)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000200)=0xe8) sendmsg$nl_generic(r0, &(0x7f0000002b00)={&(0x7f0000000040), 0xc, &(0x7f0000002ac0)={&(0x7f0000000240)={0x2850, 0x24, 0x8, 0x70bd28, 0x25dfdbfb, {0x20}, [@nested={0x132c, 0x55, [@generic="464db082c7d7e7d9e5fe0d1bf72038e0072d22a2f822d91910498145c531689f79ea34a2270b710a9d6102fa9e7056315ca6f3e9e97ed33d19cf7242a2c29bbae2520fa0f692851b869b1ce192f9d478334b367903342f5fbe961b2664cc1d7212dbe7195617fd12a2076e4452f329b3ebe382bb02c0ca39e711136d67a85455de7afb76829f5810bfda0c21eec4291083cf06a5cbf27b7e483db2b8d61f12ae1f7a22829ed6291d1e0342ef2fddef21004e8247bc597c48a7a635bf129089a71ff9e34c5c36f9c4ec6f446bcfe7660c239c", @generic="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", @typed={0xc, 0x6c, @u64=0xfffffffffffffffc}, @generic="a231710b18c8021d960923a13efc9cda089213e749b8c3016ae9de162951d418c4dbea8575dc11ec63df0f85915d6fe9b6b4a661d64cb1298faa828330f6006e7fadc0dd833701dedbf5059b2d374a5a85ad80da28192b1cc9e1a196d2525e0d557e50e77775a615353c6d3c506550ee321926f5c73c33e70f60", @generic="00ffc24dc6ba3c15cf84d09e42356ab6c40cecc3fd341754f6cddf032454b1b09087bbc7832e4a04edfe1bce06740919ae6f3479da33d0428f1f28a01881fd4beb768dad68dec6ca397632310b36b998b65bf6fa1e451d9dd7bcb14efa1a395602e6f99c15e719cd947c", @generic="9dcf561e02fe7dc8c60f68942f8fe5be41161c6d42615f5320856a449831b76822f1cf2b5fb87459ef1db84f488ab9e32cd49bb5b6398227ca502bf4bb895bdcaf340a1631b4ffa49ec54fced024ff91fe460c9011acd1b327eafdc655c8ff2732f4abc748d481ed233d82c04396647f375f7e24567493d1abf28602e6e9a66fc884bda3f3f58bf34e55dccf5adc68ae2f802755c02ec2f7630bed99c87e3fbbb4ca68cac2a571e96a504f38658f", @generic="71a21b4a20b5579f927a19f2", @typed={0x8, 0x23, @pid=r1}, @generic="46928f2599783821d30dc0870a9f256930260ace17ecf3f6eec58ef53b9f01a5e859cfa9779129bd013c4cff95b48e56b31425ecbfa8fdb37f9ad50de3362d82c368116501d9d37c4c57225a8f6b8f43f7382cf1d3f8fbe6ff00eb5721da92bbfd1c118543f69437acf014ebba17bbb7cffef4bc569abd53a5174f85c49e3fcc2a5403cc902fc7c830ef655ffc62849ff5164630ae52459a2a3728a8e2b3d475ed"]}, @nested={0x1024, 0x22, [@generic="da9f8820755c1bfe5f07a7b9f5aa4a0350d38585f1d591bbb7d17579c332edbcbdbc7733c0dd973f76e368593a589fc25728c13fe5c06939415231c6ee88501741843bf339a8ed75cfcd3631c7aba536bbd738851bacbffba96183bb96d18a63b91a0837f1abe27e58b29e2ee91041a7966a35eed43026cd1bdea6300bbd495e937ed46b5bac65bc6c75c54112f70a2b03b9083f07439ce1b342d647b86c99f0dbeaab379c72d845dedc0da4bedb774bfba7ec8c8ee3aeba9f3bd7c2b139761e882d104b53b4780880613bb2d484acc639b532f50dd2e5ee586c82d6203a940362733b0f234957014a58f6d731c51ef544bba49bbc6258a8900172cb056fcf59604bd6c54418ecdfb744f50fb08b4e0f98bdcc5dbc2b13558186d1f8e4e966d35f2d82ba90080746bb5b6f3ac9920312bb4ebabe4051ef43102a0a535600ad68c17f5bb5ebac093dba2e766f49aecce67bc0bb9a725eff6109a17928b8ca928fdd2b9fbc43bea0b5869dafd897652c67cb6749885e476b11404f16aa1b83d8bfe6521fff569ff2cc3e0449f77f4323d894ec8a450e77f68572c41458bb2ce9ffc1f20162a0f5977e148760322c06f0778bd68bf1c92b9772be17fee1b17f6381ea20111db399b1c5a69331c5873f2fb2bd8ad3f8a5235def99a91f3dee2184427ac80ce50933bea49656200171f648773a8ff5ff7834af59db1ed4422f541fae60d3fe9bd3e9542ba08be772cbf0c6f133f206d3e1569d2fd54b7ca200c577092753749c5cb0e86aef3ed97710336f2b729ef9ad0e93d598768324a0292ff1ff7440eeb0d586819d9655c5358a7fa9901b96f5484111eff443ad27b376ce8ca68604e131f78e5d5f68b15a6fd302cee26262b19192d5795787fc17730a8521ea23439a0a66f586e2f4a9a95002bb4530e8a79104c0c0d8341f70ca377fd05b655dd0dfc4eefbecc653a8f