at$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x42000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r3, 0x3}}, 0x10) r4 = socket$xdp(0x2c, 0x3, 0x0) mq_open(&(0x7f0000000000)='vcan0\x00', 0x40, 0x1, &(0x7f0000000040)={0x7fff, 0x0, 0x6, 0x0, 0x9, 0x6, 0x9}) bind$xdp(r4, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) 03:14:35 executing program 3: r0 = socket(0x40000000002, 0x80003, 0x4000000002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gretap0\x00', 0x44) bind$inet(r0, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) 03:14:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:35 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, 0x0) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000005403000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101000, 0x0) sendmsg$xdp(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000040)="946d0a995aa26ea84f48b72687c528f29ecbe141fc9baea07bd0861504771ea1701801a4708ca4fa2356d663ffdae400699a89b9866ff7bc9f37db9a139ad2d87a9c9d0eec9de59f0ee9435d0818a4de6d4b5ac419160c497fa685b3f4e3891c2ab1623128baa3774672b21bf4047e402fd37d7bcdcac9d3a78de5a28114b971f32c1a9dbd25170c18ac13d5ea2af874ca6d1eeb0896a27db4de7a8bfb37993ad3ba1b16c2141db2cff7e871257f4f001f9cd05a40c897f64678caca86141e7843e4c7a3", 0xc4}, {&(0x7f0000000180)="cefa8689f849822d1ade26a542beaca5f4281e817afce841055bf9d3763b409e0772c3ebdb5624c401ef7192a2ef009bd13c3566ace728959a20cda2ac9d9841cf5078538830bbc3fa6cf5", 0x4b}, {&(0x7f0000000200)="413463fd1d472a28bf5a1457102e396dbac31bd75c967aa19e6a73b39203cc985ef95b9856d2259ec64987bcf9eeac8a836ea801fc853ef4eae66e386d79e018c0da2bdbfb683450285726196badc113c08dd16d81440599cec6626e94a308fb170ec92f4a34c9f08d226604e5b96c55236c7853d843c879f7e03be7e28b4606964973729cb9425c5c46560389020fd24a44ee07a27b3d1321739f0fd8a1380c8bd9cde2e2fc0f827ed62b727c0d742db815ac6c37193f7064f6745bfaac055e0bc65c4566ee8a0566bf25f82082f90bf2c7dc8adfbc698ccbe61b67f805968f351cb1b7c60878de0ce5d69e00b4ae1eebacbf14939c47a7", 0xf8}, {&(0x7f0000000300)="a2d73952d7bb69d24281bf95b33b91b45b3d33305db8ff44a735697cfd6fdadb692053c80506e9b8c1c6308315d33957ce6db8609a3d3db84e89065465da28a48b9957e0c5c76910c6be5807a8e9af7adb4207d48386692a739222f0f9791af6f1faada95dc26008a1f397497cb770377a703813", 0x74}, {&(0x7f0000000580)="311f05ad34a3d48d8c008d9e3fdc4de00b", 0x11}, {&(0x7f00000005c0)="57624cd05ad784f178e3eb35575db6fac15b003bb4a25d4e1c25de94c4958d566f209c3e9d517109caf2af03203f95fef11301bf06fef0f8db3ef78cbd3a51d99a542ad5eaa17598692b7517df09583bd9b4feda8a92170b8b8fae6f7cba056ab7a12505b9d6820ec7aaace7eca89f372df72d", 0x73}, {&(0x7f0000000640)="6f5bf476b5e2f238df5e225bc588e17a807a23896458cb790818e15570db017ff1dc03ad276228b065643f7435d53d968e08a30e5b7caca187a8d9d528c9610fa760360f79eeb535ed7cfb7548712d46f5790797ba891a4789c36be31c702fa2ff15b7ea6747babd4baf538e720720340000", 0x72}, {&(0x7f00000006c0)="dd3865386e39e7e62b23c97d3cd1728efaaa87f22b4bfbed5c4a85ef3929c24a", 0x20}, {&(0x7f0000000700)="356c6701020000", 0x7}, {&(0x7f0000000740)="0939be161153c6ea4beab326541f4f1f61dcb3b00245da93ef3ee7fead32f47a04e10078336a745eee7e3667c3ecb85c4dffaa6fdf957d1a53923465bdcd2dbc9fff74e98a7cc29b9736fb55de139526ddd6d49d771f36427dd914c5149177ba1a53847aca", 0x65}], 0xa, 0x0, 0x0, 0x8000}, 0x4020000000) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000380)="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", 0x3a8}], 0x0) 03:14:35 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50, 0xffffffffffffffff, 0x1, {0x7, 0x1f, 0x4, 0xd39, 0x9, 0x7fff, 0x9, 0x5}}, 0x50) ioctl$CAPI_GET_FLAGS(r0, 0x80044326, &(0x7f0000000280)) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x80000, 0x0) setsockopt$inet6_dccp_int(r1, 0x21, 0x11, &(0x7f0000000100)=0x9, 0x4) 03:14:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000005503000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:35 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x100, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x10940) ioctl$VIDIOC_SUBDEV_S_CROP(r2, 0xc038563c, &(0x7f0000000100)={0x1, 0x0, {0x5, 0x77, 0xcb1a}}) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) setpriority(0x4, 0x0, 0x1d) r3 = gettid() r4 = gettid() r5 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xce6, 0x109000) r6 = syz_open_dev$sndpcmp(&(0x7f0000000740)='/dev/snd/pcmC#D#p\x00', 0x1, 0x400000) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000ac0)=0xe8) getegid() bind$packet(r5, &(0x7f0000000140)={0x11, 0x1, r7, 0x1, 0x80}, 0x14) ioctl$TIOCLINUX2(r5, 0x541c, &(0x7f0000000180)={0x2, 0x4, 0x200, 0x401, 0x66, 0x4040}) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000e80)=0xc) write$UHID_CREATE2(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="0b00000073797a020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc0001000100000071ffffff0100000007000000d0fff12c5abca0603c1451f1c4954bcf26e890a2e88aa375b6e3c404a9184fcdf97c233cbb52f6dd230fa6ae1e791d6b080fa3f231983818a801c30cc268508af8389bdfb61e0d08d47d9f628f3d41bea59f8b35cc46407684f79871b0f73c62b14cbc6a98330575a6631a18b216869941adca57a4ba5fcd96c3ba6cd457707a5c217f39499ca004ec73f85d3cdb59746e9a4ea3208828061f0a7d496299659ce88a3954219a3c71d634633604305d3ca27ed37e2cfd6558b21cada19323e2847286e375002e036aad58a385fcc8819a2bfa403a4831a6b551c8dc1a"], 0x1f4) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000080)={r5, r0, 0x3}) 03:14:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:35 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4d2, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000080)=0x2, 0x4) sched_getparam(0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400000000, 0x0) 03:14:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) [ 678.569792][T32679] IPVS: ftp: loaded support on port[0] = 21 [ 678.804515][T32662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:36 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='no/uts\x00') getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) ioprio_get$uid(0x3, r2) ioctl$FS_IOC_GETFLAGS(r1, 0xb701, 0x0) 03:14:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000000)=0x1, 0x4) open(&(0x7f0000000080)='./file0\x00', 0x200, 0x8) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0xa000, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f00000000c0)={0x400002, 0x6, 0x80200001}) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x72, 0xf, 0x5, 0x5, "e1e29d427c4c8a48e65409eddd0850ad1432f5cada701fb1f30e5573846acebd"}) getsockopt$inet_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000d12ffc)) getpeername$unix(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 03:14:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:36 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000005603000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 679.109560][T32686] IPVS: ftp: loaded support on port[0] = 21 03:14:36 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x9be5, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x21, 0x0, 0x0, 0x400000000}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x2, 0x0) mkdirat$cgroup(r2, &(0x7f0000000140)='syz0\x00', 0x1ff) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x18, &(0x7f0000000040)="25618b98a9d9c5b812cd66448b91f9ed", 0x10) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PPPIOCSFLAGS(r4, 0x40047459, &(0x7f00000000c0)=0x102000) 03:14:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000180)=0x88) add_key(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) write$FUSE_ATTR(r1, &(0x7f0000000040)={0xffffffffffffff09}, 0xfddf) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f00000001c0)) 03:14:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="fc000000190001090000000000000000e0000002000000000000000000000000fe800000000000000000000086e3ad000000aa00000000000000000a00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x4}}, 0x0) r1 = shmget$private(0x0, 0xc000, 0x78000500, &(0x7f0000ff3000/0xc000)=nil) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x9, 0x840) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@int=0x80, 0x4) shmctl$SHM_UNLOCK(r1, 0xc) 03:14:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8000, 0x0) accept$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) ioctl$TIOCSETD(r0, 0x80045440, &(0x7f0000000040)) 03:14:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:36 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000004180)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000040)=""/180) 03:14:36 executing program 5: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000440), 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000300)) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x46800, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000100)=""/155, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = open(0x0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) truncate(&(0x7f0000000040)='./file0\x00', 0x2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000000c0)={0x8, 0x24d, 0x8, 0x0, 0xd, 0x3, 0x776, 0x6, 0x4, 0x8001, 0x80000000, 0x2}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000000c0), 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000240)={{}, 0x8, 0x7fffffff, 0x538e}) ptrace$peekuser(0x3, 0x0, 0xffffffff) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)=ANY=[@ANYBLOB="05000000010000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB], 0x5}}, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r2, 0xc008551b, &(0x7f0000000080)=ANY=[@ANYBLOB="090000001800000001000061359d0000ff070000520d0000c930105a02000000"]) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 03:14:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xe2w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11+4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fallocate(r0, 0x0, 0x0, 0x10fffb) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000040)={0x3, 0x1, [0x3, 0x2, 0x8, 0x2, 0x5, 0xfffffffffffffff8, 0x26e8, 0x3de]}) write$P9_RREADLINK(r0, &(0x7f0000000000)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) socket$inet6_sctp(0xa, 0x5, 0x84) write$P9_RSYMLINK(r0, &(0x7f0000000100)={0x14}, 0x14) lseek(r0, 0x0, 0x3) 03:14:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:37 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x8000000002000, 0x0) accept$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x1c) r1 = semget$private(0x0, 0x0, 0x0) semop(r1, &(0x7f0000000080)=[{0x0, 0xa309}, {}], 0x2) semop(r1, &(0x7f0000000000)=[{0x2}, {0x0, 0xffffffff}], 0x2) semtimedop(r1, &(0x7f0000000040)=[{0x0, 0x20}], 0x1, 0x0) 03:14:37 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000005703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 680.014588][T32704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:37 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c0000001c000901000000210000000002000000e19c23de340a000008000000", @ANYRES32], 0x1c}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1ca, 0x24000) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f00000000c0)={0x74279d32, 0x6, 0xffffffffffffffc0, 0x99c2f135ce803269}) sendmmsg$alg(r0, &(0x7f0000000140), 0x112, 0x0) 03:14:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) [ 681.014644][T32743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000000)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_newaddr={0x40, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x2, 0x40000000}}, @IFA_LOCAL={0x14, 0x2, @local}]}, 0x40}}, 0x0) 03:14:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:38 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:38 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x7) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x103480, 0x100) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT=r1], 0x17) fcntl$setpipe(r1, 0x407, 0x3070) socket$alg(0x26, 0x5, 0x0) 03:14:38 executing program 0: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0xffffffffffffffff, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000040)={0x0, @reserved}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 03:14:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000005c03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:38 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0xc72f, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x3, 0xc0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0x406855c9, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0}) 03:14:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5473, &(0x7f0000000040)=0x2000005) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 03:14:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000200)="2e0000001c00810ee00f80ecdb4cb9f207c804a00d000000430003fb0a0002000e0ada1b40d805000600c50083b8", 0x2e}], 0x1}, 0x0) 03:14:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='wchan\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x3da, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{}, {}, {}]}) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f0000000000)) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) bind$alg(0xffffffffffffffff, 0x0, 0x0) 03:14:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) [ 682.360641][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:39 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000005d03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:39 executing program 3: setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) r0 = socket(0x2, 0x1, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clone(0x1000400a302, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x9c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="0000000000000000ef00000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000766c616e300000000000000000000000736974300000000000000000000000007465716c3000000000000000000000000000000000000000000000000180c20000000000000000000000b8080000b808000030090000616d6f6e670000000000000000000000000000000000000000000000000000002008000000000000140400000c000000000000000aaaaaa90000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0a4fa9aaa73e4c40000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000ab000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c770000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff00000000"]}, 0xa38) 03:14:39 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x100, 0x0) write$P9_RRENAMEAT(r1, &(0x7f00000001c0)={0x7, 0x4b, 0x2}, 0x7) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = dup(r0) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000140)={0x3, 0xb6b8}) recvfrom$packet(r3, 0x0, 0x0, 0x120, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x8, 0x0, "0a96a5aa6642605ef12e190e884004b7e193e80f596ed49150a75cafbacca323509783379464fa92491127ee98b572305ce3162253409ade0e55e96e8d7b7bcd7666ba9737889923ea567dcb762d07b8"}, 0xd8) sendmmsg(r2, &(0x7f0000000a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r4, 0x80386433, &(0x7f0000000200)=""/181) 03:14:39 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000140)={'ip6erspan0\x00', {0x2, 0x4e20, @multicast1}}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000580)="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", 0xfffffffffffffd69, 0x50, 0x0, 0xffffffef) 03:14:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000005e03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 682.586888][ T451] ebt_among: dst integrity fail: 200 [ 682.623653][ T456] ebt_among: dst integrity fail: 200 03:14:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000002b008151e00f80ecdb4cb904054865160b000100050a0000000009000e0007001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x3000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, r2, 0xa, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) 03:14:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x4, 0x3) bind$inet(r1, &(0x7f0000b9aff0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2b}}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMPNS(r1, 0x8907, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 03:14:40 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x1f) lseek(r0, 0x0, 0x0) 03:14:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) [ 683.500659][ T463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 683.512354][ T471] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. 03:14:40 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:40 executing program 5: socket$xdp(0x2c, 0x3, 0x0) socketpair(0x11, 0x0, 0x1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socket$rxrpc(0x21, 0x2, 0x20000000002) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x20}}, @in6={0xa, 0x4e23, 0x3800000, @empty, 0xfffffffffffff001}, @in6={0xa, 0x4e21, 0x6, @rand_addr="fbc33e8d3965586792ad63d1540502ba", 0x7f}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x28}}, @in6={0xa, 0x4e22, 0x8001, @empty, 0x7fffffff}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}], 0x84) r2 = shmget(0x3, 0x1000, 0x80, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000200)=""/125) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000000)='\x00', 0x1) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000001c0), 0x2) 03:14:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000005f03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000002b008151e00f80ecdb4cb904054865160b000100050a0000000009000e0007001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x3000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, r2, 0xa, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) 03:14:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000003c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:14:41 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:41 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:41 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:41 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) [ 684.771184][ T504] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. [ 684.785629][ T505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:42 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:42 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:42 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20940) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = dup2(r0, r0) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000040)={0x3f, 0x4, 0xfd, 0x5, 0x800}) r2 = socket$rxrpc(0x21, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000000c0)={r3, r4/1000+10000}, 0x10) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) r7 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x3f, 0x0) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000240)=""/83, &(0x7f00000002c0)=0x53) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x80) ioctl$TIOCSTI(r1, 0x5412, 0x9) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000300)=[@in6={0xa, 0x4e21, 0x101, @empty, 0x8}, @in6={0xa, 0x4e20, 0x80000001, @loopback, 0x3}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e24, @rand_addr=0x3}, @in6={0xa, 0x4e24, 0x4, @remote, 0x10000}, @in={0x2, 0x4e22, @multicast2}], 0x84) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000400)={&(0x7f00000003c0)=[0x7f, 0x6, 0xa, 0xf136, 0x20], 0x5, 0x2, 0xd8, 0x5, 0x7fff, 0x2, {0x48fb, 0x2, 0x8000, 0x4, 0x3f, 0x1ff, 0x4, 0x7fff, 0x9, 0x20, 0x52, 0x3f, 0x2, 0x100000000, "f9559b470c4834c7be8f05c8a76e2d8716ce3dc8d1957cbdbfd1a9d4b3cbe68f"}}) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000480)={0xab, 0x2, 0x1, 0x0, 0x0, [{r2, 0x0, 0x100000001}]}) ioctl$TIOCMGET(r1, 0x5415, &(0x7f00000004c0)) write$UHID_CREATE(r1, &(0x7f0000000580)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000500)=""/84, 0x54, 0x2, 0x10000, 0x6, 0x7, 0xfffffffffffff800}, 0x120) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000700)={0x0, 0x73, 0x1a86, [], &(0x7f00000006c0)=0x4}) clock_getres(0x7, &(0x7f0000000740)) write$binfmt_aout(r5, &(0x7f0000000780)={{0x10b, 0x3, 0x2, 0xb8, 0x20f, 0x2, 0x3c2, 0x7}, "9480e5f716d3d1aad4741571b47abd46e7f6b3dae544475d7e58a13c5ba6a4242504c56d0e61eba8ca902dedcf2673e88f8d24149df7dba6135b7dea67964261eec37e93e3e7951cf8f0f63148938faf3accb45550bdec5d497fb639af2578ecba25f1d8b32da8fd3ad2020c28b5300a27eb5dab4999b921e8d38e9a85699df5c7729da05b97f297b444a81e365c6e8b57a6bb6f651088237f2a50f75191acfbf3f7d16d113a30055035e0a142ccd264467904a0a89e68ef52471f3fd6a491e653f4dc725cd9686906917c75b81ccf10c6", [[], []]}, 0x2f1) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000a80)={'bcsh0\x00', 0x2}) pselect6(0x40, &(0x7f0000000ac0)={0x3, 0x6baa, 0x6, 0x7fff, 0x7, 0xfffffffffffffff9, 0x9, 0x7}, &(0x7f0000000b00)={0x2, 0x6, 0x9, 0x77, 0x1ff, 0x80000001, 0x7, 0x1ff}, &(0x7f0000000b40)={0x9, 0x7, 0xffffffff, 0x5, 0x8, 0xfffffffffffff148, 0x4e2c}, &(0x7f0000000b80)={0x77359400}, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x3f0f8ce5}, 0x8}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000c40)={r6}) write$uinput_user_dev(r7, &(0x7f0000000c80)={'syz0\x00', {0x8, 0x80, 0x80000001, 0x6}, 0x36, [0x9, 0x4, 0x685, 0x6, 0x40, 0x8, 0x2, 0xffff, 0x1, 0xfffffffffffffffd, 0x1, 0x752f8422, 0x8, 0x9, 0x9, 0x18000000000000, 0x0, 0x7, 0x7, 0x5, 0x8001, 0x81, 0x3, 0x0, 0x100, 0x4982, 0x8, 0x7fffffff, 0x0, 0x1, 0x6, 0x337, 0x10000, 0x654, 0x101, 0x200, 0x3ff, 0x3, 0x8, 0x9, 0x0, 0x6141e7f5, 0x100000000, 0x100, 0x8, 0x9, 0x80000000, 0x57f9, 0x486, 0x2, 0x8, 0x8, 0x5, 0x1, 0x7, 0xa7f, 0x8, 0x800, 0x350000000000, 0xfff, 0x401, 0x4, 0x9, 0x7ff], [0xffffffff, 0x8000, 0x9, 0x1832000000, 0xffff, 0x1d9, 0x49b8, 0x9, 0x1, 0x3fc000, 0x45f, 0x7, 0x3ff, 0x7, 0x6, 0xfff, 0x7, 0x7ff, 0x3, 0x4, 0x8, 0x3, 0x3, 0x506, 0x8, 0x8, 0x5, 0x36, 0x572, 0x0, 0x80000000, 0x81, 0xc000, 0x100, 0x400, 0x401, 0x8, 0x2, 0x21, 0x74e, 0x7fff, 0x3f, 0x7, 0x1, 0xfffffffffffffe01, 0xfe85, 0x1, 0x9, 0x5, 0x3, 0x6, 0x38000000000, 0x100, 0x4, 0x7, 0x7f, 0xfd, 0x10000, 0xafc5, 0xb50, 0x0, 0x6a2, 0x3f], [0x7, 0x7, 0xb100000000000000, 0x2, 0x8, 0x2, 0x81, 0x0, 0x3, 0x0, 0x3f, 0x100000000, 0x0, 0x9, 0x5, 0x9, 0x4, 0x7, 0x0, 0x2, 0x6, 0x9, 0x401, 0x1, 0x2, 0x1f, 0x7fffffff, 0xffffffff00000001, 0xffffffff, 0x800, 0x81, 0xfffffffffffffffe, 0x5, 0x7, 0x6a, 0x3f, 0x101, 0x2, 0x8, 0x8, 0x6d, 0xa6d5, 0x100000001, 0xe35, 0x3, 0x3, 0x5, 0x3, 0x100000001, 0x4, 0x8e, 0x8001, 0x9, 0x101, 0x4800, 0x4, 0x861e, 0x80000000, 0x0, 0x2, 0x4, 0x0, 0x1ff], [0x2, 0x0, 0x5, 0xffffffffffffffc1, 0x843, 0x9, 0x6, 0x81, 0xfffffffffffffffe, 0x6, 0x5, 0x4, 0x0, 0x7ff, 0x1000, 0x5, 0x0, 0x7, 0x6, 0x0, 0x1ff, 0x0, 0x8001, 0x2159, 0x1, 0x4, 0x2, 0x3ff, 0xbcf, 0x1000, 0xb8, 0x3d41, 0x8, 0x400, 0x31, 0x0, 0x5, 0x4, 0x400, 0x100000000, 0x0, 0x84c, 0xfffffffffffffe01, 0xfffffffffffffff7, 0x10001, 0xe63, 0xffffffff, 0xfffffffffffffffe, 0xecf, 0x9, 0x9, 0x2, 0x800, 0x3, 0x6fb9, 0x6, 0xfff, 0x2, 0x5, 0x4, 0x81, 0x100, 0x7fff]}, 0x45c) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000001100), &(0x7f0000001140)=0x8) setsockopt$RDS_CANCEL_SENT_TO(r7, 0x114, 0x1, &(0x7f0000001180)={0x2, 0x4e21, @multicast1}, 0x10) ioctl$FICLONE(r0, 0x40049409, r6) 03:14:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000002b008151e00f80ecdb4cb904054865160b000100050a0000000009000e0007001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x3000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, r2, 0xa, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) 03:14:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006103000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:42 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006203000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:42 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:42 executing program 0: r0 = eventfd2(0x7fffffff, 0x80001) read$eventfd(r0, &(0x7f0000000100), 0x44b000) 03:14:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) [ 685.885786][ T552] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. [ 685.905326][ T555] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:43 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000080)={0x7f, 0x2, [0x48a], [0xc1]}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="af0000003a884aee791ce24e6b0a97e8cfc42ac9681db905c8e64f0593d4e38a8ebfee231fd001d962faacd891c51b59b5c4e0758ca36a0f2a535b93fe82239c834ac250fcb0ec281630374fae73bb912a2070d1df230baceedba376c8775471cd95b92935deffdc496e3e430bc5185732e0cdef2a51846d00e284c43b3ac05202e0d8da48d6631238537e6b8f01b26beaeea9c5d30ca7b5a3c7b65ef03d02d1370e78b47d5b22f1c4b892872a051341abdb3de09ccc322b8a098e44142f71"], &(0x7f0000000000)=0xb7) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x8, 0x8000, 0x67c, 0x8, r3}, &(0x7f0000000200)=0x10) 03:14:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:43 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000002b008151e00f80ecdb4cb904054865160b000100050a0000000009000e0007001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x3000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, r2, 0xa, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) 03:14:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006303000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) [ 686.124914][ T586] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. 03:14:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006403000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='.\x00', 0xfc, 0x10) sync_file_range(r0, 0x5, 0x3f, 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000040)={0x2, 0x2, {0x1, 0x0, 0x1, 0x0, 0x80000001}}) 03:14:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x20211, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x4, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x4c, 0x0, &(0x7f0000000580)=[@reply_sg={0x40086303, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 03:14:43 executing program 5: capset(0x0, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) [ 686.622782][ T614] debugfs: File '610' in directory 'proc' already present! [ 686.689612][ T614] binder: 610:614 unknown command 0 [ 686.705084][ T614] binder: 610:614 ioctl c0306201 20000440 returned -22 [ 686.974521][ T591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:44 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:44 executing program 5: capset(0x0, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:44 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000140)=@ethtool_perm_addr}) 03:14:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006503000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:44 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000380)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000000000000000000000000000000000000000000000000000000048000000000000001800000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB="852a62730000000000e59800000000000000000000000000852a6273bd05b6da6b4ea236c61e013fe4b3fa4952ec46acd562c2cfa013bef9d079c892"], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="000000000000000018"]], 0xfffffffffffffdc5, 0x0, 0x0}) 03:14:44 executing program 5: capset(0x0, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:44 executing program 3: sched_setscheduler(0x0, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000900)=ANY=[], 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) shmctl$IPC_STAT(0x0, 0x2, 0x0) io_submit(r2, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) [ 687.217424][ T623] debugfs: File '621' in directory 'proc' already present! [ 687.255870][ T623] binder: 621:623 ioctl c0306201 20000440 returned -14 03:14:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006603000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:44 executing program 5: capset(&(0x7f0000000040), &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) [ 687.313665][ T623] debugfs: File '621' in directory 'proc' already present! [ 687.350041][ T634] binder: 621:634 ioctl c0306201 20000440 returned -14 03:14:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = gettid() ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000040)=r1) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f000000d379)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000140001030000f906000000000100005d3ca1efa3a6b7bea584b79540b8845a34e9c42948f44100f0c560c03dcf5fcb000000000000000000adb1e7ba73b83df11f1276e7ff351e4cb05722a902"], 0x1}}, 0x80) 03:14:44 executing program 5: capset(&(0x7f0000000040), &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) [ 687.965856][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:45 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:45 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4000) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040)={0x2, 0x8}, 0x2) r1 = socket(0x10, 0x803, 0x774) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d00010000000000000000000000000081c467dd6087441847c0c2f7e5a33f2a85ec04", @ANYRES32=0x0, @ANYBLOB="b0501e1583bd202350570d701fe479b4a718bccb0cbdc50b24"], 0x3}}, 0x0) 03:14:45 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000000200)={@multicast1, @remote}, &(0x7f0000000240)=0xc) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x101002, 0x0) fsmount(r1, 0x1, 0x76) dup(r1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000007c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="011a000067ff001d9f8f7c96c1e9dd13", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00ffffffe8000000568b65d900000001ea068c2d87159cec"], 0x200005b8}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x8200, 0x0) shmget$private(0x0, 0x1000, 0x40, &(0x7f0000ffc000/0x1000)=nil) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0xa881, 0x0) bind$rds(r1, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) 03:14:45 executing program 5: capset(&(0x7f0000000040), &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:45 executing program 5: capset(&(0x7f0000000040)={0x19980330}, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:45 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={0x0, 0xfffffffffffff6d1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x4000000000, 0x4, 0x5, 0x7}, &(0x7f00000001c0)=0x98) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:14:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006903000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:45 executing program 5: capset(&(0x7f0000000040)={0x19980330}, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:45 executing program 5: capset(&(0x7f0000000040)={0x19980330}, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) [ 689.044563][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:46 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0x0, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:46 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x17f) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000140)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x55, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f00000000c0)=ANY=[@ANYRES32=r1]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x608, 0x0, 0x0, 0x0, 0x4cc]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:14:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006a03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:46 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:46 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = dup2(r0, r0) accept4$packet(r1, 0x0, 0x0, 0x0) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000000)={0x1, 0x3d, "8f7f647aaeeac81a001f50c13d7dff2833677b78544c67739a63d2fd5d6cde384726b51127b566e63029e095296f1a66080547125b49b3980038901ff5"}) 03:14:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000000"], 0x14}}, 0x0) [ 689.635299][ T700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:46 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0x0, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:47 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006b03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:47 executing program 3: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000040)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000100)=""/180) 03:14:47 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) 03:14:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0f0000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:47 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) [ 690.043943][ T727] binder: 725:727 ioctl c018620c 20000040 returned -22 [ 690.080313][ T731] binder: 725:731 ioctl c018620c 20000040 returned -22 03:14:47 executing program 0: mlock(&(0x7f0000001000/0x2000)=nil, 0x800000) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x1, 0x4000) 03:14:47 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) socket$inet(0x2, 0x5, 0xfffffffffffffffc) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) 03:14:47 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) 03:14:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:47 executing program 5 (fault-call:2 fault-nth:0): capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) [ 690.695695][ T722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:48 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0x0, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00e00000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:48 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000013c0)='TIPC\x00') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x5d2, 0x4) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000001300)=0xfffffffffffffff7, 0x4) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x202, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000001400)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000001280)=0x1008) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 03:14:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) sendmmsg(r1, &(0x7f0000000980)=[{{&(0x7f0000000000)=@rc={0x1f, {0x200, 0x8, 0x3, 0x5b, 0x0, 0x8000}, 0x4}, 0x80, &(0x7f0000000680)=[{&(0x7f00000000c0)="9a0aa570577599aa9a5cbbccb09bed86bbf8aded184b6b0ea9b3a7670578daae3f66148791262f55fca2b36022e58e8c44a0868459888d938002cd37806a07818694fbaf817b9bd452c19cb5f31cb65b1a118b0becff481f330bb5ce19a44d4c094cd4133e1b58bac8f2c8ba9f2e118dc8275feeea6025820a549776ad4c", 0x7e}, {&(0x7f0000000140)="24bed101e7b7c3c37c60d13bbe216ebdf1ef9cc1ee39cb32", 0x18}, {&(0x7f0000000180)="23d7923b2fca863d7bba3cb5136e03fa48282c668bef4b49e7fb448551ceaafae51b35a9a6611881ba922b33d6768acbc274ed64cd50b44030f7c9e3b5e1a696e94c15a9d4c51104f481c89512bfa1a75acee5f6a9a728004c34dfc38585a46184fe30b9f5d67c1513f3d70ab4e4b6eb5c742850417741b8d4a10b81e729dc20", 0x80}, {&(0x7f0000000200)="b5a1bb17fdae55c86b36dd1b23e059c54121dac9e784ee930e8d44c868714a9af57274c9661a82f8a7fa8908154adcb4bb1986cd8ccf766edf680c34e4f48ee39bc9907e9b4ee87a071640bf4a1e5a3553df0e1992653390b654e154eb5145cf72e9c794e4a468722a8bb8873772950865a61292789539a48a8d3f072632ff169797be0a65", 0x85}, {&(0x7f00000002c0)="abf6c0aad3cbd88c2b6b832b60dea2cc6428104825e8c85101aae517355dddc68f928ece0b8b32a64a0e02f1f8d1e659a40f3fc022b1dab01d55f87497fe489d8b30d626e7be71d9d67cd78a26a93c71b07767a712e0340d6b867ffef5b3813192f56fb7dd16e837e98f5cbe86fe2aa43a2cd1599c", 0x75}, {&(0x7f0000000340)="d707a8aa6c2f085293daf1f55c5a3a0932aa30bbffa275a781ba077495b229c5e346fa8d337c7ec9fd3ac9e3ceb227db00ac7761db747a3855a00ba790197d5b4ec6bff725016820083b24d8e480e1159f93767d96e7b9f623babea7c4c2f80874b9f496aab895888d58084177d0dfd113136f4ced6c32fbf32d59ef07a17a168efaa1c214f3310ef64b2af5fa43e95b31a923caf6657e2da9b6ab8ec478182495784096697b375c9557f1cae753f95519280ad30295825fd0e42a047c588e10be6eccd4f2df88a91d206f10fc", 0xcd}, {&(0x7f0000000440)="6d0f459536853813d0aa6a574abf50ac08a1031506e0e6f2851f7a62ef3b0c9b985ad2c9e6f1f8078361a06a9df84b91dd4aa7de7918295e7ab1b69d1b10d2399b28bce9db64f9eb07", 0x49}, {&(0x7f00000004c0)="dfa970e3def8bb35b0806b0bb9405caecf64981f6f8b6efad9685c424f83df2b67cde2e0d0d7288c74cf4b84ec3a57f7040442ce9cc50778ccc70dea0732174520440597b65aaa742cecaf252d01d5e1871e873a2a4e83dc1b984ca316d12071b3c16ad44487dcd6666f64daf67c356e3ae356353015c72e918a61107702800fea89278424c128", 0x87}, {&(0x7f0000000580)="df8644e976f5ad1eae6b03a491d2fc9d0cedb176acdc1b2c226c3ee0bcee786a07adeb886b61771160f4b6d10144692c8313375c279642fbf86be12c19aacb44fbe40990553e22224b7c188bcc63f3a8ac4b1b95679f4ab88c0d467d720726c3b7879a112fabf5cf9e95a0e03ca0af5f71cd6dba71d94ff6c0f08e949d53e82301851cde9b694650824660b583e1dfecf21b8221e76e8f037104a6ef8963ae5b99ef37be3bbc414f04cb702c95ae8a9f7385b0be93f4dcd8d21ad6457074a7d419a1c4f928749f5a4d3841e716aa16a19431e034766b94b1e46a8025dcb6", 0xde}], 0x9, &(0x7f0000000740)=[{0x100, 0x10e, 0xc4e, "b84ae1a7ba7a0124c688b83fa4fbf00ced30f9ab6a4c9bdb658fcb9fc7179a3fbfa6d2d5034002913bb8a6272225f83a3c8b91269a45b9b823acfbfe3580ae2daa5baa66fadb44787203f127efee589316389a3a7a5f625222da2c56291405f60f0f4a71a49ab51f19b73b47e1f4582236df2a0441a20c604ff3440da5365051749ca922876bc416ab0484e05d046cb42e7f38098eeedcca6dba223f2e00d329d3d92036d2308635e62996fd8ae863cb89c1c6df783afc84d7aa9b9f095f78b87054a6631c50d728d8b58ce1e115180b0ec6b4fdee37665caf04af116e43922e4bd8a1c02016468007"}, {0x40, 0x102, 0x6, "81ac4e713ce345cf2cd054f5ee1fb61eb5dbb2cdbc0b1cbc05bc6e42a9485d87956594f4d2f928cbca86"}, {0x78, 0x113, 0x7, "e0fba994635621c20f6bab56f7030416e3195a40e05271a8d455d5d7343c6b662b6be517d042bd5d849419c0845c7710b2b35659265804b68725a19aabb17ddf713cab02b07aeb3cc40eeeefd0b68e11abcd3865a74b85862b1ed4ec17b5b84ee87b7c15"}, {0x68, 0x10e, 0x2, "0d10d6268dbc6478972f06b11d5b034b41eb16730d68b28d205b197ef517d5043f6385c5580875131516b5c7be316e11fa0da29bcf8f36a9e587d180df330c2efd2d7f831ea8542281c151b8ba6e38826aa9a83faba5"}], 0x220}}], 0x1, 0x80) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) 03:14:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006c03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:48 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x6, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e03f03000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006d03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:48 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r3 = dup3(r0, r1, 0x80000) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, &(0x7f0000000000)=0x5, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) 03:14:48 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x600, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="ffff07000301a351014215000000000000000000"], 0x14}}, 0x0) [ 691.693631][ T765] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:49 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x0, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:49 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x1000000, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="540100200301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:49 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000001c0)=0xc9, 0x4) listen(r0, 0xfc0004) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x24}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e24, 0x1693a72b, @dev={0xfe, 0x80, [], 0x19}, 0x10001}}, 0x200, 0x4}, &(0x7f0000000180)=0x90) recvmmsg(r1, &(0x7f0000004900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x3b9ac9ff, 0x0) 03:14:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006e03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:49 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in6=@local, @in6=@remote}}}, [@mark={0xc}]}, 0xcc}}, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x400000, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x2}) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x1, 0x0, "3eaa61774e5f2def3721121d20554e46828351fea615ce46007aff5e9bd73a6b96fe224811a3b71e4c05f74d594500084ac9c8152bfb6be1c4f211b81f4c6373cdb9d45793d9b057fb865d6f70729577"}, 0xc1) 03:14:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="00f0ff7f0301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:49 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x6000000, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:49 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000001100)=0x917, 0xfffffeed) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) 03:14:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006f03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140200000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x2f3ecd}], 0x1, 0x0) [ 692.663586][ T812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:50 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x0, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:50 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x100000000000000, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140300000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007103000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:50 executing program 3: pipe(0xfffffffffffffffd) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x111200, 0x0) getpeername$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f0000000080)=0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='numa_maps\x00') mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x5, 0xffffffff, 0x100000001}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r2, 0x2, 0x5, [0x80000000, 0x100, 0xffffffffffffffff, 0x4, 0x8]}, &(0x7f0000000180)=0x12) sendfile(0xffffffffffffffff, r1, 0x0, 0xffff) 03:14:50 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x600000000000000, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007203000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140400000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x30, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xfffffffffffffe00, 0x0, 0x1, 0x9}}}}, 0x30}}, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000040)={[{0x100, 0x2, 0x9, 0x7ff, 0x1, 0x100000000, 0x80000001, 0x8, 0x1000, 0x1, 0x81, 0x0, 0x8}, {0x5, 0x2e0, 0xfffffffffffffffb, 0x7fffffff, 0x37f, 0x6, 0x6, 0xfffffffffffffff8, 0x2, 0x40, 0x3, 0x101, 0x6}, {0x1, 0x80000001, 0x9, 0x0, 0x77, 0xfffffffffffffffe, 0x1f, 0x8, 0x3ff, 0x2, 0x1, 0x4, 0x3}], 0x8a}) 03:14:50 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x1}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000180)={r2, 0x35}, 0x8) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x480000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f00000000c0)=0x4, 0x8) ioctl$KVM_KVMCLOCK_CTRL(r3, 0xaead) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080)=@gcm_128={{0x303}, "02ffa25b2e55ee95", "8b2497a7c2d8c7f6279c39a7a354b3f9", "988fe438", "dc57ac47bd088e7e"}, 0x28) 03:14:50 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x2, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:50 executing program 3: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000001a40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x1, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfffffffffffffff7, 0x64a003) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000040)=0x401) [ 693.524166][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:50 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x0, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:50 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, 0x0, &(0x7f00000000c0)) 03:14:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140a00000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3f, 0x260400) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f00000000c0)=""/12) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@loopback, @in=@empty}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) recvfrom(r2, &(0x7f0000000240)=""/4096, 0x1000, 0x20, 0x0, 0x0) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) dup3(r0, r3, 0x0) 03:14:50 