6dc046162a5d6f9771c0f60f141df9743f604b66aaa92930e7d9caca9ef245c45e8f1f326f9ec1f0ee64dda67cca34cc33d83d19ec33091f62ea50adfc9655feb3235f84c87fb82071329a51472e76d9ed86e0ae62461e5c69171507a8d35e9c2931ea79f1a564d608d7f81a3f367774e99ab420f4f1e443e5987595e1d9111fe5127ac8bb1bf5948816e419e41d67214f9b2a436d19eaeae1cf765941ff06c5a5665482435ba18dbab132e2e119f0920caa55ad80adbf15b39602ef0a63838bdd73fc5de246352619e5d0ae3dee539aa3f5939d52d0fe51d41999a1b34b3f636e0050e97dd39de02db5b5639960cfffd0051af2307af435d7cb1c9fd936295e013e54cb7d625186b5223ee5cf667cdd1aea796f040d076b6bbdbaf1678df8f6fda5c311d3611db1c6cc408beea3f3b06606bc9b20d4b0b1f658540a6a6d1ec444281a7aa33afbbd704a59b90528e7ab8a65e1ef80e79fde4a809c02428fa48a0cadf5f8271fbecd690bd09c338a434ca741281288a3b676a132730474a87993dd5d9dbf4ccdaf13ce37ce549f8c7b14eec72abee0579cb3f52b42de53597f67386f0fa1c706093ad2650a6be703dc5ae89aa85f78409b9b4af94675acf9d877bebbb6b4b0cfce1c53d90fe5dc6f2b4dbbd9cb6ce0678d7eebd4f4574d31cbfb1ba72c86447cc08932bd46f3292b7d8966010f70d0c1e278ed861dcf4cfebd135887ffa403e9da58c9e8ea1bd4140894956e272f23ddb074962e0814dc5a7c23ca4b0757852a38107499054069d74f6027a607e1c417aace683624bebb294e88b091cb0fa9bb5dd10e0255e74c5169c24c412dc0c07038f80c6009262e3fb8457bc08c1c4cf08f11af309fa0203bf3d3ea581490914050969723d67f9e795ea1cbb67397b15a9494eb7ed8efdeb964ad6c0a7779e255ed020e1ed5baeaf58b2e383e5be33ea8781df68f7c99fcda335cfe290d61f7d5527251f77ca34f459ff59cc304a9f4dd269473431385bc146eb20272dcabb6a503b3a4d97ee1cefd7f005026a28688e60c0595dfeee864b4531b9635fa99902f57a258a91698e23fe122efca9342dc825fad2a10690ee93d80c9bdae257041b30f8deeccd7f47f679fe61881bc19755903ca5a66dc45f33ff520195de86a28837c0c3a1e4ac89ba93abd70888f75c551f7c8741d99be2f8b291e9ddb93fb7aade125ac2aa23f1d75bf6b00910cab3321f6fe1a3b55c89c9b0cc32fe53f8019446bfacf5a31f72e1932f189bd79e7f1bf021762e7bfb5138239b4b87851a47c721c9afd3f89435cfd8da8d586752ab4de035d5c67d7dae3d29105941a2decdace86c29e8291cf29a154400ae4113481a6a2cb7e2283a03d92824746b4e59d4dab53c7d6e657982e25a84c1f9022296965b8c1eb632e1e7e3a026dd78ad592de2599f120d8be4231e42b9b8a95e7b19fa96a3a075304fdacce9ac9cd981a0b93781d9a9670960608c1a53f756462e6401fdf6366feb2a463aab55bbfe3feac70f2d7ffaf4ece1977cf2b00c745d42cd6f90caeb9710173e41922a0be70096047a7dad54e91ece6acdc9e71a68d7f97e554f6ab1e86368643260a44c937c02078e3969d1c2240221308cec71e374cc4aa4164d093c4aa9bce7d896a97819f3e0fac7d6a5d87a66aee621afa5673880b5fca431aad4316c5a4b6bfc9ea0347359afdd60fcd558df61a9c181cd610366add59e036032e22b20b1d754e981f84a274e24d49ff449212198c345dfdba5c96f7e2403f46bfd6364192d31446971a047f4667c6e0c12e1903f9584aac236e143b56338070ad62bb1c754119b49807df96f22bcc21740644433cc4279cc2421ed8ba0c80eda9f6522a7773b7a25210198b43c3843cd5d071a1d2ab1572526a77827d086ddf9e2732cddaeab146b1df745c3e9b6557c019f3a3c53c126b41b2d5e2974504f5b7a0c6143d965c1fcc0dc15ae4d2e577e68ab5ede30c22c6854135798cbdf103e86843521838e824f6916548264d9efede8d4645092b09f32707548ff764f187e745c5f60780a8c5ea6f02a930ffef454f82243b5421c06af6ae7a5791ebf04b132e1a91175f47f215904fbf3944bf90351550db3e1efefc020786618709a031af09b5a44340ecd65f5ec909048d4d6ecff32323df4bb89abbb1dee272a3c42ec8ac01eba50efc54ca1038e2c228c203027c8c5c60b54c0dc5cc898649bd99feb51433d6d5740aec826f9fba2c71e37735321477d2b39357c47b798f4405bef76af45ebbb440829057f5489d2c7e39368dd06916e96665472e737f2dc66892b85ccdb6c23e9ef9ba854d564e0031eb758bcda997c97d1bc072b24de13a5849d42a9aee50a33ebc06c521c238518c5d4fd201e0128d19003e0923685e54d507100042615f77a9d989fc874efc6adcb39364cdf29284792736457244579fec1e757bd5c55a4598faf82b17276dfe3f08129b3541236fee6d7f3eda4a911419d8744ad0e3ce64a8b6808b400722eee15737d819e827bf3d97506e5aae935c2f2a90859597e9e39935bbd1f14cccb8827129bcbeb6ae03b1e50c9b34ed92c2f82bf035c477a9c1af4d5b9278417bc383acee90d73db01b2371c5391957720a6bb8935d6b83a75ae6fa2a71d8eacff71af6702574085813feeca5fe6c209ed0bceee6a938fcde58032afd4f0e0a7149828a16cea100f386562bcbfc9426005a911f957bdde8110b811f6dd09c4d81b4be852fb4ac4cc10bb8a11e713cb44f30bf5beb7704dfbb0d3e5fb21d7d8f96f9ba2cd729f3f6369b9a152b4cd269d6416fc27b343ae22038e098f33416dd393a8553f4f031b3b856786f70396090b41bff42f08aee97596c48136400a41260deb318b7018125ece96e9bdd87efc00e97d0693e7d9e0fefa8680371bf7103ef834b647a12b9c0fc0ba4042c6a5c58eeb8b8cd8447d75fddfd4bb3faacdae426e77288611586afb5c8c0ab5f5328e9c87573c55be8467b8100f809d113f2226c0f57da8896809f52e30381b5dc40cb6d73bb39bf1c376fbd570043b6c6374ef2b7a2cff15335856d83a410e0c9d884443ee3713f3af287d6679132be3b8c5e52723e0844d78055bac49ed8e3e95a1b919763a5f0140357f1018e48f903b9d9d0bd69f5d9bbd02bc91172858e259c9b460f9c7289a4e0b634c59544aa7893206a183ce54e38edc2bb9d54b10bb581f8078174598e9fee9256e7027f24a20b98e230693f14f26af114726c761c8779027745e5c318f972e09d96c2e88854d6ec3adb5b73de0c60309458df9e48f403c8a3cb91c0e04fe804168506ac3f3381ba571dc0db68c9890abfcc6abaf2c4e76c0840bff6c341f955045e7f51369f6a4bc8a9ccabad75d06e3ace9858682bc2958e8b39e8501e3e6a82fc18cf63b7191d83efe4d4f67dd2d5637f3c1cdeeba3da11eae392f5b5caef571cd0ffa3690b5457d7ebc2120668b29309e9567bc7930e68be3ad165b05b37a0a1beb94accc42a02ac9dd3db741c6b7beffe3447653458ba9dac409f02b8be83dc3c7fd49c300de4d889a3313ab5d44c8af151413e9e937afb27c2512c20fede3cbcc291a7f303acb616940e3adcaf9e0f9820f061564ad9918c44b629d2160e52d22e839a071ffc2172ccfd0cffa97c27abfe255acebd3d9a9dc6b808fe907984e1c2c25fc14d03292f96c11203905a8ef486e59fc435d64650b1564750e266f7dfcecba6e7584abb5966f85467e64e72ea4ce9166f68e399130b193b75b01692c20a07d92fb228c9efa3fb19ef2a7626f03529b00ff7c63cbd792ccdcda0c2af2326b9b9dfdab1847344b88c6570a827b83052cc42c3c9cb9d37ba5881f9b39b13ba7a7df9ff1db088c367e64fbe2ab42374859b8821adcde64cf002d3c9b27c33a4fa7ea427005d5d9d93d488164227ed2d39bd20744cc859c8ee33b28c4bedcdaf9ccd8cf115b9037c99e171dbc36d05a0abebc384ab006c06b81192ddb12c589134aa4b37083387560086459b3770e8605420254d1f9893fc61ddc3246f117c4676b87b38c56a8fec0f95dbaa3dde35fd784447c8ce7772be36afa46a776d0e1928e138a6663f8575b3c1487554c37dfc4634a95e9e308e62607b35057d116b62a1b0029a343f0cf117897c1a18e6211b0e1ba1d37dba8acff3d32df5af8cc33f78ab7a671597081632b5c87d7d3d6a25fb9125d81b717b4696b1e179df1778eecfbd180b7d96673abd8ac6bcb85be38be64d03787a4798e8d19650c2ba4373972baea90c118292dccac2d84738fe891290ae58b611e3f053536eb3ef23231790963501784c289a6bdf56f65596253449772fdbe5af508a693cf519228d8226507d7015d63138e4377ad47d0ebdaf609ff678f2f5c4a4842658c944c96773e0bcfc842e1a25a94bd52717b21fbf6072bd85055bf623fd2cd1082094a9d6fa90c7a57b57f48ee51b80e9134f426a0f9dfe8a8f3c1247e2843b9f85e746d836e201865d44a58000fd7b7f6014b12d290f90cd707d3034d205b50a0629f59f0ab8f36acf58a4fcad515be1f7637874a403b8df3ce140bd76486e5d93982f755cfc25ccd2f9609364d8739afe982fecb96452053f15fba490918076234aed5f8a65fb6515ff2c4269eb8402b0b0d6f9ba789d573ba67f38cefbcfaa8873aaf66c2532cc70890a4a8538a8dfb8ef6c06db537a6ce908db43e96054c45140b9e0b9efbeb7611ee9963813e25f8cb343e6b0f6bbebf5a1b3942785d43a5eae3f7ae1546b1eaa9003431242180ae0df86e154911a6a1cf87ad27f622a08e9a3fdfd8d000f7b020661bf3", @typed={0x18, 0x20, @str='/dev/vga_arbiter\x00'}, @typed={0x8, 