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x3, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007303000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007403000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:50 executing program 3: io_setup(0xd8a, &(0x7f0000000240)=0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x4000, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x4002, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=0xffffffffffffffff, 0x4) r4 = syz_open_dev$admmidi(&(0x7f0000000580)='/dev/admmidi#\x00', 0x2, 0x301240) r5 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000600), 0x10, 0x80800) r6 = socket$isdn(0x22, 0x3, 0x22) r7 = syz_open_dev$dmmidi(&(0x7f0000000840)='/dev/dmmidi#\x00', 0x80, 0x10000) r8 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/attr/exec\x00', 0x2, 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000a80)='net/ip6_flowlabel\x00') io_submit(r0, 0x5, &(0x7f0000000b00)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x4, r1, &(0x7f00000003c0)="ff717e44a18d62094e00e56103c02700b61d71720f063102848ac745c0a5b4c52d0c9b9f358db59ffb27e4039976cfd219a6fafbe591a4b134", 0x39, 0x74ae4421, 0x0, 0x2, r2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0xffffffffffff1412, r3, &(0x7f0000000540)="7e417f875242bc269827c72ddc02abec09ae661cbd92e16022fab6dc52622067c3", 0x21, 0xffffffff, 0x0, 0x1, r4}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0xf, 0x1, r5, &(0x7f0000000640)="c83f29a95ce3c597e972749483145fd84cb5e32bf8f7eb84ab5211629a77fa1223b492cb46d64d7e064a7c87ad59606ef2b08757902d3bf1cccce03098a5710f47d588aa75db9c9c780f731c3ceb04c34ccbb230455c58f9307a1e6db1b157d6604c8936475645a17db60908a595d9c19a6e0be3cd740933faf6d4f1b37e361f4e112fb0d8de43b234ec895c034a98dffa4c97807bb03db9caaf6ce49defba5a253ce97a279594c4ee211841764a7598fd23b739a77ffb408ddeae", 0xbb, 0x8000, 0x0, 0x2}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x6, 0x100000000, r6, &(0x7f0000000740)="298039809e0c83cbab95d883cf23eaa1c58b271c04a27c543e2b536461887ae5cec3bc7b3cf104870455201d2d06557864576468ec326ffe32c3f781595cf3973c1589eccd44cce4611e67a071e2e47c45bc35fe99753e13a8cf2b82e59c8ba60a7765c40f0e3c6c2a6ed77ff9ab9cca0c606006dbc4090e0351cccb16b7189d1383de440766db45e6680b687627cc69c152a6a30676b3c5725ff85ba4e2497948fa5bdea112a8352379e2c23aa46a4ad8cc32ef6ef3d3857090e9d750c1f7d67a", 0xc1, 0x7, 0x0, 0x0, r7}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x7, 0xffffffffffff8001, r8, &(0x7f00000009c0)="77edc4fb92d9fc8339854fe789e72767ff559dda8589a1b5e6caf0606b43211ca025bba3395c065d3ec9be9b8d7bd7dedda1c1a40332b760349162ff298d3297983d1d531cbf71de60f7ed2279ddcb5bcaa0b52a2b4691b93545daab2dc600f554bc4d93c22f8cb3a61eb306704b7b7172a3feb5c85b30e56b8674c9d16af2b7d66b149849f42e521bd92bfe294a47674f3ef8dace2a1b29f485f71ee56d2b5563ba320cc8a77a67fb15f420ec116424d1e120b7", 0xb4, 0x0, 0x0, 0x3, r9}]) r10 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r9, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r11, 0x614, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffffffffffffff81}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x8004}, 0x4c845) ioctl$SCSI_IOCTL_GET_IDLUN(r10, 0x5382, &(0x7f0000000100)) r12 = syz_open_procfs(0x0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r12, 0x84, 0xb, &(0x7f0000000100)={0x9, 0x3, 0x401, 0x1, 0x0, 0x7fffffff, 0x5125, 0x2, 0x5963, 0x2, 0x7}, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r13, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000000140)=0x0) syz_open_procfs$namespace(r14, &(0x7f0000000180)='ns/pid_for_children\x00') ioctl$sock_inet_SIOCSIFFLAGS(r13, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) keyctl$search(0xa, 0x0, &(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz'}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x202002, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e21, @local}}, 0x0, 0xd6f, 0x8001, 0x73d, 0x20}, &(0x7f0000000100)=0x98) [ 693.666806][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:14:51 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x4, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140e00000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:51 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc0045520, &(0x7f0000000580)={0x7fffffff, 0x7, 0x401, 0x0, 0x0, [], [], [], 0xffffffffffffcbda, 0x2}) 03:14:51 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x6, 0x0, &(0x7f00000002c0)=0xfd80) [ 694.334721][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:51 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="146000000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:51 executing program 0: r0 = fspick(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f00000002c0)={0x1, 0x6ca, 0x1000, 0xa5, &(0x7f0000000080)="2dac411dc60e1a709d74f4e4fb2c325baba0ce94cc4ada5a90cf8b00b6e91f35513ed3815d357cf7d3cbd423601ca147975aea251fcbce1d598a8a3637235eee176c285ca2cb3d551f8ea89d879b327f6d283f61e31790213ba2ac85fc1365603143955e75c61cd383bf90c1213b4841dcb825eac841667fe8f15a224ea953490b58fede15e27979b5b43cf7e029b32fe4b29fa29bb6f7a3a7fcaa6150c6d880ab6eb493f1", 0x34, 0x0, &(0x7f0000000140)="c555349b82ff8af0dca869d5294fa4d1a1e507623ae9cc7898fa761ea2bc49d2345abcdbe684c96873dcfb03d53e8466f9076525"}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x3e, 0x0) write$nbd(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="06000000000000000000000007000000a3ef01749fa55f62d29cbab35a2fdbede5fbb11b0300000000000000fcd7f42f63af872a0a11e32f7a0e9402000000000000000400185947306a84c6c5e7bd78ab9406f5f621ad8515d024cacb80e345ba567c5c3dedfa50724cb345e43fbcaf0bb04b97431500040000000004a3792ee47afaab3700510b8ff3b881ccd356182c621df9b91d933f902cfe9d2fd139044c0933a33d34496f89a27fd4ba625fe85bd6270faf95aa4d3d7603504eaf9f6314bbd044b518e9c8d6bdd2fd7f0cc6277904fc7b84254f4d1ecf642b21ee253ce5f12555c84f1d2153357092454eb6b84d3adff497f1329ac542010000005cd6096baae8e781b5d782aad193406b6896aca602afcf9c578311fb0ad295af"], 0x68) 03:14:51 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x7, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007503000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 694.503927][ T911] dlm: no locking on control device 03:14:51 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x8, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14f000000301a351014215000000000000000000"], 0x14}}, 0x0) [ 694.805254][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:52 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000100)=""/243) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4000) write$P9_RFLUSH(r2, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7) ioctl(r0, 0xff7fffffffffffb9, 0x0) 03:14:52 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) pipe2(0x0, 0x84800) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) syz_open_dev$video(0x0, 0x6c, 0x2000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x2c, r1, 0x120, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x880}, 0x20040015) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, 0x0, &(0x7f0000000080)) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\x00\x00\'v\x01\x03\xf2\x00', @ifru_flags}) 03:14:52 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x9, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140003000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000a000301a351014215000000000000000000"], 0x14}}, 0x0) [ 695.374651][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:52 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:52 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0xa, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) write$P9_RFLUSH(r1, &(0x7f0000000040)={0x7, 0x6d, 0x2}, 0x7) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) 03:14:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14ed0a000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007603000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000e000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:52 executing program 0: socket$packet(0x11, 0x3, 0x300) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) mkdir(0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x20000, 0x0) socket$l2tp(0x18, 0x1, 0x1) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) ioctl$TCXONC(r1, 0x540a, 0x6) r2 = socket$inet6(0x10, 0x400000000000003, 0x0) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002000)}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$l2tp(0x18, 0x1, 0x1) r3 = socket$l2tp(0x18, 0x1, 0x1) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x0, 0x4) flock(r3, 0x2) 03:14:52 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0xb, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:52 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0xc, 0x0, &(0x7f00000002c0)=0xfd80) [ 695.712981][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 695.718836][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:14:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14c00e000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="39000000130009006900000000000000ab008048020000004600010714190010c005000000000003f5000000000000ef38bf461e59d7", 0x36}], 0x1) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0), 0x2) [ 695.903008][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 695.908836][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:14:53 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) [ 696.245668][ T1074] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:53 executing program 0: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}}, 0x0, 0x0, r0, 0x0) socket$kcm(0xa, 0x2, 0x73) io_setup(0x8e8, &(0x7f0000000000)) 03:14:53 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0xd, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14003f000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfffffffffffffbff, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x3d0) 03:14:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007903000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:53 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0xe, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:53 executing program 3: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140040000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007a03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:53 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0xf, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 697.037530][ T1115] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:54 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140060000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:54 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x12, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000200)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240), 0x10) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0x17, r1, 0x0, 0x0) [ 697.163059][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 697.168878][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:14:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140ec0000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:54 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x13, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:54 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0x1, @rand_addr=0x80, 0x4e20, 0x2, 'dh\x00', 0x5, 0x4, 0x2e}, 0x2c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r1, r2) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f00000001c0)) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x380, 0x0, 0x0, 0x221) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66b8ea000f00d8eadd5484f88a00f0833600660f71d50066ba4100edb8010000000f01d90f0866b8bd008ee0b94d0200000f32360f07", 0x36}], 0xaaaaaaaaaaaabce, 0x5, 0x0, 0x0) write$FUSE_OPEN(r3, &(0x7f0000000100)={0x20, 0x0, 0x6, {0x0, 0x1c}}, 0x20) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000140)=0x5, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000000)={0x2, 0x70, 0x5, 0x36, 0x800, 0x0, 0x0, 0x6, 0x800, 0x3, 0x9, 0x2, 0x100, 0x2, 0x7, 0x101, 0x0, 0x80000001, 0x0, 0x6, 0xe8c, 0x1, 0x6, 0x1, 0x0, 0x200, 0x5, 0x8, 0x7, 0x40, 0x5, 0x1, 0x4, 0x9, 0x6, 0x101, 0x2, 0x7, 0x0, 0x1d3100000, 0x5, @perf_config_ext={0x3, 0x8}, 0x10000, 0x8, 0x100000000, 0x0, 0xfffffffffffffffb, 0x7, 0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_SET_TSC_KHZ(r3, 0xaea2, 0x401) [ 697.382877][ T1151] IPVS: set_ctl: invalid protocol: 1 0.0.0.128:20000 [ 697.595950][ T1124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:54 executing program 3: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:54 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x14, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140aed000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007b03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400f0000301a351014215000000000000000000"], 0x14}}, 0x0) [ 698.159144][ T1151] IPVS: set_ctl: invalid protocol: 1 0.0.0.128:20000 03:14:55 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x15, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:55 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000801a351014215000000000000000000"], 0x14}}, 0x0) 03:14:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x10000, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x0, @empty}}, 0x0, 0x4, 0x0, "0a3f5398a8b66ee170ad160d9341bf768a749a9ccd388eae1128fd6df3aa85a05ca0a75dd2b485183c08094952fcd5104f23c8f05bc61780bfc5ed6379f61ab6fb1cfed2526b503676106ea16ff563a8"}, 0xd8) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000180)=0xfff, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='vcan0\x00', 0x10f) sendto$inet(r1, &(0x7f0000000080)="19", 0x1, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000240)="d5", 0x1, 0x420ffe0, 0x0, 0x0) [ 698.238918][ T1143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007c03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000004001a351014215000000000000000000"], 0x14}}, 0x0) 03:14:55 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x16, 0x0, &(0x7f00000002c0)=0xfd80) [ 698.453764][ T1186] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:14:56 executing program 3: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140002000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:56 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x17, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:56 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x18, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140003000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:56 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x19, 0x0, &(0x7f00000002c0)=0xfd80) [ 699.294494][ T1194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 699.314320][ T1205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:56 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140004000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:56 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x21, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x10000, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x0, @empty}}, 0x0, 0x4, 0x0, "0a3f5398a8b66ee170ad160d9341bf768a749a9ccd388eae1128fd6df3aa85a05ca0a75dd2b485183c08094952fcd5104f23c8f05bc61780bfc5ed6379f61ab6fb1cfed2526b503676106ea16ff563a8"}, 0xd8) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000180)=0xfff, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='vcan0\x00', 0x10f) sendto$inet(r1, &(0x7f0000000080)="19", 0x1, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000240)="d5", 0x1, 0x420ffe0, 0x0, 0x0) 03:14:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007d03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:56 executing program 3: mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x2000a000, 0x0, &(0x7f000000a000/0x1000)=nil) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x100) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x9, 0x4) setxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3) 03:14:56 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x22, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000a000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007e03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:56 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f00000000c0)="2d25225339041a09b8a138cd2a35d7ef", 0x10) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x80010, r3, 0x0) getegid() shutdown(r0, 0x0) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r0) 03:14:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x42, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x20, 0x42100) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f00000001c0)={0x3, &(0x7f0000000180)=[{}, {}, {}]}) futex(&(0x7f000000cffc), 0xa, 0x2, 0x0, 0x0, 0x10000000001) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x761000, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xb415, 0x800) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000080)=0x80000000) 03:14:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000e000301a351014215000000000000000000"], 0x14}}, 0x0) [ 700.206040][ T1239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:57 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:57 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140060000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007f03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:57 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x101000, 0x0) open_by_handle_at(r0, &(0x7f00000000c0)={0xef, 0x4, "2d624385fd0f1717e689c64ccf4fb587da0e48c7a3534b6f38749172bec84d63a0087e9ff36e673fb841234e9d82b505517926a1671ca21c2d266a4fab3668f79ff7da34df9e231ed2e237c7bebf3f3db047ba7165152eec6976e196ccbc527e4351493864a5de02c285fe6c51ede5414089249fa06bae396c0b697988ee2bd0df786e536e0a50f266bafbe3ec10e8d709ba383bb9c6a7c503099ec1c3a027c776832363b1df8ff314e11616f2922ceb76d313bdabd4afb28ab44e82628fb013b3a8a1418c2c245cb25f9993750ecd9ca1e00015f6243f5885392065bc175fd7b18f1d98ad132b"}, 0x2) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x44080, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000040)=0x7fff) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000900)={&(0x7f0000000880)=""/88, 0x0, 0x1000}, 0x18) 03:14:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400f0000301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:57 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x30, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa3000000000000c003000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:57 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, {0x7, @broadcast}, 0x54, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1e}}, 'dummy0\x00'}) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) 03:14:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000030301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="06000000000000000000000002000000a3ef01749fa55f62d29cbab35a2fdbede5fbb11b0300000000000000fcd7f42f63af872a0a11e32f7a0e94bb02f6b78b1ea5800400185947306a84c6c5e7bd78ab9406f5f621ad8515d024cacb80e345ba567c5c3dedfa50724cb345e43fbcaf0bb04b97431500040000000004a3792ee47afaab3700510b8ff3b881ccd356182c621d9fa91d933f902cfe9d2fd139044c0933a33d34496f89a27fd4ba625fe85bd6270faf95aa4d3d7603504eaf9f6314bbd044b518e9c8d6bdd2fd7f0cc6277904fc7b84254f2a1ecf642b218cde18ffb84e55924f1db6b84d3adff497f1329ac542010000005cd6096baae8e781b5d782aad193406b6896aca602afcf9c578311fb0ad295aff09306af106825"], 0x68) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f0000000080)) 03:14:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20001, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000040)=@get={0x1, &(0x7f0000000140)=""/207, 0x771e}) [ 701.147677][ T1371] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:14:58 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000a0301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000303000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000080)=[0x2, 0x4], 0x2) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x200) 03:14:58 executing program 0: syz_emit_ethernet(0x46, &(0x7f00000017c0)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x10, 0x21, 0x0, @dev={0xfe, 0x80, [0x2, 0x0, 0x0, 0x0, 0x3800000000000000]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, {[], @dccp={{0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x3, 0x2, 0x0, "0087ae", 0x0, "ca8345"}}}}}}}, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, 0x5, 0x5, 0x42, &(0x7f0000ffa000/0x4000)=nil, 0x9}) 03:14:58 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x31, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000403000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0x92, "e1491e3ae1d8a6604162a829ad1ca13e0a0d2b6df9129116be90005eb59312980b4d0a4686ecd47459c345b76d42d76e938c3f887ea78df0616a1b59c6d45e1cb3ed0101075cc4ea9527e3dd886339b052931b6830695621f540ba99e6b907297de2c1c56f41cbef83f371639abbdb39b3f978897dcdd06e3bbf77fd6c6f03f07a65ff073190a109edc05671fe10ac46b935"}, &(0x7f0000000240)=0x9a) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000280)={r2, 0x1, 0x1}, 0x8) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfe17, &(0x7f0000001300)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x48}]]}}}]}, 0x40}}, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x0, &(0x7f0000000040)=""/59, &(0x7f00000000c0)=0x3b) [ 701.351173][ T1414] dccp_invalid_packet: P.CsCov 6 exceeds packet length 16 03:14:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400ed0a0301a351014215000000000000000000"], 0x14}}, 0x0) [ 701.395937][ T1414] dccp_invalid_packet: P.CsCov 6 exceeds packet length 16 03:14:58 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x32, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:58 executing program 0: r0 = memfd_create(&(0x7f0000000200)='{\x10', 0x3) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x228000, 0x80) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f00000000c0)={0x50, 0xd8a2}) r2 = dup(r0) write$P9_RGETLOCK(r2, &(0x7f0000000140)={0x20, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2, 'lo'}}, 0x20) io_setup(0x6, &(0x7f00000001c0)=0x0) io_destroy(r3) fcntl$addseals(r0, 0x409, 0x6) io_setup(0xfff, &(0x7f0000000280)=0x0) io_submit(r4, 0x1, &(0x7f0000000080)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="e5", 0x1}]) 03:14:58 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x44, 0x0, &(0x7f00000002c0)=0xfd80) [ 702.150445][ T1423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 702.171283][ T1424] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 03:14:59 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:14:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000e0301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:59 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030607031dfffd944ef20c0020200a0009000100401d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fff, 0x80) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000080)={0x7fff, 0x9, 0x2, 0xffffffff, 0x0, 0x20, 0x5f}) 03:14:59 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x60, 0x0, &(0x7f00000002c0)=0xfd80) 03:14:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000503000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 702.210880][ T1444] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 03:14:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400c00e0301a351014215000000000000000000"], 0x14}}, 0x0) 03:14:59 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000080)={r1, 0x2}) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0xc0481273, 0x0) 03:14:59 executing program 0: io_setup(0x1004, &(0x7f00000000c0)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'\x00', 0x4902}) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000200)=0x3ff) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000000)=0x4) 03:14:59 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd41) 03:14:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000803000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:14:59 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x2, 0x8000) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000140)={0x8abb, "f8a662817533a7c66e641ffe7156d5645c695fb57081d666a32a3eab3affacc6", 0x3, 0x3, 0x7, 0x110000, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syslog(0x9, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$VIDIOC_G_EDID(r2, 0xc0285628, &(0x7f00000000c0)={0x0, 0x7ff, 0x463, [], &(0x7f0000000080)}) 03:14:59 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x40040, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f00000000c0)=""/140) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) [ 703.051135][ T1459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:00 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:15:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400003f0301a351014215000000000000000000"], 0x14}}, 0x0) 03:15:00 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@func={0x10, 0x0, 0x0, 0xc, 0x4}]}, {0x0, [0x2e, 0x0, 0x7f, 0x30, 0x6f, 0x7f]}}, &(0x7f0000000080)=""/111, 0x2c, 0x6f}, 0x20) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000140)={0x5, 0x1, 0x8, 0x890, 0x3}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00\xca=#J\xc3\xad\xbb5\xba\x01\x00\x8c\xed') sendfile(r1, r2, 0x0, 0xe0) 03:15:00 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)=""/194, &(0x7f00000001c0)=0xc2) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)) 03:15:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000903000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000400301a351014215000000000000000000"], 0x14}}, 0x0) 03:15:00 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000000)=0xd582) [ 703.644614][ T1499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:01 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x2000) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000240)={{0x1f, 0x8}, {0xfffffffffffffff7, 0x7f}, 0x3, 0x1, 0x7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x6, 0x0) write$P9_RWSTAT(r2, &(0x7f00000000c0)={0x7}, 0x6) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f00000001c0)=0x111381c, 0x4) r5 = geteuid() lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x5, 0x10000}, {0xffffffff80000001, 0x8}], r5}, 0x18, 0x0) mkdirat$cgroup(r4, &(0x7f0000000000)='syz1\x00', 0x1ff) 03:15:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000080)=0x8) 03:15:01 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000000c0)) 03:15:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000600301a351014215000000000000000000"], 0x14}}, 0x0) 03:15:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000a03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:01 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:15:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000ec00301a351014215000000000000000000"], 0x14}}, 0x0) 03:15:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000b03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:01 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x1) write$uinput_user_dev(r1, &(0x7f0000000300)={'syz0\x00', {0x7fd, 0x5, 0x8000, 0x7}, 0x1e, [0x8001, 0x8, 0x6, 0x3379, 0x6, 0x0, 0x1000, 0x9, 0x401, 0x4, 0x6, 0x81, 0x10001, 0x7fff, 0x5, 0x1000, 0x9, 0x100000000, 0x2, 0x2, 0x5a1, 0x0, 0x7f, 0x8, 0x3, 0x5, 0x2, 0xf42c, 0x1, 0xffffffff00000001, 0x100, 0x7, 0xe6, 0xc192, 0xfff, 0x58, 0x7fff, 0x7, 0x2, 0x5873, 0x5, 0x2, 0x7, 0x2, 0x7, 0x20, 0x1, 0xbf, 0x8, 0x4, 0x4f, 0x1f, 0xe92d, 0x800, 0x2, 0xf5, 0x9a, 0x92, 0x6, 0x9, 0xfffffffffffffbff, 0xffffffffaae00475, 0x1f, 0x9], [0x6, 0x6000000, 0x10000, 0xff, 0xdf3, 0x1, 0x3, 0xf45, 0x400, 0x4, 0x186a, 0x20000000000000, 0x5d4, 0x10001, 0x9, 0x0, 0x6, 0x7, 0x8, 0x0, 0x9, 0xfa, 0x6, 0x100, 0x3, 0x20, 0x4, 0x10001, 0x5, 0x18, 0xfffffffffffffff7, 0x3, 0x0, 0xffff, 0x7, 0x6, 0x5, 0xe8, 0x7fff, 0x3f, 0x6, 0x80000001, 0x81, 0xffffffffffff02bf, 0xd2, 0x0, 0x3ab, 0x9, 0x2, 0x65c, 0x6, 0x6a4c, 0x8, 0x3, 0x6, 0x6, 0x80, 0x4, 0x1, 0x8c8d, 0x8, 0xd708, 0x0, 0x8], [0xffffffffffffff59, 0x200, 0x4, 0x100000000, 0x7, 0xffff, 0xc45, 0x9, 0x9, 0x1, 0x3, 0x8000, 0x7, 0x4, 0x62, 0x101, 0x7, 0x100000000, 0x4, 0xf36, 0x6, 0x2, 0x17b7, 0x8, 0x80000001, 0x7, 0x25a9, 0x7, 0x8, 0x4, 0x273c6fe0, 0x17, 0x51e0d6ff, 0xe7, 0xffffffffffffff82, 0x9, 0xfffffffffffffffb, 0x8000, 0x9, 0x73c, 0x8, 0x8, 0x3, 0x9757, 0x101, 0x7fffffff, 0x8, 0x9, 0x100, 0x4, 0xddef, 0x9, 0x9, 0x7, 0x8, 0x5, 0x6, 0x3, 0x6, 0x1f, 0x9, 0xffffffff, 0xd81, 0x8000], [0xff, 0x1, 0x9, 0x7a, 0x400, 0xfff, 0x920, 0x0, 0x7fff, 0x9, 0x4, 0x0, 0x5, 0x6, 0x6, 0x80000000, 0x0, 0x8001, 0x100000000, 0x40, 0x100, 0x1, 0x7, 0x7, 0x7, 0x7fffffff, 0x81, 0x9, 0x1, 0xe3, 0x7, 0x1, 0x20, 0x1, 0xfff, 0xffffffff, 0x0, 0x0, 0xfffffffe0, 0x100000000000000, 0x2, 0x6, 0x6, 0x8, 0x1000, 0x4, 0x2c, 0x8, 0x0, 0x400, 0x8, 0x401, 0x101, 0x666, 0x0, 0x40, 0x1000, 0xffff, 0x2, 0x0, 0x4, 0x7, 0x0, 0x8]}, 0x45c) 03:15:01 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000180)=0x3, 0x4) sendmsg$inet(r0, &(0x7f0000002740)={&(0x7f0000000080)={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b5391bf21f68116cd5247d6dbd14a1a85e3c679a90b44356318d5e20d4da07ba81e27a1f0cead7544011674178f4b553f47bff5c31122e8bcbb7b9695f8353c7eabb7f114191", 0x46}, {&(0x7f00000001c0)="3bece0286e94752d38bd3eb7d154d257ad8209ab3fd753a3cff2ffa4eb261dadd0cc05b61c8c90ff309b7dff3ba09b460fc58f749946cd8a44345fa8317e545412479854db1df1b9f27ddbb38c750de939da183f3e4004871878b53507bffc8fc7f2036bf488c60b9dfb1bfd8b77821a08f056a716c30eb837c10578fea51d4ecf84d7723071e30155c7d89c3ef71177f2e1e33a39e385bb8465ab3a0f74564c10569e60eb1f78f6691049637719517ef86bb001408aa56a3124", 0xba}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="f5efbb498d18388143ea83635e7c761a8ee4a04289fe9d88fdc8de3b6a40b13ca5489ffa10bc6b2db35ca688077ec9c0fd0ccf090d219bf4d06d82d3d366ae420eb0ae1c564b16a567b5191578ab898c833179fdd6272cacd4dfb0", 0x5b}, {&(0x7f0000001300)="ac84442a08ace1f3faa3f3995e78f5a1f150ffe89c3ef87493ac834f245f91e7b46f379ce1ae9b834b2fea06fedbe33eee4a97b4f2bde5e3ccae13ec695d282f9827439dcb37c55cb334526b8b972e1a2f3766e28780438880e63096ca4b32e2262c0f54e1f859f96402fc13b1b1c51d23cd691bbd2e8f64165ea340c2e44abb907de38f9698941210ed7e6feea57bb77d931c21043d6aa9d62c81ff7211ec4df1c773443946e982d3424506d12b6ba8e2239965df2e6e038ec63474e469bcb85e33f2dc18a31340b7edd85a87ca2d882f8af24c65795bc19fecbc58e6b01ebc8af80a81536e31667aababb5ccbb07c9b3bc017e44", 0xf5}, {&(0x7f0000000140)="2d57312cb7052ef2ce82f3ffa51df117c46d7447fd4233e82522d2054fbbd07d470b5d987ef619e42773e037ac86bfb373634364005ff059dd26", 0x3a}, {&(0x7f0000001400)="9290b129ae8710ffd3de3af312adf14c2974e3584a033d5f507b0b0f5b9c1d1c2778949ee6932b53c5ea24ec658ae6ec6af4ab8960d5b4e5cfe4e684cde616409bd24ce7309b2d1b0493421e2af93f28ac81c46d2372677acfffcc523dbe1421743a07af10edf22037761832f9fd9615de9faac7bd662820999d61fe755e01856cc70487999061ac93b4fa95955c6b55de2d2ce3c4d76d20ac9028bbdffbf9573ca1c3791744209403fae6a2a9784e8412c4c117808efe255e0ea862f09d49a4dd474b3a5052abe9e627a024a8abbcc8d1", 0xd1}, {&(0x7f0000001500)="7142b58f1582a40c5d6693412f1c8f9fc13553826782e524cb6a71ff60783cabfa6703218674e3a52580b040b9a75ba743d0c637d3c59e9cebd76fb328dea7569163a125787f67c6764326ef2250a0902c29b365eb4628905386a4cafd1a7338917ff2a34867dc74eb4d2624e5df87570cb0f91477b69855bb6ac7c5dc1f1d7bd1379a08ff43828cb6dfebfd0e904e72800fdcc5a2fe97f396da894ce7d1ed3b017c798a4f52a54f98dc851758662091f8533074537bc48e0ec93f", 0xbb}, {&(0x7f00000015c0)="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", 0x1000}], 0x9, &(0x7f0000002680)=[@ip_retopts={{0x60, 0x0, 0x7, {[@noop, @cipso={0x86, 0x30, 0x0, [{0x0, 0xc, "d2fc4a387c56356d22fd"}, {0x0, 0x5, "18f0c2"}, {0x5, 0x3, '\b'}, {0x6, 0x11, "2505c3a3718bb201b7562560dccd6d"}, {0x1, 0x5, "c157a7"}]}, @end, @generic={0x86, 0xc, "6b447ab177d093e9ed1a"}, @timestamp={0x44, 0x8, 0x1ff, 0x1, 0x9, [{[], 0xd7a}]}, @noop, @generic={0x45, 0x9, "54f162361cd9d4"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8001}}], 0xc0}, 0x1) sendto$inet(r0, &(0x7f00000027c0)="9f0d5b8680a4d829b8b6afdc459510398a40b1bfec771968f9bb07bfbdc2c5f96521c398028c91eefb9cbdfd491b577b05e7e8cfe9eaab4f73a229e4141b11eb8e7fabd4c8840f8672905078ed53c99bc3b97c85a5a7c607a46b8d4f0a24dfdb21015a9f99ece73a37b3f04c2f6fa348a718831625cc3869b7832d98983e9602ebf681a4aed633", 0x87, 0x14, &(0x7f0000002880)={0x2, 0x4e20, @empty}, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002780)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f00000028c0)=0x6) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000002980)='/dev/audio\x00', 0x8e400, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000002940)={'rose0\x00', 0xfff}) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f00000029c0)={'broute\x00'}, &(0x7f0000002900)=0x78) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@dev={[], 0x2b}, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 03:15:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000aed0301a351014215000000000000000000"], 0x14}}, 0x0) 03:15:01 executing program 5: r0 = getpgid(0x0) capset(&(0x7f0000000040)={0x19980330, r0}, &(0x7f0000000080)={0x6}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:15:01 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)) sendfile(r0, r0, &(0x7f0000000100), 0x2) ioctl$RTC_UIE_OFF(r0, 0x7004) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000)=0x40, 0x4) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xb) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000080)=0x2) 03:15:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000f00301a351014215000000000000000000"], 0x14}}, 0x0) 03:15:01 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x800, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000180)={0x7, 0x1}) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000000)) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x80, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000002c0)={0x0, @multicast1, @remote}, &(0x7f0000000300)=0xc) recvfrom$packet(r1, &(0x7f00000001c0)=""/7, 0x7, 0x1, &(0x7f0000000340)={0x11, 0x7, r3, 0x1, 0x9, 0x6, @remote}, 0x14) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000100)) [ 704.343748][ T1557] QAT: Invalid ioctl 03:15:01 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="0f4250", 0x3) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x4001, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000080)={0x10200, 0x0, 0x1f004, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000)=0x9, 0x8f7a99bbe5b13b0f) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x7fff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000600)='/dev/audio\x00', 0x800, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r3, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0x68, r4, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2c0f18a}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x61}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x10) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x10000, 0x0) getsockopt$inet6_buf(r5, 0x29, 0x23, &(0x7f0000000540)=""/85, &(0x7f00000005c0)=0x55) socketpair(0x1b, 0xfffffffffffffffe, 0x1ff, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000340)) 03:15:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000580101a351014215000000000000000000"], 0x14}}, 0x0) [ 704.379406][ T1562] QAT: Invalid ioctl [ 704.654524][ T1531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000020301a351014215000000000000000000"], 0x14}}, 0x0) 03:15:02 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f00000001c0)=""/4096) ioctl$RTC_AIE_ON(r0, 0x7001) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) capset(&(0x7f00000000c0)={0x399f1336, r2}, &(0x7f0000000100)={0x4, 0x7, 0x4, 0x0, 0x9, 0x8000}) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f0000000180)=0xfffffffffffffefc) 03:15:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2e, 0x24}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) 03:15:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000c03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:02 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:15:02 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x100000000, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x4, 0x0, 0x0, {0x1000000002}}) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3, 0x2000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000000c0)={0x73622a85, 0xa, 0x3}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={0x0, 0x3f2, 0x30}, &(0x7f0000000300)=0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000280)={r2, 0xffff}, &(0x7f0000000140)=0x62376a42) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e21, 0x2, @ipv4={[], [], @remote}}}, 0x5, 0x1, 0x1, 0x8000, 0x80}, &(0x7f0000000240)=0x98) 03:15:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000030301a351014215000000000000000000"], 0x14}}, 0x0) 03:15:02 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in=@dev={0xac, 0x14, 0x14, 0x1f}, @in6=@dev={0xfe, 0x80, [], 0x12}, 0x4e20, 0x1, 0x4e21, 0x0, 0x2, 0x20, 0x20, 0x0, r1, r2}, {0x7fffffff, 0x8, 0x3, 0x9, 0x3f, 0x7, 0x7, 0x40}, {0x8, 0x7f, 0x7fffffff}, 0x0, 0x6e6bb7, 0x0, 0x1, 0x3, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d4, 0x7e}, 0x0, @in=@loopback, 0x0, 0x3, 0x3, 0xf9, 0x400, 0x9, 0x3}}, 0xe8) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:15:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000d03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:02 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x3, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000040), 0x4) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f00000001c0)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:15:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000040301a351014215000000000000000000"], 0x14}}, 0x0) 03:15:02 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x80000001}, &(0x7f0000000100)=0x8) tee(r1, r0, 0x401, 0x9) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000140)={r2, 0x2, 0x0, 0x4, 0x6}, &(0x7f0000000180)=0x18) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:15:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000a0301a351014215000000000000000000"], 0x14}}, 0x0) 03:15:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000e0301a351014215000000000000000000"], 0x14}}, 0x0) 03:15:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x20000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f00000002c0)={{0x6, 0x0, 0x7, 0x401, 'syz0\x00', 0x3ff}, 0x1, 0x10000002, 0x6, r2, 0x5, 0xffff, 'syz0\x00', &(0x7f0000000200)=['usermime_type\x00', '/dev/usbmon#\x00', '.\x00', '/dev/usbmon#\x00', '/dev/usbmon#\x00'], 0x37, [], [0xfffffffffffffffa, 0x6, 0x0, 0xf0e4]}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x61, 0x440000) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000140)={0xfffffffffffffe39, 0x4, 0x3}) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x6, 0x2}, 0x10) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0) setuid(r4) 03:15:03 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x8100, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f00000000c0)) [ 705.714650][ T1586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:03 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:15:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000600301a351014215000000000000000000"], 0x14}}, 0x0) 03:15:03 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f00000001c0)={{0x5, 0x6, 0x9, 0x6, '\x00', 0x1}, 0x2, 0x40, 0x1, r2, 0x6, 0x2, 'syz0\x00', &(0x7f0000000080)=['wlan0\x00', 'illinois\x00', 'illinois\x00', 'illinois\x00', 'illinois\x00', 'trustedcgroup&ppp0securityproc\x00'], 0x49, [], [0x1200000000, 0x1ff, 0x6, 0x3]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) 03:15:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000e03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 705.825005][ T1618] Unknown ioctl -1055894255 03:15:03 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) [ 705.896171][ T1626] Unknown ioctl -1055894255 03:15:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000004001a351014215000000000000000000"], 0x14}}, 0x0) 03:15:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000f03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:03 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180)) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000040)='GPL\x00', 0x0, r1) read(r2, &(0x7f00000001c0)=""/52, 0x34) getsockopt$bt_hci(r1, 0x65, 0x4, 0x0, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) 03:15:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) 03:15:03 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) clock_getres(0x4, &(0x7f0000000000)) 03:15:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000f00a351014215000000000000000000"], 0x14}}, 0x0) 03:15:03 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) getpid() chroot(&(0x7f0000000000)='./file0\x00') 03:15:04 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:15:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000a351014215000000000000000000"], 0x14}}, 0x0) 03:15:04 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0x1, @rand_addr="728d79940f30fc096f2e16926a6ba626", 0x7fffffff}}, 0x1f, 0x7, 0x7, 0x1ff, 0x51cf44d2}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e23, @multicast2}}}, 0x84) [ 706.764525][ T1635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:04 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0xd) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) iopl(0x1000) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x40, 0x0) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x9}, 0x8) 03:15:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000001103000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:04 executing program 0: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x5, 0x20400) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x191900, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000040)={0x1, r2, 0x1}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x0) getrandom(&(0x7f00000005c0)=""/198, 0xfffffffffffffeb0, 0x3) 03:15:04 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$VT_DISALLOCATE(r1, 0x5608) 03:15:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000801a351014215000000000000000000"], 0x14}}, 0x0) 03:15:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000001403000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:04 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @reserved}, 0x10) r1 = dup(r0) write$P9_RMKDIR(r1, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x80, 0x3, 0x5}}, 0x14) listen(r0, 0x0) connect$vsock_stream(r0, 0x0, 0x0) 03:15:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000302a351014215000000000000000000"], 0x14}}, 0x0) 03:15:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x9, 0x200) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000140)={0x100000000, 0x4, 0xffffffffffffffe1, 0x8, 0x2, 0x8f, 0x3ff, 0x0, 0x9, 0x4, 0x2, 0x5}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x100, 0x0) socket$isdn(0x22, 0x3, 0x11) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f00000000c0)="d61a8037cd6b872a") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\xf2\xff\xff\xfe\x00\x00@\x00', 0x10000000006}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) [ 707.575841][ T1677] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:04 