0x8b, @fd=r0}]}, @typed={0x4, 0x86}, @generic="4c1e5211eb7b0973621bbaa643e240d5f59428483c2997f765948a9429ab4be055ad5a057c3d4f82147b298272c7f5b97fb8651eae582bd3c9a07e3578032ec0c3f9618fcf2f349426a7631879111d748eedff41531582c061207c95a3ab181a919e24d53c38095640706e96ce6dd29ef6720b66053cce9e148d192bc0640d53e757305e0d8508210d", @nested={0x1c4, 0x95, [@typed={0x8, 0x3f, @fd=r0}, @typed={0x8, 0x61, @u32=0xd9b}, @typed={0x8, 0xd, @u32=0x9}, @typed={0x8, 0x2c, @ipv4=@remote}, @generic="3f3e5096760b1f733659586cecff2ba08e5375f7b9544936ceb31710f4f3a2331c6772f56f7a5b249a0a6cbebbc89ea4d3d18ccd94f314be92276a82f8a9eafdf52973babbb8ae8c9f5a15e06ae9892a87d83ba5fc5c00d79f934671b5233e43546f48ba54edd3fc795c625ef8f875264acad9cafb7171c47f044ab4ad8cbfa837147bbc61a2b4a147e8b9216ece123d4f4cf9fbf1bb1989e9d46a90391213e40f8e9769f480e2c30768bbf33d7ec5e7c7400236fbbd61a48291bd6caa93b045775b92e3a1240225ebf32c20da28b3dd4865ef3dd52ec09544976ce02e12f77d", @typed={0xc0, 0x67, @binary="a412a787d836bcf9aebeae71bf32cb323a6397749180ff7af5df1043a7241f6aed91acd8c436346c0658261bb472fec455e662ad6de0d8342105846d92e03b1af92b1b92fe412e07de84e409dedd63bf0237f2f934ae0f9190e6e9cd358c1cd6cc5466f058ff43a6141dbaf0ead2ae200822d9d9fed23c2e790b2ca984f6fa4021e0b195fb0f444c2069216fe04b98e58502247a663fda160169ca2bc02081ba2c09c3b478e9b462a0d720a6ffa82a94060b33594a1bb1b267"}]}, @generic="9d5a5edf6893d9753caadc742322fd1d2b2ea35c1616f9babb156adcbb2cb96e84575d0149228b58ebdc1841fc10181a2830e5aeed", @generic="58e8726e0c52564f3fdd0ad3846b218227793edf3d72ba7bb5a98ac558c8e7e3bfe28cfc6a1c557ddf92d0c1a445ca9cb15f1f14070e0ad0a8b57707c11ef0b95ecd5742ab2ae26ed7112ff470681249e46a830bac704cea8843211913ab0cabef429e8ec48b1d771bd0ecbb49072eca6fd830343ae0021d31a5d12647f6b2d9d0983e943c8a29da63212b068cf522047a8c25b125325f76e052aa115016d453c81777b7428fe47d93", @nested={0xd0, 0x17, [@typed={0x8, 0x19, @pid=r2}, @typed={0x8, 0x16, @uid=r3}, @generic="911a252f770fd11aa58b05bb0e0e6fe006df44a6b69d2a32045ba8b5f6af4a0123f094fe5db2ccbb70189ed05b5cc2e6a8346c69fd0e6fd829b27563bd7e35673608d64831f29d3ebc1146b99647adcb87228f3366dab62161238d2e4ed97ae229bbb1f7a9330df593a9a4279b47a497a632477f8158a2041ca89cd49e7a09c762877930847add5abbfdc62bba33e5e1ab3b4c4c72fddda9e702261ee17cbf4a6e5225144a24aa41510fbeb8f3cf770f050444ed63a5dd4c62"]}, @generic="eea290e553c047b6a99ff1561b6ca43d6ba9d395f71f553b2698c25af63a573c9639fe702dcba14dcc63936b06281541a3150badf5132646d74c7aa0e1be0b634e4af28fc0ff6df8840d9598077d0f8501b3b127fede3a8e51e7f01cb38b1007df8974aebb1ce0ae71e25d4bb4bf88b279aa2733b685916b1e04b275e6041faa03b5a6de985a9c200a33acc937081b083c33bae043ab2bf8454f1ecbe219275cb25002c23663ddbbecd45f0d7f626dafb9a7c457fb6ab7c20fc35c3edb419632d7459f8c0a143e9ad5d098800eef2d07f620a2820641c4ebeaff2f86e580558f139df2c76ea8a669a1f0dc6f"]}, 0x2850}, 0x1, 0x0, 0x0, 0x4044810}, 0x10) 15:08:15 executing program 1: 15:08:15 executing program 4: 15:08:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 15:08:15 executing program 1: 15:08:15 executing program 5: 15:08:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(0xffffffffffffffff, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:15 executing program 0: r0 = socket$inet6(0xa, 0xa, 0x20000000000008) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e21, 0x8d, @dev={0xfe, 0x80, [], 0x14}, 0x7}, @in={0x2, 0x4e24, @rand_addr=0x3}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x2e8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) capget(&(0x7f0000000080)={0x399f1736, r1}, &(0x7f00000000c0)={0x3, 