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:15:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000001503000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000308a351014215000000000000000000"], 0x14}}, 0x0) 03:15:04 executing program 3: io_setup(0x9fe, &(0x7f0000000000)=0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f00000000c0)=""/255) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, &(0x7f00000002c0)={{0x1, 0x4, 0x40, 0x1000, 'syz1\x00'}, 0x1, [0x100000000, 0x5, 0x0, 0x10000, 0x9, 0xb0, 0x1000, 0x4, 0x100000001, 0x2, 0x5f90, 0xffff, 0x1, 0x2, 0x700000000000000, 0xe, 0x241, 0x0, 0x9, 0x0, 0x98, 0x100000001, 0x7f, 0x0, 0x9, 0x5, 0x3f, 0x23, 0x5, 0x401, 0x1, 0x8001, 0x7, 0x4a85, 0x1f80000000, 0x8, 0x2, 0x4080, 0x100, 0x9b5, 0x1, 0x7, 0x0, 0x0, 0x4, 0x7fffffff, 0x40, 0x7, 0x5, 0x0, 0x80, 0x2, 0x401, 0x100400000, 0x7710, 0x80000001, 0x3f, 0x17, 0x2, 0xfffffffffffffffc, 0x100000000, 0xd14, 0x9, 0x7, 0xf8, 0x2e, 0x0, 0x0, 0x7fff, 0x5, 0x2, 0xfff, 0x61e, 0x2, 0x8, 0x8, 0x8c6, 0x8, 0x3ee, 0xde, 0x3, 0x818, 0x1, 0x5, 0x7, 0x3f, 0x9, 0x1ff, 0x1, 0x401, 0x9, 0x80, 0x7, 0x6, 0x8, 0x1ff, 0x200, 0x7, 0x200, 0x5, 0x0, 0x10001, 0x1, 0x6, 0x6f, 0x7f, 0x100000000, 0x9, 0x401, 0x8, 0x464, 0x9, 0x2, 0x40, 0x8000, 0xffffffffffffffff, 0x5, 0x3f, 0xfffffffffffff39d, 0x8, 0x0, 0xaa, 0x100000001, 0x5, 0x8c, 0x10000, 0x1, 0x6e3b], {r3, r4+10000000}}) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x3d}]) 03:15:04 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0xff, 0x40) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000140)={0x100000001, 0x0, 0x10001, 0x5}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000180)={0x8, r2, 0x10000, 0xff}) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UFFDIO_UNREGISTER(r3, 0x8010aa01, &(0x7f00000000c0)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) 03:15:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000030ba351014215000000000000000000"], 0x14}}, 0x0) 03:15:05 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000180)=0xfffffffffffffdff) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) fdatasync(r0) 03:15:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000001603000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:05 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:05 executing program 0: r0 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000440)='keyring\x00', &(0x7f0000000480)='/dev/kvm\x00') 03:15:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351024215000000000000000000"], 0x14}}, 0x0) 03:15:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000040)=0xfeff) syslog(0x0, 0x0, 0x2ff) r1 = request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='vboxnet1+..bdevvmnet1\x9a\x00', 0x0) keyctl$get_security(0x11, r1, &(0x7f0000000100), 0x0) r2 = dup3(r0, r0, 0x80000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000100)=0x1, 0x8) [ 708.475558][ T1716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:05 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, 0x0) 03:15:05 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f00000000c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000080)=0xffffffffffffff6b) 03:15:05 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) 03:15:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351084215000000000000000000"], 0x14}}, 0x0) 03:15:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000001703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:05 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x28000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x24) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:15:06 executing program 0: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x1) sendfile(r0, r0, 0x0, 0x1) 03:15:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510b4215000000000000000000"], 0x14}}, 0x0) [ 709.233262][ T1750] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x802, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000180)='NET_DM\x00') write(r1, &(0x7f0000000080)="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", 0xfc) 03:15:15 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000180)={0x28, 0x2, 0x0, {0x2, 0x20, 0x9}}, 0x28) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr(r1, &(0x7f00000000c0)=@known='system.advise\x00', &(0x7f0000000100)='selinuxproc$proc\x00', 0x11, 0x3) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000001c0)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000200), 0x5) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000), 0x4) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000240)={0x4, 0x7, 0x1, 0x200, 0x5, 0x6, 0xc}) 03:15:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215020000000000000000"], 0x14}}, 0x0) 03:15:15 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:15 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, 0x0) 03:15:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000001803000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:15 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x10001, 0x7b, 0x4, 0x8001000000000000}) 03:15:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215030000000000000000"], 0x14}}, 0x0) 03:15:15 executing program 5: getpid() r0 = getpgid(0x0) capset(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x0, 0x2, 0x10000}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x200000, 0x0) 03:15:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215040000000000000000"], 0x14}}, 0x0) 03:15:15 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:15:15 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000200)={r2, 0x7, 0x0, 0xfffffffffffffeff}, &(0x7f0000000240)=0x10) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80, 0x0) ioctl$PPPIOCSACTIVE(r3, 0x40107446, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{0x2, 0x1, 0x5, 0x80}, {0x6, 0x6, 0x0, 0x8}, {0xb1, 0xc4, 0x49, 0x20}, {0x8, 0xfff, 0xc4, 0xf02e}, {0x1, 0x46, 0x80}, {0x10001, 0x3, 0x401}, {0x1ff, 0x1f, 0x1, 0x7fffffff}]}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000480)={'nat\x00', 0x0, 0x4, 0xd3, [], 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000380)=""/211}, &(0x7f0000000280)=0x78) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) [ 718.974064][ T1777] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) lsetxattr$trusted_overlay_origin(0xfffffffffffffffe, 0x0, &(0x7f00000001c0)='y\x00', 0xffffffffffffff0b, 0x3) 03:15:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150a0000000000000000"], 0x14}}, 0x0) 03:15:16 executing program 5: socket$rxrpc(0x21, 0x2, 0xa) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7fff, 0x101000) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000000c0)={0xf9, 0x0, [0x59, 0xfffffffffffffffd, 0x9, 0x3]}) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) alarm(0x10001) 03:15:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000001c03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:25 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:25 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, 0x0) 03:15:25 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x100, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000000c0)="6eff2c8ec3e073108c835b4685d18720c9e6d1bb29b5680d7bd01a8c2774673c7ad0b2862fc532e134abf403d9a804aa616546d61883d075682a20e2a516c3cd994222c32543896079ab1b3ed671c1868bfb09da146ea9cf392b22315145f6c35afe2d6c23130b5d9a2ae0915a2739847f09e03052f23c2a354559e0b6e65c952d087e20ff62efdcdac76063b41a38ef7cdc9ef258858ddf46e5a050ae50bded251d5e0b61d46e12c4c7c11a23b1ea37") r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:15:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000001d03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150e0000000000000000"], 0x14}}, 0x0) 03:15:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) removexattr(&(0x7f0000000200)='./file0\x00', 0x0) 03:15:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000001e03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4048ae9b, &(0x7f0000000040)={0xd, 0x0, 0xfff}) 03:15:25 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = getpid() wait4(r1, &(0x7f0000000000), 0x4, &(0x7f00000000c0)) 03:15:25 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x8000, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000300)={0x10001, 0xa, 0x0, [{0x3f, 0x81, 0x3, 0x6, 0x6, 0x7ff, 0x3}, {0x0, 0x8, 0x40, 0xffffffffffffffc0, 0x74ac, 0x6, 0x7ff}, {0xa8, 0x66a, 0xe7, 0x2, 0x200, 0x7, 0x80}, {0x7, 0x809, 0x1ff, 0x7fffffff, 0x5, 0x43, 0x9}, {0x2, 0x3, 0x3, 0x9, 0x0, 0xfff, 0x1000}, {0x38, 0x4, 0x20, 0xc135, 0x5, 0x1, 0xdc}, {0x80000001, 0x3, 0x6, 0x5, 0x1, 0x5, 0x9}, {0x8, 0x7, 0x8bf4, 0x9, 0x800, 0x5}, {0xdcd, 0x9, 0x4, 0x9, 0x4, 0x6, 0x9}, {0x1, 0x7fffffff, 0xba8, 0x5, 0x40, 0x0, 0x7}]}) recvmsg(r0, &(0x7f0000000200)={&(0x7f00000000c0)=@generic, 0x80, &(0x7f0000000140)=[{&(0x7f0000000000)=""/43, 0x2b}], 0x1, &(0x7f0000000180)=""/77, 0x4d}, 0x20) 03:15:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215600000000000000000"], 0x14}}, 0x0) 03:15:26 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ubi_ctrl\x00', 0x80000, 0x0) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000800), 0x4) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000840)={0x32d9, 0x7ff, 0xffffffffffffffff, 0x8, 0x9}) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7f, 0x0) sendmmsg$unix(r2, &(0x7f0000000740)=[{&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000140)="ff5215168a713f69f6888988031d4d0ff585677b4e6dffbd691189896c526299019d7c9f08d4fdad10e798877038975b78bf54e6799989dd3a0bf5c12eeabc4b223b083b760bac62eb0a5aba213d68672d11feeaeede24d4fb547d5f74fcc815e7382193cdb777d3985af95c06feaf109417465c43702adc07a9e08b682bcbe51830e6412945009f858574cfaa58a2150c143208c1b9ee771c41497e62457cdf91ea2e8990c18090ddd903c5c3deabdb238fc92765fdc714f1cd9c331f02b460514be3abd3e8f0ce47e01325", 0xcc}, {&(0x7f0000000300)="b134ef706cc6d2da37e9160ac8aa4a99bc77bcaa08fb1d7b32c70fdf19a6872c4a5575a133e196f64400c37b642ae0e4b5da372cf23b6fcde2b8701f8fa2a2c7cd13387f6aa2da6b553f6da351868aaa3d12efd21e064ac9677912526c4d7c0203964ddd60782bc6c91318e083c0a02e6ff102b492ca1802ff0c58e0e6dc06e735b8341b1815992a1c69a2990fdd0f5048b8e592d2a789841019fb605615f2bf8f20c5ba6a9571ed4afd76fbf8c83f451d2083cc85e7f43d12", 0xb9}, {&(0x7f0000000240)="2f1dd3bbacc51a2272e4ab00b906047b7cf3b8a4fd2d9b6de324179443918cda6b7e17c900e6edc86924c6688204ac00bc8e332314d2c2e51333e2f90f200f24033842ffc294a83c2425943cd0cce08f26d9f52c87d84214c6be9af5287709378f2fb491ca28c5e676bfe8695d9fd8a7cede9e5e18c60343763b", 0x7a}, {&(0x7f00000003c0)="091943a3bbdbec68e843d34b6328627fb44ba671ada658552afb24bab5c6562efd14657a71565c6d4d8f87cf429174b392162fa3dc94e6f82965203c0e381f74bd2e88e6eacaeab170fcf3e54b7f6af0a5ffa9960da2d3e787cd4ba58a550221a5f22b9d2c2b1e46ce2061e040a747ed21a385cda8788cc02d9c64c33f931ffe3196fe6b305f9bbedd7569", 0x8b}, {&(0x7f0000000480)="d1781db37fa81ada1edee8ce56987d900eebc361bf9cba5c1fd10e2b865bc248eb90980eeb4f67462db138078096219b9901ddfd0907ba3d43b72b181f28835ebf01b8009a8c2e032718f37bea65692633c25641af3a7f7b0b389c0a4ad680ac11116ac18799d4ac9423b5574e77373f", 0x70}, {&(0x7f0000000500)="a39d6aad897981a7902aa87402d20959a64d62a5703b3eb3cceea63354f7aa60c87188d867588c459b68eb8c90fd3f4507dd10c40a12d4", 0x37}], 0x6, &(0x7f00000005c0)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x30, 0x8010}, {&(0x7f0000000600)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000680)="622261c58f4b39d46fe71f0738ee80f6ab428e4844b127d7", 0x18}, {&(0x7f00000006c0)="a03e682b090ec1007410d249aa7b220d0afcdcee055c33161219be0b5fcf8cc09107345d2170ded0fe995baf010fd71203e66c31a8", 0x35}], 0x2, 0x0, 0x0, 0x8840}], 0x2, 0x20000000) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) [ 729.183753][ T1847] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:35 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:35 executing program 0: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x4001) open(&(0x7f0000002880)='./file0\x00', 0x0, 0x105) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x2001, 0x0) 03:15:35 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0xa0002) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000180)) 03:15:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215f00000000000000000"], 0x14}}, 0x0) 03:15:35 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x0, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:15:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000002403000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000002503000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f00000000c0)="2700000014000710020e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x400) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0x4) getpgrp(0xffffffffffffffff) r2 = gettid() capset(&(0x7f0000000040)={0x19980330, r2}, &(0x7f0000000180)={0x4, 0x0, 0x1146, 0x7fff0000000, 0x3, 0xfffffffffffffffc}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:15:36 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xf965) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x6, 0x10001, 0x0, 0x1ff, 0x10001, 0x800, 0x1000, {0x0, @in={{0x2, 0x4e23, @remote}}, 0xd9a0, 0x1, 0x101, 0x67c, 0x70}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000280)={r2, 0x6}, &(0x7f00000003c0)=0x8) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x58, 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x5be}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r3, 0x9}, 0xffffffa0) 03:15:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x20000000020) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000000)=0x2, 0x4) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_GET_SECCOMP(0x15) sendto$inet6(r1, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 03:15:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000300000000000000"], 0x14}}, 0x0) 03:15:36 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xffffffffffffff48) [ 739.264168][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 739.270214][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 739.434506][ T1886] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:46 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:46 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) socket$tipc(0x1e, 0x2, 0x0) 03:15:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000a00000000000000"], 0x14}}, 0x0) 03:15:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000002603000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:46 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x0, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:15:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) 03:15:46 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400, 0x0) getsockname$tipc(r0, &(0x7f0000000180)=@id, &(0x7f00000001c0)=0xfffffffffffffde4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:15:46 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215ed0a00000000000000"], 0x14}}, 0x0) 03:15:46 executing program 0: lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x40000000000600b, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000100)={[], 0x0, 0x4, 0xac6c}) 03:15:46 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f00000000c0)=0x101) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000140)) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:15:46 executing program 3: write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:46 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) semget(0x1, 0x3, 0x10) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:15:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000e00000000000000"], 0x14}}, 0x0) 03:15:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000002703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:47 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x0, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:15:47 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r1, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x2c}}, 0x80) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:15:47 executing program 3: write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215c00e00000000000000"], 0x14}}, 0x0) [ 749.706204][ T1926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:47 executing program 0: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x0, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:15:47 executing program 3: write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000002c03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 749.901012][ T1970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:47 executing program 5: rt_sigreturn() capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000280)={0x7, 0x15, 0x2}, 0x7) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000480)={0xbc, 0x2, 'client1\x00', 0xffffffff80000002, "dc028cb40a06f019", "f8453fd2ccc6b86c3f9acce5da631d35e17c6cdfd409308181d875dc0f4219c3", 0x6a9, 0x200}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x7, 0x70, 0x9, 0x4, 0x3, 0x45, 0x0, 0x5, 0x24080, 0x0, 0x6, 0x6, 0x5, 0x3, 0x20, 0x58d, 0x6, 0x2, 0x4, 0xa4b3, 0x200, 0x6139, 0x7, 0x9, 0x80000000, 0x3ff, 0x4, 0xff, 0x76, 0x3, 0x1ff, 0x9, 0x40, 0xffffffff, 0xffffffffffffaf3d, 0x401, 0x9, 0x4, 0x0, 0x8, 0x5, @perf_config_ext={0xfffffffffffffffb, 0x1}, 0x20020, 0x5484, 0x80000001, 0x3, 0xfff, 0x608, 0x276}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000000)="5ee64840c9dd9656f17d1cb0abb35a22eee9541579cb17ecabc2b2f4f105a017672e2f44e073", 0x26) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x220400, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000180)=0xfffffffffffffe5a) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000003c0)=0x58, 0x4bd) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x3, 0x22000) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000340)={0x3, 0x7, 0x100000001, 0x7, 0x80000000}) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000100)=0x10000) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x8000, 0x0) 03:15:47 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215003f00000000000000"], 0x14}}, 0x0) 03:15:47 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000000c0)=0x29b) 03:15:47 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) [ 750.777662][ T1975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:48 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x0, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:15:48 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept4$packet(r0, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002480)=0x14, 0x800) accept(r0, &(0x7f00000024c0)=@hci={0x1f, 0x0}, &(0x7f0000002540)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002580)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002680)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000026c0)={@initdev, @dev, 0x0}, &(0x7f0000002700)=0xc) accept4(r0, 0x0, &(0x7f0000000200), 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000002840)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000002b80)={&(0x7f0000000180), 0xc, &(0x7f0000002b40)={&(0x7f0000002880)={0x2a4, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x108, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x178, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r6}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x0, 0x7, 0xffffffff, 0x3}, {0x6, 0x1, 0x0, 0x3e6}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}]}}]}, 0x2a4}}, 0x20000010) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000000c0)={0x74, 0x0, [0x800, 0x5, 0x9, 0x8]}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000001c0)={@rand_addr="e71d8af327e48315e8b11404f1bf5701", r3}, 0x14) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000140)=0x40) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r7, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:15:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215004000000000000000"], 0x14}}, 0x0) 03:15:48 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:48 executing program 0: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x0, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:15:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000002d03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:48 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:48 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x100, 0x0) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f00000000c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)) 03:15:48 executing program 0: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, 0x0) 03:15:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000002e03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:48 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215006000000000000000"], 0x14}}, 0x0) [ 751.627037][ T2010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 751.641982][ T2028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:48 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x0, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:15:48 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000000)=0xfffffffffffffe33) 03:15:48 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150ec000000000000000"], 0x14}}, 0x0) 03:15:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000002f03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000140)={'syz'}) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x42400) accept4$alg(r0, 0x0, 0x0, 0x80000) write$P9_RATTACH(r0, &(0x7f0000000040)={0xfffffffffffffecb, 0x69, 0x2, {0x43, 0x3, 0x6}}, 0x14) 03:15:49 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:49 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000b40)={0x11, 0x0, 0x0}, &(0x7f0000000b80)=0x14) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000bc0)={@loopback, r2}, 0x14) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000000)='veth0_to_bond\x00') 03:15:49 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150aed00000000000000"], 0x14}}, 0x0) 03:15:49 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000380)='/dev/video#\x00', 0x7fff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') r2 = dup2(r0, r1) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685, &(0x7f0000000240)={0x1, 0x4, 0x1000, 0xe5, &(0x7f00000000c0)="c496f166576aeb1308bad85f15688c80c68cb8e4879a95579687e20ec10def529298864187f2ac2ca9595e1c629c42491fd82cfe57512ed4fe73ca83ef2deb24f0fab5f37de0a7cc5b7a04177d4e9ead662f65cea9f82241086005add3a96c24b3abf6ee62dd7acc0ba61ca04905f4d2d66e3e0d881426ce99198b8eac20eee3fcb8ddbb431faf2e63c7207341216a66cc295776f1d41e72f99ef58e5b09e78d58e64c0cf6284761ebb966f2d2b8ab70d57328391cddb9fb88f6f98541a71dda78131a5c414906c32e112b0241ade0893fdcce89b6dbcc100f701bed576b87ff78bdfea54e", 0x0, 0x0, &(0x7f00000001c0)}) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0xd}, 0x7}, 0x1c) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000000)={0x0, 0x4, 0x100000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}) read$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @initdev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000002c0)={@local, @local, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8, 0x2, 0x10000, 0x100, 0x8, 0x8000000c, r3}) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000040)={0x0, 0x32, 0xb, 0x0, 0x8, 0x0, 0x1}) [ 752.604677][ T2041] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:49 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x0, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x97, 0x10}) 03:15:49 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, 0x0, 0x0) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500f000000000000000"], 0x14}}, 0x0) 03:15:49 executing program 0: gettid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) gettid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) getpid() fcntl$getown(0xffffffffffffffff, 0x9) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x8, @ipv4={[], [], @rand_addr=0x81}}, {0xa, 0x4e21, 0x6, @mcast2, 0x9f}, r1, 0x7}}, 0x48) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) r3 = getpgid(r2) kcmp$KCMP_EPOLL_TFD(r3, r3, 0x7, 0xffffffffffffffff, 0x0) 03:15:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000003403000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:49 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000300)={0x0, 0xf9, "fa52e35977232d7fcc98c5caf1afad6069b2b2514d46a2b2d4da261ecebd7c48be8f130a1bdb910f816c5fc5c61e071d869023dabeac48aae5018a4b9b6591fb002dcc0f161cd2c9a527f5755bee03c4d6b0df1eab872016fe122856ea4a01b301acf15a71bc475092fda845e577bfbe20c3bd8c55d2872636041cd60500a001edbaf09d9148bcd874096549f0575b1eed6c2f57d2241c98645c219153b580b36a46a5cae646d8219ea81c0bb981051557d646180b0f94ca70f98aa2f6a88573b34dd2f12331d33797ffe7098b160ba7b58cd4f24762c1069c702df7be5ca5774d5df3e3a8caea5ce223493cd50e11bdc91aa3385656890798"}, &(0x7f0000000100)=0x101) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={r1}, &(0x7f00000001c0)=0x8) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000000)={0x800, 0x40}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)={0x90e, 0x80000001, 0x7, 0x1, 0x9, 0x1ff}) 03:15:50 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x3, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:15:50 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, 0x0, 0x0) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000003503000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:50 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x0, 0x0, 0x1}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8008044}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r2, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast1}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x4000) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000000c0)=0xffffffffffffffdc) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000240)) 03:15:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215004003000000000000"], 0x14}}, 0x0) 03:15:50 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, 0x0, 0x0) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) [ 753.482854][ T2082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:50 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, 0x0, &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x0, 0x10}) 03:15:50 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20000, 0x0) ioctl$KDENABIO(r1, 0x4b36) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) getsockname$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev}, &(0x7f0000000100)=0x10) 03:15:50 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x3, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:15:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000340000000000000"], 0x14}}, 0x0) 03:15:50 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:15:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000003603000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:50 executing program 5: r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x80800) r1 = dup(r0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f00000003c0)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300), &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, 0x5, 0x6}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000001c0)={@can, {&(0x7f0000000140)=""/13, 0xd}, &(0x7f0000000180), 0x4}, 0xa0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000400)={{0x0, 0x3, 0xf0, 0x3, 0xfff}, 0x80, 0x80000000}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f00000000c0)=ANY=[@ANYBLOB="c40245003df3067989d6216538d8da8af7e6ea2294fd8b37e2eb295dd1859896c4dd1045d08f8032a90194c98d4d5be6f26e3acbba3ab34bbefa2df7701ac1994f7747d465064cf22a"]) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:15:50 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x3, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:15:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000003703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:15:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215fffff0000000000000"], 0x14}}, 0x0) 03:15:51 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x30, 0x2, 0x7}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e21, 0x8, @mcast1, 0x9}}}, 0x84) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:15:51 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x3, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 754.394210][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:15:51 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, 0x0, &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x0, 0x10}) 03:15:51 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) capset(&(0x7f0000000040)={0x19980330, r0}, &(0x7f0000000080)={0x5, 0x1ff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:15:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000010000000000"], 0x14}}, 0x0) 03:15:51 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 754.865974][ T2147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:16:01 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:16:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000003c03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:16:01 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:01 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x8, 0xc0) restart_syscall() getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}}, 0x251, 0x7, 0x8, 0x7fff, 0x8}, &(0x7f0000000240)=0x98) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000280)=@sack_info={r1, 0x0, 0x1}, 0xc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) dup3(r2, r2, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x4400) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x38803000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r4, 0x7, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0xfe5ce04f3163087c) 03:16:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000020000000000"], 0x14}}, 0x0) 03:16:01 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, 0x0, &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x0, 0x10}) 03:16:01 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000003d03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:16:01 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x0, 0x0, 0x7, 0x2}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:16:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000030000000000"], 0x14}}, 0x0) 03:16:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x3, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:01 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x1000, 0x3, 0x0, 0x0, 0x80}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x10000, 0x404400) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)={0x2, [0x0, 0x0]}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x10000, 0x4, 0x6, 0x3f, r2}, &(0x7f0000000180)=0x10) [ 764.948070][ T2165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:16:11 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:16:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x3, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000040000000000"], 0x14}}, 0x0) 03:16:11 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 03:16:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000003e03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:16:11 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440), &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x0, 0x10}) 03:16:11 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @remote}, &(0x7f00000000c0)=0xc) 03:16:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x3, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000004403000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:16:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000000a0000000000"], 0x14}}, 0x0) 03:16:11 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20000, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f00000000c0)={0x3, 0x8}) 03:16:11 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x3, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 775.204893][ T2201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:16:21 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, 0x0, 0x0) 03:16:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000000e0000000000"], 0x14}}, 0x0) 03:16:21 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x0, 0x200000000000000}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:16:21 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x3, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000004503000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:16:21 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440), &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x0, 0x10}) 03:16:22 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x2, 0x20000) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000100)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000000c0)=0x314) 03:16:22 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x3, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:22 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2, 0x0) write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0x0, 0x6, {0x7, 0x1f, 0x0, 0x280040, 0x5, 0x6, 0x200, 0x4}}, 0x50) 03:16:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000003f0000000000"], 0x14}}, 0x0) 03:16:22 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000400000000000"], 0x14}}, 0x0) [ 785.468567][ T2240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:16:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000600000000000"], 0x14}}, 0x0) 03:16:32 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000004603000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:16:32 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, 0x0, 0x0) 03:16:32 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440), &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x0, 0x10}) 03:16:32 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x404000, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x217, 0x40000) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f00000000c0)='cpuset$system\x00', &(0x7f0000000100)='./file0\x00', r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:16:32 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:32 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$CAPI_GET_MANUFACTURER(r2, 0xc0044306, &(0x7f00000000c0)=0x9) 03:16:32 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215ffffff9e0000000000"], 0x14}}, 0x0) 03:16:32 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:32 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0xb8000) read$rfkill(r0, &(0x7f00000000c0), 0x8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:16:32 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xcbb9, 0x100) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000000c0)={0x5, {{0xa, 0x4e23, 0x7f, @dev={0xfe, 0x80, [], 0x11}, 0x96}}}, 0x88) 03:16:32 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000004703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 795.725377][ T2278] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:16:33 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a24539729", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x4c, 0x10}) [ 796.075660][ T2310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:16:42 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, 0x0, 0x0) 03:16:42 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500000ec00000000000"], 0x14}}, 0x0) 03:16:42 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) sendto(r0, &(0x7f0000000000)="b11547f8a65be4", 0x7, 0x0, &(0x7f00000041c0)=@in={0x2, 0x4e22, @multicast2}, 0x80) accept4(r0, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x80, 0x800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) sendmmsg$sock(r0, &(0x7f0000004080)=[{{&(0x7f0000000200)=@ll={0x11, 0x0, r1, 0x1, 0x9, 0x6, @dev={[], 0x1b}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="c70ceb1c6e2ef5763c4b803c80b5ec2e38eddfea7e41235ba3cb4680cd7e1e3c6cd27e8858435f48a9ee3cca14b9674d7ccae279d7a56654efc503b09a85bb250f53f74e1d009b69eaeb7340fd177d732475e56d185f5c83aff8ae70fd48bccae34e38c978607fffafec96c31df7214443747560d23919be79394a", 0x7b}, {&(0x7f0000000380)="93578eb8d3f329196cd428a76ef3270907b96edb26ddd1e50330b2a8c9f47cb7a3c2ce9239eb5ad585b04658085e7db542bba673054b55a2baddbd70239251550233c49aad97c24f1d5a0b1f1b1b2a3518cadec72fbb3ef0313b6b3fa3f6bfa1014a127572e381403acdad15fa4ed4ee065992dd712eeec6e437665a33db3547a0fcf6f22280980ccf6442a36397d3932edf3bcd2d17921963049220abb4272ec3f9c9d65075039b2593cc3c3a7651100b31", 0xb2}, {&(0x7f0000000440)="d03bd7a9ccec8a7b0e6c3a169fe39ab51ba5c14a5477dc76f8e1bc5b05ca405f7fd18a718d31d2ff66e22df9551f2b5a3ce49680b492d29c6a22ea5c1c33e70a229b6f5eff476d0304912b0dbd4ce809c848eb0b98b01f7d96990e9ddce0b8abaf5799d56ff81be5cb7c949d515f4339294889223bcb16843d0cd504f0739c6d", 0x80}, {&(0x7f0000000280)="f131bf27ab0b137b2052d8d4caa139101b5b3e3b0558bafda1e803ee5484bdbe7cc4ba77da39922260018d43b28c", 0x2e}], 0x4, &(0x7f0000000500)=[@timestamping={{0x14, 0x1, 0x25, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffffffff7fff}}], 0x30}}, {{&(0x7f0000000540)=@nfc_llcp={0x27, 0x0, 0x1, 0x3, 0x6, 0x7, "3d64d7a651f291a6427d72ccb686b3c32ba4f0201e1e07ad253ac44a3a064c57d38529261c377cd1af048eb187d8e1f6041f1d3a1e32e92abb3eadb04dbb0a", 0x38}, 0x80, &(0x7f0000000600)=[{&(0x7f00000005c0)="12b65cceadc700aed8b10e7f1bcf5b3243fe15d97e07f2237fd95369e84126c9eeb1", 0x22}], 0x1, &(0x7f0000000640)=[@timestamping={{0x14, 0x1, 0x25, 0x100000000}}, @mark={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x40000000000}}, @txtime={{0x18, 0x1, 0x3d, 0x6375}}, @mark={{0x14, 0x1, 0x24, 0x10001}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}], 0xa8}}, {{&(0x7f0000000780)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @broadcast}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000001800)="69b025155687b225eca72b46745438d01ee38cfe262b7aea9f95c6ce9004b08bdf8e6eb28684631da2cc9d30f9e42e0c847e9773ff39d4f23091be48fa077ce018b83372964b7e36194224132f1600241d911b8d7c6b7998165929fcc66387312d8acfa8cd2c1e18efc265daf09d9975c0e9435390184a43058a3058b09f28bbcda253e94d301752e1de6daf3486ebcadd648b7602", 0x95}, {&(0x7f00000018c0)="b7a3c8950d004e142748db36e15759c9e84702da69955233da9b41e8a91610a6668cb48290cc028f9b320ee243b28e062593b84089eb2bb416f59a55f7e859b036917ec0a6d09eb4d7dcd2e0e469607225a4f197aa50049257d02b42bb7388b72c5453b8693852ea84e5085f1c9987769b6e25f36683b767c0002bcff9c4a2bdcedcc99e54666c4b741211c79d24c3bc369b78ac2ad0717087cd3813d7abd406acc4c7506308bd3172008de45bf9172fb2f59ae80f22f217d566902357333502e5435bcc4f8a861d1a2662f9769d98084c5875591e18f7f98b9dddd11926", 0xde}], 0x3, &(0x7f0000001a00)=[@timestamping={{0x14, 0x1, 0x25, 0x80000001}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x30}}, {{&(0x7f0000001a40)=@caif=@util={0x25, "ed35ce288776c5a8341ea8851122af07"}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000001ac0)="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", 0x1000}, {&(0x7f0000002ac0)="cb0aa9ea", 0x4}, {&(0x7f0000002b00)="6f5b8eaefff51626311fe2863046c366e2c15a3993c61402d1eaeeb8b3c375784f1a08fd0129410b3ff9a3801da4533b4897817e4abeb1fd81e3299b1620763bc80a7af0739048375228c956f444fbbd5a5708a47c65d5ee5452849f749d2c67991f325fc65e7969af9a3f1429457a6a73b9b795f25c6698c8072031dc3893eadb1984130827a447e9372b18b2c21c7cc0f61a803e8115d5fa632aeea65f0ef0b33871cfb2983ac6ac46311ac28a8a53c856651596d48a3aea2ee29b82487c8bd850f521be4e21dc38e6cc8c285e1c1a7cac01", 0xd3}, {&(0x7f0000002c00)="ed25212ce936", 0x6}, {&(0x7f0000002c40)="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", 0x1000}, {&(0x7f0000003c40)="298688fe3170d6db64ef79baf5cee3e2ae223d959c06c26ee28cd992bacd56be2bddb78916b36a10097a308be5002a322179670dbcc3fd9fee4155360405493a3d68da77ccc12cb3c2835d2b002938b9be73bb2ab218dd33e55d", 0x5a}, {&(0x7f0000003cc0)="760b67e654d75db94b828de9f6c889535441442097a1934f48d637f6c2f888c52a4f4e26dc1a303746f3c49e0303cec900c070a7b78e1139f283949e35c921aa176797b8e20afb496e016f3b8a8c761575ecc67dda90dcfb9fa4a6ffee20474bf1515d6413dfbb2454d6114482c0e17a85ba33af3fb10231e91f8228ec258e52444e49f1bca5310852ee9a2244f25149d4aa10c4e4ec45b4acb54f3d5c8f0b7c168b95b47a3047423d8185f3a363fc52a8ecbf45714604c5c38f30c3", 0xbc}, {&(0x7f0000003d80)="4ec0ef02f5d9a4bb8f24d41da6ae86bfaa4ea46c76e83512f39cca57f911a1c0ef544cdcc4f7b6f5447db1f4d48386d3cc7677a2e17ea1ecfe14f449797a5b5e5ac8e9dc788acc7e5c3ed2986092c675e85c32b5acc179b3ff013ab218c5fdf5b16d5a5c124d1edebbd742d6b7a65060f6f9aa8817358020d9c5377e118a4a2eea520970193d96f9e767771970634a3a09e012528487e2a431657d901b1928bde2f808eb79698476dc4e1f5af7180ddd608d161422851ebd54782de8d03444dca5856b230db50339630fc201172c38d623e52f3690813b75406b240f57d0929853f05f714098c6b46619b4379ce3278ba7e7e93f56", 0xf5}, {&(0x7f0000003e80)="71f030556be704fcf79705fcdfd440c013a42b06f63c3d5d56cf60dc10c02da5bc4a2db403096e852fd6f3cc017bbfe50afb63e294cd6041dc031fbfadaadaa8db97d1527fbf454fa508d0a1296a7dd25dd5f05839f235502d3eaa98ffb51f68851eadb525392581433f1b5d92634a8f66691244", 0x74}], 0x9, &(0x7f0000003fc0)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x1000}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @txtime={{0x18}}, @timestamping={{0x14, 0x1, 0x25, 0x8001}}], 0x78}}, {{0x0, 0x0, &(0x7f0000004040)}}], 0x5, 0x4) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:16:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000004c03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:16:42 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a24539729", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x4c, 0x10}) 03:16:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000004d03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:16:42 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x10040, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0xdd, "4bd074c1540bbfb425bd2a727df8454d5336e889c9470275d82cc97f82b2cbb53c90d672a9322654f21bca90a1a5185299b5f135f7abe450f9f55bb859d9e6b8b1eec07491bf4aa03e24d8dd576799d43addf21ce55c1cc4f6e2bc98f891c716136f6f4296ec05b3a9dee884111d409f72a471af8c593c5463acf9cfcfe7ab9146c8753e2c30c10b55ce09403742b764738c709e5854ad4bb39de0a9cbdde2156692deab61d64ff1755dcd111342ff8551af52c487e45dfcef3d5a7863e4caf3ba200ee39d2b660b2c84d854e96c804f75a2f9b8ab01893dbb6d5096cd"}, &(0x7f00000001c0)=0xe5) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={r2, 0x71, "705c8e1a3cc74e563503ed61e5d50e517095aea4a20014c5801c57c2ffdc016efb3fadea62d3f679c2a129a1162b3046cf47500f7365b7cc339a8a00940d67d271f33c01f62fd2a91d086e04edd6d96a3fc93a826c333e802bf1ee76d0dba8d3d42b32a01bbb3c208b8eaea8b94a265077"}, &(0x7f0000000280)=0x79) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:16:42 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500000aed0000000000"], 0x14}}, 0x0) 03:16:42 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:42 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x7, 0x100, 0x40}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000140)={r2, 0x2e, "f9b90e405dd23128a5c2b4ad0d06ad7f398f1256d9b60fe6445701650f4d354b362aa72c0bf8ec85b29b7f0b80e3"}, &(0x7f0000000180)=0x36) [ 805.904806][ T2326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:16:52 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180), 0x1) 03:16:52 executing program 5: arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) socket$inet_tcp(0x2, 0x1, 0x0) 03:16:52 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215fffffff00000000000"], 0x14}}, 0x0) 