0x1, 0x1, 0x80000000, 0x9, 0x40}) 15:08:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 15:08:16 executing program 4: 15:08:16 executing program 1: 15:08:16 executing program 5: 15:08:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, 0xffffffffffffffff) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:16 executing program 4: 15:08:16 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x4240, 0x0) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:08:16 executing program 5: 15:08:16 executing program 1: 15:08:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, 0xffffffffffffffff) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 15:08:16 executing program 4: 15:08:16 executing program 5: 15:08:16 executing program 1: 15:08:17 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x2000000000000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @remote}, 0x2}, @in6={0xa, 0x4e24, 0xff, @mcast2, 0x3}], 0x6) setsockopt$inet6_buf(r0, 0x29, 0x6f, &(0x7f0000000100)="b9c9e0a36691a000b6919e0aba5bc191de8ac6c46aeba19f8f58b2c4d84fe9b5499c0160f3e488c4202116078a052b46cd79f06266d36487cd74d775f666edf8e97346bba6bf453dd9b9e4084a159a84fb966a725ae53f1ad88d1208b1f532579f4785d43c7b69d838d3702b10a276adb52a62687fc93fd338a15067431df8cdd64ae417c86f2329285f2632a9b4377ee1c0b76dd7f7ff49b5d71ea914c0dbf81f952aea1259005b84101ba011056b9cdfd630fcad886135ebbbaf693a1ba04aff6afa0563a4d4", 0xc7) 15:08:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, 0xffffffffffffffff) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:17 executing program 4: 15:08:17 executing program 5: 15:08:17 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:17 executing program 1: 15:08:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r1) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:17 executing program 4: 15:08:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x401, 0x401, 0x9, 0x9}]}) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000140)) 15:08:17 executing program 5: 15:08:17 executing program 1: 15:08:17 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:17 executing program 5: 15:08:17 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x2008200) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000280)={0x186}) sendfile(r0, r1, 0x0, 0x8000fffffffe) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/udp6\x00') ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r2, 0x81785501, &(0x7f0000000200)=""/95) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000440)) creat(&(0x7f0000000680)='./bus\x00', 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x8, 0x0, 0x10000) 15:08:17 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) 15:08:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r1) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:18 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x401, 0x200000) write$nbd(r1, &(0x7f0000000080)={0x67446698, 0x0, 0x2, 0x4, 0x3, "b53dac012e4efeff9e73a33541efe064ca042ecc58f93ac61d331f1d455f2531148763c37ad26343bf87fdd958dd28a4f98867ba5a6dd39394cd9cdb6f159284059ee70b504cb108a00dbcd048ac959dca23b5812ab35edcf48f0389d249d47bafce87bae35420f2e5ae9043ab95bcf052ab76e229fc94a7d594282755b95102936a201f82060170b96ebae999dc23109190629f2277096dc9444294693c08f07ef2d0d585163fa040c063b18ebcc3ec6388ff6c0169884d1711e15625da2489c78a6c8e7af9a58c1e7c74bb61f7b63b2d8ae5d619cd1112f78eb6d3e05707a645"}, 