03:16:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000004e03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:16:52 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a24539729", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x4c, 0x10}) 03:16:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000004f03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:16:52 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:52 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = msgget(0x3, 0x100000000042) msgrcv(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000573183df2b351c89000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f8ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fbc00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008882a76d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000757b7c552067349cee00"/4114], 0x1008, 0x0, 0x2000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x0, "c9d07d9c712231a0"}) 03:16:52 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x7) 03:16:52 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:16:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500f0ffff0000000000"], 0x14}}, 0x0) [ 816.174806][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:02 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180), 0x1) 03:17:02 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000140)=0x165) 03:17:02 executing program 0: socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:17:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142157fffffff0000000000"], 0x14}}, 0x0) 03:17:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000005403000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:02 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x72, 0x10}) 03:17:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142159effffff0000000000"], 0x14}}, 0x0) 03:17:02 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001680)='/dev/mixer\x00', 0x80000, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001700)={'filter\x00', 0x7, 0x4, 0x5a0, 0x358, 0x0, 0x218, 0x4b8, 0x4b8, 0x4b8, 0x4, &(0x7f00000016c0), {[{{@uncond, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x83, 'system_u:object_r:bin_t:s0\x00'}}}, {{@arp={@multicast1, @broadcast, 0xff, 0xff0000ff, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, {[0x0, 0xff, 0xff, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xfffffffffffffffb, 0x9, 0x5, 0x6, 0x9, 0xf0, 'bond0\x00', 'ifb0\x00', {0xff}, {0xff}, 0x0, 0x1d1}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}}}, {{@uncond, 0xf0, 0x160}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0xb0, 0x4, 0xffffffff, 0x1, 0x0, "36a184f63b5d5d99226790cddf360cec33739b5ac22809f081305647716a12cfe33f7ecf27569d66ed49c3720ce06ebb4b83aa0959d7273b219a3b3abf20850a"}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5f0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001d00)={0x0, 0x7, 0x889, 0x1ff, 0x800, 0x43, 0x2, 0x200, {0x0, @in6={{0xa, 0x4e20, 0x7, @ipv4={[], [], @local}, 0xe4}}, 0x8, 0x3, 0x3, 0xdf2, 0x5}}, &(0x7f0000001dc0)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000001e00)={r2, 0xa159, 0xc7, "1ec991fc5bc16742b823f617165acd869a12a0c591ff0052c70318c01b4c8a1ea9895b5d1d8e0a453478a750c3c928b7a5d4f9dad2856e95f35d58a09b59ef247409fec482eadbf9dff8e52b5368a783e97072b920341ee8c91a5b8f43552b2a8d6c337b977b9b86e448ef6c26aafdedb8e5bdef6a343fb9e25bfe0d19a5fa4402b6acdd404dabdd9b6fca711babb69afef10caa25c7dd87c770400a3541567e0356ae2a8c83ad2617e89a58f5794f98b17449833e7a7371a488b46b87bac0fc9e0f20ce5b8f4d"}, 0xcf) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) sendmsg(r1, &(0x7f0000001640)={&(0x7f00000000c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc-aes-aesni\x00'}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000140)="8e8563118825cd43dca50fbcc5615ebe9e10e8ee5ce3396ed6f01f6ee53e29428d93b81600bbc5c91f15e484ab288a1e939e0ff2ff69357d408bd03befb553cdebb136fdb2a36b37355ac7e8f6dfb271281fce2eb55145fb4e078cd344f0f803d45473d1436e0017e1334d8c1850aa998dcaaa0853210ae02097223a93eb3d26d0df55f526ef83fe43714871f617c290d5b31a8fdc663e15486b9804c84f3e38d9c28572616c1a252911dbe235a7bce37f4e3dd51d0a01fc4846e84c961008a8eeaebf1497673284755c951a2a92c36732434db3cadd3ff40985356bb4b7293159a8f6ce", 0xe4}, {&(0x7f0000000300)="65783159da9a99ee7dc0e2a6209de7ab710dbc1b81f4bfa40b813212e1bcececdb1a5e3f60e6cf5f588a5039101e8fd24d7c6bb865957c714403f6124dfdaa1885a500974b7ade2baff42912c397e321014971446e6856d6866d51790d2d71810c60752552710474f1856af39454b853e084e5ca5a3d744680a2b10825f885cee26c71392d1ddcb3aedad5ee9cb7612c3fac746a17", 0x95}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000000240)="6a1d5e86d8b86fa4de4732bcd7e163f79977ab85ae4ab09ae0363020ab4933babc595380290189948153416e1cc908791e219b57c1b3ba0589fb878d54a2152a226fbd22caf69dce9a8463621faf9cdf0a4cd8d67f190fb16236a80e8203eb6b797bf362d3a899bd1ca330cd30b85434c2a8", 0x72}, {&(0x7f00000013c0)="2c3006935a9981a41a9bbac6d7038efd4203c13cb4ae371a1d3f19051429b926c60a0af2dbff1cc6ad23be9d68879db10ba5b8ba1a0dbff4c90611aceaa2ea06a4e062591e3c8f66eaf44911769275999971efe49c112340b9f311", 0x5b}, {&(0x7f0000001440)="01eedc5e9603e4b3cfb588ac144fd9121e49960c143f6da0ec76a24a0508dc33cbe0c4095f27fda5ff9660051af358694b74ea19267acb3e7c0cd0fa814298ddbfb75317e0cf55f389bc139af7852d33a1dba0e65c1d730fe8f8040b1609351057cebec33b097c891a02e0fe84281148ba67dd2fc4d21fa6a1801611ce1dbffdc21fadefd91d7ed1fe21aa853bc51d2d0594cca2f54444e9cd1dcbda758abd046daefd5de4cc97f3b9a2b3170614543000bfa627852d", 0xb6}, {&(0x7f0000000000)="667b909f5f2c42660cbef00475a471ecc3951345421abfdd794a8f48648fd4af9709121a9ff7a6508bbdc25cea921987ffb4644c2121abf143", 0x39}], 0x7, &(0x7f0000001580)=[{0xc0, 0xff, 0xa6e, "14e7d8c6a80d79d60238b774d805b11e6f401d38d9802cda147da60e5f3750ff8823dfe0fc33039d7433e4d878c7a91d122e9ebf1022faf531d4498cd77fe8f5f3ccc511a9fad8ce7849e3a2802a215a7709eacd005f300608086eb3adf8e667ae1dc7228dad13151ffdcc8e1ae9e34fa30fe28fcfcb432a8a164b443e72dddd9c436b7f1d918e20897ceb7b46d67a8f51cd21503ba8df84a21eb370a2dc4f4567822c74649516518697cfde3d2d6f38"}], 0xc0}, 0x8000) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001f00)=""/204) 03:17:03 executing program 0: socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:17:03 executing program 0: socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:17:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215f0ffffff0000000000"], 0x14}}, 0x0) 03:17:03 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x9}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) [ 826.406646][ T2397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:13 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180), 0x1) 03:17:13 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, 0x0, 0x0) 03:17:13 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:17:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000001000000"], 0x14}}, 0x0) 03:17:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000005503000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:13 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x72, 0x10}) 03:17:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000005603000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:13 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40180, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000000c0)=""/176) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 03:17:13 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, 0x0, 0x0) 03:17:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000003400000"], 0x14}}, 0x0) 03:17:13 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, 0x0, 0x0) [ 836.094133][ T2441] Unknown ioctl -2147203708 [ 836.109991][ T2442] Unknown ioctl -2147203708 03:17:13 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)={0x3ebda58f, 0x0, 0x3, 0xfffffffffffffffc}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) [ 836.636727][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:23 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x72, 0x10}) 03:17:23 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) recvfrom$inet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x23, 0x0, 0x0) 03:17:23 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x10040) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xa) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:17:23 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000180)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 03:17:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215fffffffffffff00000"], 0x14}}, 0x0) 03:17:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000005703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000005c03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:23 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000180)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 03:17:23 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom$inet(r0, &(0x7f00000000c0)=""/110, 0x6e, 0x21, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:17:23 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000180)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 03:17:23 executing program 3: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000100)='W', 0x1, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000180), 0x0) 03:17:23 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000140)=0xec) [ 846.913672][ T2464] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:24 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x85, 0x10}) 03:17:24 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 03:17:24 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000100)={0x7, "6e04f9af0eee87d42a26c29759464569939ade4f471b1f0d4274808a68c245a1"}) 03:17:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000100"], 0x14}}, 0x0) 03:17:24 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) fcntl$setflags(r0, 0x2, 0x1) geteuid() r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$NBD_DO_IT(r1, 0xab03) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f00000000c0)={0x2, r1}) 03:17:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000005d03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:24 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 03:17:24 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000100)=0x85) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@empty, @remote}, &(0x7f00000000c0)=0x8) 03:17:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000000)={0x18, 0x1, 0x8001}) 03:17:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000005e03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000200"], 0x14}}, 0x0) 03:17:24 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = semget(0x2, 0x0, 0x4) semtimedop(r1, &(0x7f0000000000)=[{0x3, 0x143b, 0x1800}, {0x1, 0x8, 0x1000}, {0x0, 0xfffffffffffffffe, 0xf3d5b98cd5c23d95}, {0x2, 0x9, 0x1800}, {0x1, 0x8, 0x1000}, {0x3, 0x7fff}], 0x6, &(0x7f00000000c0)={0x77359400}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x800, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f0000000140)=""/169) [ 847.755679][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:25 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x85, 0x10}) 03:17:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") setpriority(0x1, 0x0, 0x0) 03:17:25 executing program 5: socketpair(0xf, 0xa, 0x49f480000000000, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000000c0)={0x100, 0x7}, 0x2) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x0, 0xfffffffffffffffe, 0x0, 0x20000000}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f0000000180)={0x2, 0x401}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2, 0x0) 03:17:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000005f03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000300"], 0x14}}, 0x0) 03:17:25 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 03:17:25 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0x80, &(0x7f0000000640)}, 0x0) 03:17:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006103000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:25 executing program 3: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) open(&(0x7f0000002880)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x2001, 0x0) 03:17:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) read(r0, &(0x7f0000000300)=""/4096, 0x1f1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:17:25 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0x80, &(0x7f0000000640)}, 0x0) 03:17:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000400"], 0x14}}, 0x0) [ 848.553936][ T2548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:25 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x85, 0x10}) 03:17:25 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0x80, &(0x7f0000000640)}, 0x0) 03:17:25 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xffff, 0x8000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x7f}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={r2, 0xe177, 0xffff}, 0x10) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:17:25 executing program 3: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a24539729", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x4c, 0x10}) 03:17:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000a00"], 0x14}}, 0x0) 03:17:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006203000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:26 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000180)}, 0x0) 03:17:26 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x4000, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e24, @multicast2}, 0x214, 0x0, 0x0, 0x0, 0x5b15d4e3, 0x0, 0x1, 0x3f, 0x1}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x3dec, 0x0) 03:17:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006303000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000e00"], 0x14}}, 0x0) 03:17:26 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000180)}, 0x0) 03:17:26 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') getsockopt$packet_buf(r0, 0x107, 0x5, &(0x7f00000000c0)=""/41, &(0x7f0000000100)=0x29) r1 = socket$inet_tcp(0x2, 0x1, 0x0) utime(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0xfffffffffffffff8, 0x5}) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={0x0, 0x6}, &(0x7f0000000240)=0x8) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000300)='scalable\x00', 0x9) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={r2, 0x6}, 0x8) [ 849.643790][ T2586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:26 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x8e, 0x10}) 03:17:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000003f00"], 0x14}}, 0x0) 03:17:26 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000180)}, 0x0) 03:17:26 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2500, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f00000000c0)=0x1) 03:17:26 executing program 3: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a24539729", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x4c, 0x10}) 03:17:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006403000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:27 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x0, 0x7}], 0x20}, 0x0) 03:17:27 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1000, 0x80400) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000000c0)={0xf, 0x2, 0x4, 0x800, 0xffffffffffffff9c}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000100)={0x70002010}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:17:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006503000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:27 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x0, 0x7}], 0x20}, 0x0) 03:17:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000004000"], 0x14}}, 0x0) 03:17:27 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x200) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000000)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f0000000180)={0x9, 0x4, 0x4}) [ 849.992616][ T2610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 850.585461][ T2624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:27 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x8e, 0x10}) 03:17:27 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x0, 0x7}], 0x20}, 0x0) 03:17:27 executing program 3: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a24539729", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x4c, 0x10}) 03:17:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000006000"], 0x14}}, 0x0) 03:17:27 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x4e22, @multicast2}, {0x306, @remote}, 0x6, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'rose0\x00'}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:17:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006603000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:28 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='vboxnet1eth0GPL!\x00'}, 0x30) capset(&(0x7f0000000100)={0x20080522, r1}, &(0x7f0000000140)={0x40, 0x1, 0x81, 0x2, 0x1, 0x7}) r2 = add_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='5', 0x1, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='syzkaller\x00', &(0x7f0000000340)=@chain={'key_or_keyring:', r3, ':chain\x00'}) 03:17:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500000000ffffff9e00"], 0x14}}, 0x0) 03:17:28 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84}], 0x20}, 0x0) 03:17:28 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x100, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0)={0xc96, 0x5, 0x971, 0x5c, 0x10000, 0x10001, 0x8d, 0x0, 0x8, 0xfff, 0x40}, 0xb) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:17:28 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84}], 0x20}, 0x0) 03:17:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000000000000ec000"], 0x14}}, 0x0) [ 851.564251][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:29 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x8e, 0x10}) 03:17:29 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000180)=0xffffffffffffffbf) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f00000000c0)) fchmodat(r0, &(0x7f0000000280)='./file0\x00', 0x100) 03:17:29 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84}], 0x20}, 0x0) 03:17:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000000000000aed00"], 0x14}}, 0x0) 03:17:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:29 executing program 3: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a24539729", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x4c, 0x10}) [ 851.713544][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006903000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:29 executing program 5: capset(&(0x7f0000000040)={0x1998032d}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) setsockopt$inet_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000300)="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", 0x1000) 03:17:29 executing program 0: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440), &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x0, 0x10}) 03:17:29 executing program 5: capset(&(0x7f0000000040)={0x1019980330}, &(0x7f0000000080)={0x0, 0x3, 0x7fffffff, 0xfffffffffffffffc}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:17:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500000000fffffff000"], 0x14}}, 0x0) 03:17:29 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x9, 0x0) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000380)={{&(0x7f0000000300)=""/92, 0x5c}, &(0x7f0000000280), 0x10}, 0x20) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x28000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r3, 0x308, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x94}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40804) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f00000000c0)={0x40000000, 0xffffffff, 0x3d}) [ 852.814371][ T2801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 852.823406][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:30 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x93, 0x10}) 03:17:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000007fffffff00"], 0x14}}, 0x0) 03:17:30 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x9, 0x0, 0x200, 0x100, 0xffff}, 0x14) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x800, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000100)=0x2a) 03:17:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006a03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:30 executing program 3: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a24539729", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x4c, 0x10}) 03:17:30 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x3, 0x1) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x2000, 0x0) write$binfmt_misc(r0, &(0x7f0000000300)={'syz0', "315751d79f921a00e62499894d896b55ddb95917803ce8e4ca393b9827d26bafac7b9a09c93895d04450ec2211277c68cc39ab8bd7a016efefd184b9909ed835937a308d1b83994891f91eed8e6baaa0a58736b32adf5c83af03490e3282e0d01f5beee07c83e0e05960e25ed546eee7c56fe5a27bb1380efae0e341f6ba9d32f55b14178983d8b225174e8043d787e44ebd5f94a693addf7a2d338098bf01e99ed98eccb116386ec749633a04ec96c9430689a2bb417adb809ca595be690b599911"}, 0xc6) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000400)) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) io_uring_register$IORING_UNREGISTER_BUFFERS(r2, 0x1, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000002c0)=0xfd80) 03:17:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500000000ffffffff00"], 