0xf1) 15:08:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r0, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:08:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000380)={0x1, 0x0, @ioapic={0x2000, 0x0, 0x6, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x1}]}}) 15:08:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xfaa}, 0x2c) close(r0) 15:08:18 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) 15:08:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r1) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:18 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f00000000c0)={0x7b, 0x600000000000000, [0x4b564d04, 0x0, 0x1b], [0xc2]}) 15:08:18 executing program 5: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x0) 15:08:18 executing program 0: r0 = socket$inet6(0xa, 0x400000000000002, 0xffffffffffffffff) socket$inet6(0xa, 0x3, 0x1000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) write$binfmt_misc(r0, &(0x7f0000000240)={'syz1', "38fa14c8933acb72c198f4a1c8148f99314a1ea4666de0a9055438f830ffb7becc889e4b45d5a85abf222db7d4f0e7dc757968929a3396286a743d1e7486d23ea93ead7c1689"}, 0x4a) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x22000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@remote, @in6=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x10001, 0xffffffff, 0x516, 0x1}]}) 15:08:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) 15:08:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getcwd(&(0x7f0000000d80)=""/91, 0x5b) 15:08:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:19 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0) poll(&(0x7f0000000200)=[{r0}], 0x1, 0xff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:08:19 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 15:08:19 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e24, @rand_addr=0x100000001}, @in={0x2, 0x4e23, @rand_addr=0x7f}], 0xbd) 15:08:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20, 0x7]}) 15:08:19 executing program 1: semop(0x0, &(0x7f00000003c0)=[{}], 0x2aaaaaaaaaaaac29) 15:08:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket(0x10, 0x100000003, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001a000102000000000000000000000000b32100fce620d2ce363b5741c65cf630d3fdbe3ada40b87221ed7614ac29f286552062935d0d2d20c4d92ba1b79521104c04dc23631bba349c1771b54ba1d64b3b72030a5130ce211bf5e7baf4ff6db9af531c516913d8"], 0x1}}, 0x0) 15:08:19 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080), 0x0) 15:08:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) 15:08:19 executing program 5: r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="2e0000002b00812de41ae087185082cf0124b0eba06ec400014100000000001700080000001f5ba7721b8980ee5c", 0x2e}], 0x1}, 0x0) 15:08:19 executing program 4: connect$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003a40)=[{{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000003700)=[{&(0x7f00000002c0)=""/225, 0xe1}], 0x1, &(0x7f0000003780)=""/232, 0xe8}}, {{&(0x7f0000003880)=@xdp, 0x80, &(0x7f0000000040), 0x8a, &(0x7f00000039c0)=""/111, 0x6f}}], 0x8000078, 0x2, &(0x7f0000003bc0)={0x0, r1+30000000}) 15:08:19 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 15:08:19 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x0, 0x396, 0x9, 0x1f, 0x4, 0x4, 0x6, {0x0, @in6={{0xa, 0x4e23, 0x40, @dev={0xfe, 0x80, [], 0x1c}, 0x9}}, 0x3, 0x3, 0xfffffffffffffffd, 0x7, 0x3cce}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1, 0x7f}, &(0x7f0000000180)=0x8) [ 372.002831] ================================================================== [ 372.010265] BUG: KMSAN: uninit-value in validate_nla+0x179d/0x2690 [ 372.016611] CPU: 0 PID: 12643 Comm: syz-executor5 Not tainted 5.0.0-rc1+ #7 [ 372.023753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.033133] Call Trace: [ 372.035791] dump_stack+0x173/0x1d0 [ 372.039470] kmsan_report+0x12e/0x2a0 [ 372.043323] __msan_warning+0x82/0xf0 [ 372.047166] validate_nla+0x179d/0x2690 [ 372.051169] ? do_syscall_64+0xbc/0xf0 [ 372.055092] ? __x64_sys_sendmsg+0x4a/0x70 [ 372.059354] ? do_syscall_64+0xbc/0xf0 [ 372.063365] __nla_parse+0x38a/0x7e0 [ 372.067144] nla_parse+0x119/0x130 [ 372.070835] __tipc_nl_bearer_enable+0x24e/0x1d50 [ 372.075743] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 372.081141] ? __nla_parse+0x532/0x7e0 [ 372.085118] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 372.090345] ? tipc_nl_bearer_disable+0xb0/0xb0 [ 372.095049] ? tipc_nl_bearer_disable+0xb0/0xb0 [ 372.099779] tipc_nl_compat_doit+0x756/0xaf0 [ 372.104269] tipc_nl_compat_recv+0x14d1/0x2750 [ 372.108913] ? tipc_nl_bearer_disable+0xb0/0xb0 [ 372.113605] ? tipc_nl_compat_dumpit+0x820/0x820 [ 372.118398] ? tipc_netlink_compat_stop+0x40/0x40 [ 372.123322] genl_rcv_msg+0x185f/0x1a60 [ 372.127390] netlink_rcv_skb+0x431/0x620 [ 372.131476] ? genl_unbind+0x390/0x390 [ 372.135408] genl_rcv+0x63/0x80 [ 372.138739] netlink_unicast+0xf3e/0x1020 [ 372.142948] netlink_sendmsg+0x127f/0x1300 [ 372.147253] ___sys_sendmsg+0xdb9/0x11b0 [ 372.151360] ? netlink_getsockopt+0x1460/0x1460 [ 372.156078] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 372.161312] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 372.166734] ? __fget_light+0x6e1/0x750 [ 372.170790] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 372.176033] __se_sys_sendmsg+0x305/0x460 [ 372.180254] __x64_sys_sendmsg+0x4a/0x70 [ 372.184358] do_syscall_64+0xbc/0xf0 [ 372.188198] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 372.193417] RIP: 0033:0x458099 [ 372.196640] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 372.215573] RSP: 002b:00007f2ba0be1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 372.223316] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458099 [ 372.230611] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 372.237902] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 372.245211] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2ba0be26d4 [ 372.252503] R13: 00000000004c5590 R14: 00000000004d91c0 R15: 00000000ffffffff [ 372.259824] [ 372.261471] Uninit was created at: [ 372.265016] No stack [ 372.267354] ================================================================== [ 372.274753] Disabling lock debugging due to kernel taint [ 372.280224] Kernel panic - not syncing: panic_on_warn set ... [ 372.286137] CPU: 0 PID: 12643 Comm: syz-executor5 Tainted: G B 5.0.0-rc1+ #7 [ 372.294639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 15:08:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100085) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "ebad25e7c93f6c70fa4c999adc110d357c739e1905b6ce53f21bdf7502dda57170b886dbeb1f92aedbe31bd94ce0c57ac83ee086d48601e8a7592e7a2377ccb1", "43e91a9da49bee3a2e6421008aa605b9a3971c28cfdd99844a40d3755ea5ebc9c43e325f9af703d8ac9566807d80bd401738eada5eca50ac8747b89722474a8f", "c2475585c8634fdbec7ebfe7853a86d8c6277a332634ebf307444086e33dad5e"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, "04faa0cdba85bfddbfad9e6b6c379768f183484c5bc89a9e9083652ac8d1403414eee521d2838b05a8c4590132c6a941fcf2476866993e9729e169650b868e62", "26772d35fb7d3a4d865f3cbafcccc280e24fc2ef0851234c036da51d442caff31d9604e7704fd83062d21668744fad6a75b70f48ee37b7b4f65e469b385d85c1", "108bc47114f7cdfb47841bb52821a7ba35a2f4fe64362759ada0a37e9549121e", [0x20]}) 15:08:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) [ 372.304021] Call Trace: [ 372.306647] dump_stack+0x173/0x1d0 [ 372.310322] panic+0x3d1/0xb01 [ 372.313595] kmsan_report+0x293/0x2a0 [ 372.317445] __msan_warning+0x82/0xf0 [ 372.321301] validate_nla+0x179d/0x2690 [ 372.325308] ? do_syscall_64+0xbc/0xf0 [ 372.329229] ? __x64_sys_sendmsg+0x4a/0x70 [ 372.333496] ? do_syscall_64+0xbc/0xf0 [ 372.337451] __nla_parse+0x38a/0x7e0 [ 372.341225] nla_parse+0x119/0x130 [ 372.344831] __tipc_nl_bearer_enable+0x24e/0x1d50 15:08:20 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r1, 0x9, 0x200}, 0x8) r2 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xaf4, 0x40040) r3 = getpid() r4 = fcntl$getown(r2, 0x9) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000140)={r2, r0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) sendmsg$xdp(r2, &(0x7f0000001340)={&(0x7f00000002c0)={0x2c, 0x6, r5, 0x26}, 0x10, &(0x7f0000001300)=[{&(0x7f0000000300)="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", 0x1000}], 0x1, 0x0, 0x0, 0x880}, 0x4040005) [ 372.349737] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 372.355135] ? __nla_parse+0x532/0x7e0 [ 372.359087] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 372.364303] ? tipc_nl_bearer_disable+0xb0/0xb0 [ 372.368999] ? tipc_nl_bearer_disable+0xb0/0xb0 [ 372.373697] tipc_nl_compat_doit+0x756/0xaf0 [ 372.378378] tipc_nl_compat_recv+0x14d1/0x2750 [ 372.383018] ? tipc_nl_bearer_disable+0xb0/0xb0 [ 372.387741] ? tipc_nl_compat_dumpit+0x820/0x820 [ 372.392535] ? tipc_netlink_compat_stop+0x40/0x40 [ 372.397401] genl_rcv_msg+0x185f/0x1a60 [ 372.401473] netlink_rcv_skb+0x431/0x620 [ 372.405565] ? genl_unbind+0x390/0x390 [ 372.409506] genl_rcv+0x63/0x80 [ 372.412821] netlink_unicast+0xf3e/0x1020 [ 372.417032] netlink_sendmsg+0x127f/0x1300 [ 372.421394] ___sys_sendmsg+0xdb9/0x11b0 [ 372.425498] ? netlink_getsockopt+0x1460/0x1460 [ 372.430215] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 372.435439] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 372.440830] ? __fget_light+0x6e1/0x750 [ 372.444855] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 372.450083] __se_sys_sendmsg+0x305/0x460 [ 372.454289] __x64_sys_sendmsg+0x4a/0x70 [ 372.458379] do_syscall_64+0xbc/0xf0 [ 372.462126] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 372.467343] RIP: 0033:0x458099 [ 372.470563] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 372.489490] RSP: 002b:00007f2ba0be1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 372.497218] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458099 [ 372.504513] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 372.511803] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 372.519110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2ba0be26d4 [ 372.526404] R13: 00000000004c5590 R14: 00000000004d91c0 R15: 00000000ffffffff [ 372.534892] Kernel Offset: disabled [ 372.538529] Rebooting in 86400 seconds..