0x14}}, 0x0) 03:17:30 executing program 5: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, 0x0, &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x0, 0x10}) 03:17:30 executing program 0: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440), &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x0, 0x10}) 03:17:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500f0ffffffffffff00"], 0x14}}, 0x0) 03:17:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000200000000000000"], 0x14}}, 0x0) 03:17:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000300000000000000"], 0x14}}, 0x0) 03:17:31 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x93, 0x10}) [ 853.900286][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000400000000000000"], 0x14}}, 0x0) 03:17:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000a00000000000000"], 0x14}}, 0x0) [ 854.226458][ T2842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006b03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 854.275054][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:31 executing program 3: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, 0x0, &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x0, 0x10}) 03:17:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000e00000000000000"], 0x14}}, 0x0) 03:17:31 executing program 0: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440), &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x0, 0x10}) 03:17:31 executing program 5 (fault-call:2 fault-nth:0): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:17:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215006000000000000000"], 0x14}}, 0x0) 03:17:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500f000000000000000"], 0x14}}, 0x0) [ 854.779100][ T2891] FAULT_INJECTION: forcing a failure. [ 854.779100][ T2891] name failslab, interval 1, probability 0, space 0, times 0 [ 854.829914][ T2891] CPU: 1 PID: 2891 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 854.837593][ T2891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.847653][ T2891] Call Trace: [ 854.850963][ T2891] dump_stack+0x172/0x1f0 [ 854.855308][ T2891] should_fail.cold+0xa/0x15 [ 854.859921][ T2891] ? fault_create_debugfs_attr+0x180/0x180 [ 854.865748][ T2891] ? ___might_sleep+0x163/0x280 [ 854.870630][ T2891] __should_failslab+0x121/0x190 [ 854.875583][ T2891] should_failslab+0x9/0x14 [ 854.880136][ T2891] __kmalloc+0x2e0/0x770 [ 854.884395][ T2891] ? find_held_lock+0x35/0x130 [ 854.889172][ T2891] ? __might_fault+0x12b/0x1e0 [ 854.893949][ T2891] ? rw_copy_check_uvector+0x31a/0x390 [ 854.899432][ T2891] rw_copy_check_uvector+0x31a/0x390 [ 854.904734][ T2891] ? lock_downgrade+0x920/0x920 [ 854.909612][ T2891] import_iovec+0xbf/0x200 [ 854.914093][ T2891] ? dup_iter+0x250/0x250 [ 854.918426][ T2891] ? _copy_from_user+0x12c/0x1a0 [ 854.923376][ T2891] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 854.929639][ T2891] copy_msghdr_from_user+0x2ce/0x440 [ 854.934951][ T2891] ? move_addr_to_kernel.part.0+0x110/0x110 [ 854.940897][ T2891] ? __fget+0x35d/0x560 [ 854.945067][ T2891] ___sys_sendmsg+0x10b/0x920 [ 854.949763][ T2891] ? copy_msghdr_from_user+0x440/0x440 [ 854.955253][ T2891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 854.961514][ T2891] ? __kasan_check_read+0x11/0x20 [ 854.966550][ T2891] ? __fget+0x384/0x560 [ 854.970745][ T2891] ? __fget_light+0x1a9/0x230 [ 854.975432][ T2891] ? __fdget+0x1b/0x20 [ 854.979509][ T2891] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 854.985773][ T2891] __sys_sendmsg+0x105/0x1d0 [ 854.990381][ T2891] ? __sys_sendmsg_sock+0xd0/0xd0 [ 854.995426][ T2891] ? ksys_write+0x1cf/0x290 [ 854.999949][ T2891] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 855.005422][ T2891] ? do_syscall_64+0x26/0x6a0 [ 855.010105][ T2891] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 855.016189][ T2891] ? do_syscall_64+0x26/0x6a0 [ 855.020883][ T2891] __x64_sys_sendmsg+0x78/0xb0 [ 855.025663][ T2891] do_syscall_64+0xfd/0x6a0 [ 855.030182][ T2891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 855.036081][ T2891] RIP: 0033:0x459819 [ 855.039984][ T2891] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 855.059596][ T2891] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 855.068023][ T2891] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 855.076005][ T2891] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 855.083983][ T2891] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 855.091956][ T2891] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 855.099935][ T2891] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 [ 855.114333][ T2868] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:32 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x93, 0x10}) 03:17:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000003000000000000"], 0x14}}, 0x0) 03:17:32 executing program 5 (fault-call:2 fault-nth:1): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 855.335489][ T2903] FAULT_INJECTION: forcing a failure. [ 855.335489][ T2903] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 855.348747][ T2903] CPU: 0 PID: 2903 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 855.356306][ T2903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.366377][ T2903] Call Trace: [ 855.369687][ T2903] dump_stack+0x172/0x1f0 [ 855.374035][ T2903] should_fail.cold+0xa/0x15 [ 855.378644][ T2903] ? fault_create_debugfs_attr+0x180/0x180 [ 855.384460][ T2903] ? __kasan_check_read+0x11/0x20 [ 855.389490][ T2903] ? __lock_acquire+0x1702/0x4c30 [ 855.394626][ T2903] ? __down_timeout+0x2d0/0x2d0 [ 855.399492][ T2903] should_fail_alloc_page+0x50/0x60 [ 855.404699][ T2903] __alloc_pages_nodemask+0x1a1/0x8f0 [ 855.410087][ T2903] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 855.415734][ T2903] ? __alloc_pages_slowpath+0x2520/0x2520 [ 855.421463][ T2903] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 855.427106][ T2903] ? fault_create_debugfs_attr+0x180/0x180 03:17:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500000a000000000000"], 0x14}}, 0x0) [ 855.432927][ T2903] cache_grow_begin+0x90/0xd20 [ 855.437702][ T2903] ? rw_copy_check_uvector+0x31a/0x390 [ 855.443167][ T2903] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 855.449424][ T2903] __kmalloc+0x6b2/0x770 [ 855.453678][ T2903] ? find_held_lock+0x35/0x130 [ 855.458456][ T2903] ? rw_copy_check_uvector+0x31a/0x390 [ 855.463928][ T2903] rw_copy_check_uvector+0x31a/0x390 [ 855.469220][ T2903] ? lock_downgrade+0x920/0x920 [ 855.474091][ T2903] import_iovec+0xbf/0x200 [ 855.478518][ T2903] ? dup_iter+0x250/0x250 [ 855.482851][ T2903] ? _copy_from_user+0x12c/0x1a0 [ 855.487822][ T2903] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 855.494085][ T2903] copy_msghdr_from_user+0x2ce/0x440 [ 855.499564][ T2903] ? move_addr_to_kernel.part.0+0x110/0x110 [ 855.505483][ T2903] ? __fget+0x35d/0x560 [ 855.509670][ T2903] ___sys_sendmsg+0x10b/0x920 [ 855.514366][ T2903] ? copy_msghdr_from_user+0x440/0x440 [ 855.519838][ T2903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 855.526091][ T2903] ? __kasan_check_read+0x11/0x20 [ 855.531132][ T2903] ? __fget+0x384/0x560 [ 855.535340][ T2903] ? __fget_light+0x1a9/0x230 [ 855.540033][ T2903] ? __fdget+0x1b/0x20 [ 855.544111][ T2903] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 855.550367][ T2903] __sys_sendmsg+0x105/0x1d0 [ 855.554969][ T2903] ? __sys_sendmsg_sock+0xd0/0xd0 [ 855.560004][ T2903] ? ksys_write+0x1cf/0x290 [ 855.564520][ T2903] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 855.569983][ T2903] ? do_syscall_64+0x26/0x6a0 [ 855.574663][ T2903] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 855.580733][ T2903] ? do_syscall_64+0x26/0x6a0 [ 855.585428][ T2903] __x64_sys_sendmsg+0x78/0xb0 [ 855.590209][ T2903] do_syscall_64+0xfd/0x6a0 [ 855.600289][ T2903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 855.606184][ T2903] RIP: 0033:0x459819 [ 855.610082][ T2903] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:17:32 executing program 3: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, 0x0, &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x0, 0x10}) [ 855.629697][ T2903] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 855.638128][ T2903] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 855.646114][ T2903] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 855.654097][ T2903] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 855.662077][ T2903] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 855.670059][ T2903] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:17:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006c03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500ed0a000000000000"], 0x14}}, 0x0) [ 855.824527][ T2884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:33 executing program 0: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x93, 0x10}) 03:17:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500000e000000000000"], 0x14}}, 0x0) 03:17:33 executing program 5 (fault-call:2 fault-nth:2): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 856.149837][ T2921] FAULT_INJECTION: forcing a failure. [ 856.149837][ T2921] name failslab, interval 1, probability 0, space 0, times 0 [ 856.162957][ T2921] CPU: 0 PID: 2921 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 856.170510][ T2921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 856.180573][ T2921] Call Trace: [ 856.183880][ T2921] dump_stack+0x172/0x1f0 [ 856.188221][ T2921] should_fail.cold+0xa/0x15 [ 856.192822][ T2921] ? fault_create_debugfs_attr+0x180/0x180 03:17:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500c00e000000000000"], 0x14}}, 0x0) [ 856.198632][ T2921] ? mark_held_locks+0xf0/0xf0 [ 856.203402][ T2921] ? mark_held_locks+0xa4/0xf0 [ 856.208174][ T2921] __should_failslab+0x121/0x190 [ 856.213118][ T2921] should_failslab+0x9/0x14 [ 856.217622][ T2921] kmem_cache_alloc+0x47/0x710 [ 856.222403][ T2921] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 856.228135][ T2921] sctp_get_port_local+0x44d/0x16d0 [ 856.233341][ T2921] ? __kasan_check_read+0x11/0x20 [ 856.238385][ T2921] ? sctp_wait_for_connect+0x580/0x580 [ 856.243866][ T2921] ? mark_held_locks+0xa4/0xf0 [ 856.248642][ T2921] sctp_get_port+0xf8/0x170 [ 856.253159][ T2921] ? sctp_setsockopt_bindx+0x3b0/0x3b0 [ 856.258634][ T2921] ? __local_bh_enable_ip+0x15a/0x270 [ 856.264026][ T2921] inet_autobind+0xb9/0x1a0 [ 856.268547][ T2921] inet_send_prepare+0x389/0x4f0 [ 856.273489][ T2921] inet_sendmsg+0x44/0xe0 [ 856.277825][ T2921] ? inet_send_prepare+0x4f0/0x4f0 [ 856.282941][ T2921] sock_sendmsg+0xd7/0x130 [ 856.287363][ T2921] ___sys_sendmsg+0x803/0x920 [ 856.292049][ T2921] ? copy_msghdr_from_user+0x440/0x440 03:17:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500003f000000000000"], 0x14}}, 0x0) [ 856.297517][ T2921] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 856.303764][ T2921] ? __kasan_check_read+0x11/0x20 [ 856.308807][ T2921] ? __fget+0x384/0x560 [ 856.312985][ T2921] ? __fget_light+0x1a9/0x230 [ 856.317684][ T2921] ? __fdget+0x1b/0x20 [ 856.321762][ T2921] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 856.328019][ T2921] __sys_sendmsg+0x105/0x1d0 [ 856.332622][ T2921] ? __sys_sendmsg_sock+0xd0/0xd0 [ 856.337669][ T2921] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 856.343137][ T2921] ? do_syscall_64+0x26/0x6a0 [ 856.347826][ T2921] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 856.353907][ T2921] ? do_syscall_64+0x26/0x6a0 [ 856.358599][ T2921] __x64_sys_sendmsg+0x78/0xb0 [ 856.363368][ T2921] do_syscall_64+0xfd/0x6a0 [ 856.367883][ T2921] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 856.373790][ T2921] RIP: 0033:0x459819 [ 856.377691][ T2921] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 856.397322][ T2921] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 856.405750][ T2921] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 856.413741][ T2921] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 856.421729][ T2921] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 856.429726][ T2921] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 856.437724][ T2921] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:17:33 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da99", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x95, 0x10}) 03:17:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000040000000000000"], 0x14}}, 0x0) 03:17:33 executing program 5 (fault-call:2 fault-nth:3): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 856.522183][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 856.546442][ T2909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:33 executing program 3 (fault-call:2 fault-nth:0): r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) [ 856.664441][ T2931] FAULT_INJECTION: forcing a failure. [ 856.664441][ T2931] name failslab, interval 1, probability 0, space 0, times 0 [ 856.716696][ T2931] CPU: 0 PID: 2931 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 856.724299][ T2931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 856.734368][ T2931] Call Trace: [ 856.737675][ T2931] dump_stack+0x172/0x1f0 [ 856.737704][ T2931] should_fail.cold+0xa/0x15 [ 856.737728][ T2931] ? fault_create_debugfs_attr+0x180/0x180 [ 856.737755][ T2931] ? ___might_sleep+0x163/0x280 [ 856.737796][ T2931] __should_failslab+0x121/0x190 [ 856.737819][ T2931] should_failslab+0x9/0x14 [ 856.746962][ T2931] kmem_cache_alloc_trace+0x2d3/0x790 [ 856.746984][ T2931] ? sctp_autobind+0x168/0x1e0 [ 856.746999][ T2931] ? __kasan_check_read+0x11/0x20 [ 856.747022][ T2931] sctp_association_new+0x93/0x1f80 [ 856.747040][ T2931] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 856.747055][ T2931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 856.747080][ T2931] sctp_sendmsg_new_asoc+0x397/0xfd0 [ 856.747098][ T2931] ? mark_held_locks+0xa4/0xf0 [ 856.762912][ T2931] ? sctp_autobind+0x1e0/0x1e0 [ 856.762931][ T2931] ? lockdep_hardirqs_on+0x418/0x5d0 [ 856.762947][ T2931] ? lock_sock_nested+0x9a/0x120 [ 856.762965][ T2931] ? trace_hardirqs_on+0x67/0x240 [ 856.762981][ T2931] ? lock_sock_nested+0x9a/0x120 [ 856.762997][ T2931] ? __local_bh_enable_ip+0x15a/0x270 [ 856.763016][ T2931] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 856.763032][ T2931] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 856.763050][ T2931] sctp_sendmsg+0x125a/0x17d0 [ 856.763074][ T2931] ? sctp_id2assoc+0x2c0/0x2c0 [ 856.763088][ T2931] ? release_sock+0x156/0x1c0 [ 856.763112][ T2931] ? release_sock+0x156/0x1c0 [ 856.772982][ T2931] ? __local_bh_enable_ip+0x15a/0x270 [ 856.773010][ T2931] ? inet_autobind+0x144/0x1a0 [ 856.773030][ T2931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 856.773050][ T2931] inet_sendmsg+0x9e/0xe0 [ 856.773065][ T2931] ? inet_send_prepare+0x4f0/0x4f0 [ 856.773080][ T2931] sock_sendmsg+0xd7/0x130 [ 856.773097][ T2931] ___sys_sendmsg+0x803/0x920 [ 856.773115][ T2931] ? copy_msghdr_from_user+0x440/0x440 [ 856.773135][ T2931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 856.773153][ T2931] ? __kasan_check_read+0x11/0x20 [ 856.773173][ T2931] ? __fget+0x384/0x560 [ 856.773207][ T2931] ? __fget_light+0x1a9/0x230 [ 856.773222][ T2931] ? __fdget+0x1b/0x20 [ 856.773245][ T2931] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 856.788214][ T2931] __sys_sendmsg+0x105/0x1d0 [ 856.788245][ T2931] ? __sys_sendmsg_sock+0xd0/0xd0 [ 856.788273][ T2931] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 856.957886][ T2931] ? do_syscall_64+0x26/0x6a0 [ 856.962579][ T2931] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 856.968681][ T2931] ? do_syscall_64+0x26/0x6a0 [ 856.973375][ T2931] __x64_sys_sendmsg+0x78/0xb0 [ 856.978157][ T2931] do_syscall_64+0xfd/0x6a0 [ 856.982678][ T2931] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 856.988587][ T2931] RIP: 0033:0x459819 [ 856.992489][ T2931] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 857.012109][ T2931] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 857.020588][ T2931] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 857.028576][ T2931] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 857.036561][ T2931] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 857.044566][ T2931] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 857.052568][ T2931] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:17:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000060000000000000"], 0x14}}, 0x0) [ 857.069935][ T2939] FAULT_INJECTION: forcing a failure. [ 857.069935][ T2939] name failslab, interval 1, probability 0, space 0, times 0 [ 857.130131][ T2939] CPU: 0 PID: 2939 Comm: syz-executor.3 Not tainted 5.2.0+ #90 [ 857.137726][ T2939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 857.147810][ T2939] Call Trace: [ 857.151122][ T2939] dump_stack+0x172/0x1f0 [ 857.155472][ T2939] should_fail.cold+0xa/0x15 [ 857.160079][ T2939] ? fault_create_debugfs_attr+0x180/0x180 [ 857.165904][ T2939] ? ___might_sleep+0x163/0x280 [ 857.170788][ T2939] __should_failslab+0x121/0x190 [ 857.175747][ T2939] should_failslab+0x9/0x14 [ 857.180276][ T2939] kmem_cache_alloc_node+0x268/0x740 [ 857.185585][ T2939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 857.191861][ T2939] __alloc_skb+0xd5/0x5e0 [ 857.196215][ T2939] ? netdev_alloc_frag+0x1b0/0x1b0 [ 857.201420][ T2939] vhci_write+0xc4/0x470 [ 857.205675][ T2939] new_sync_write+0x4d3/0x770 [ 857.210476][ T2939] ? new_sync_read+0x800/0x800 [ 857.215232][ T2939] ? common_file_perm+0x238/0x720 [ 857.220245][ T2939] ? __fget+0x384/0x560 [ 857.224404][ T2939] ? apparmor_file_permission+0x25/0x30 [ 857.229973][ T2939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 857.236238][ T2939] ? security_file_permission+0x8f/0x380 [ 857.241888][ T2939] __vfs_write+0xe1/0x110 [ 857.246241][ T2939] vfs_write+0x268/0x5d0 [ 857.250498][ T2939] ksys_write+0x14f/0x290 [ 857.254844][ T2939] ? __ia32_sys_read+0xb0/0xb0 [ 857.259619][ T2939] ? do_syscall_64+0x26/0x6a0 [ 857.264300][ T2939] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 857.270375][ T2939] ? do_syscall_64+0x26/0x6a0 [ 857.275071][ T2939] __x64_sys_write+0x73/0xb0 [ 857.279678][ T2939] do_syscall_64+0xfd/0x6a0 [ 857.284201][ T2939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 857.290106][ T2939] RIP: 0033:0x459819 [ 857.294022][ T2939] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 857.313629][ T2939] RSP: 002b:00007fcc5e365c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 857.322047][ T2939] RAX: ffffffffffffffda RBX: 00007fcc5e365c90 RCX: 0000000000459819 [ 857.330030][ T2939] RDX: 0000000000000002 RSI: 0000000020000180 RDI: 0000000000000003 [ 857.337996][ T2939] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 857.346073][ T2939] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcc5e3666d4 [ 857.354037][ T2939] R13: 00000000004c9985 R14: 00000000004e0e40 R15: 0000000000000004 [ 857.444494][ T2919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006d03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:34 executing program 5 (fault-call:2 fault-nth:4): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 857.537653][ T2946] FAULT_INJECTION: forcing a failure. [ 857.537653][ T2946] name failslab, interval 1, probability 0, space 0, times 0 [ 857.550537][ T2946] CPU: 1 PID: 2946 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 857.558122][ T2946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 857.568419][ T2946] Call Trace: [ 857.571732][ T2946] dump_stack+0x172/0x1f0 [ 857.576083][ T2946] should_fail.cold+0xa/0x15 [ 857.580696][ T2946] ? fault_create_debugfs_attr+0x180/0x180 [ 857.586523][ T2946] ? ___might_sleep+0x163/0x280 [ 857.591489][ T2946] __should_failslab+0x121/0x190 [ 857.601047][ T2946] should_failslab+0x9/0x14 [ 857.605578][ T2946] kmem_cache_alloc_trace+0x2d3/0x790 [ 857.610975][ T2946] ? sctp_autobind+0x168/0x1e0 [ 857.615748][ T2946] ? __kasan_check_read+0x11/0x20 [ 857.620795][ T2946] sctp_association_new+0x93/0x1f80 [ 857.626112][ T2946] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 857.632022][ T2946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 857.638825][ T2946] sctp_sendmsg_new_asoc+0x397/0xfd0 [ 857.644134][ T2946] ? mark_held_locks+0xa4/0xf0 [ 857.648951][ T2946] ? sctp_autobind+0x1e0/0x1e0 [ 857.653730][ T2946] ? lockdep_hardirqs_on+0x418/0x5d0 [ 857.659059][ T2946] ? lock_sock_nested+0x9a/0x120 [ 857.664050][ T2946] ? trace_hardirqs_on+0x67/0x240 [ 857.664841][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 857.669089][ T2946] ? lock_sock_nested+0x9a/0x120 [ 857.669109][ T2946] ? __local_bh_enable_ip+0x15a/0x270 [ 857.669129][ T2946] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 857.669146][ T2946] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 857.669170][ T2946] sctp_sendmsg+0x125a/0x17d0 [ 857.703480][ T2946] ? sctp_id2assoc+0x2c0/0x2c0 [ 857.708262][ T2946] ? release_sock+0x156/0x1c0 [ 857.712964][ T2946] ? release_sock+0x156/0x1c0 [ 857.718065][ T2946] ? __local_bh_enable_ip+0x15a/0x270 [ 857.723456][ T2946] ? inet_autobind+0x144/0x1a0 [ 857.728266][ T2946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 857.734651][ T2946] inet_sendmsg+0x9e/0xe0 [ 857.739446][ T2946] ? inet_send_prepare+0x4f0/0x4f0 [ 857.744577][ T2946] sock_sendmsg+0xd7/0x130 [ 857.749009][ T2946] ___sys_sendmsg+0x803/0x920 [ 857.754666][ T2946] ? copy_msghdr_from_user+0x440/0x440 [ 857.760148][ T2946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 857.766406][ T2946] ? __kasan_check_read+0x11/0x20 [ 857.771651][ T2946] ? __fget+0x384/0x560 [ 857.775833][ T2946] ? __fget_light+0x1a9/0x230 [ 857.780664][ T2946] ? __fdget+0x1b/0x20 [ 857.784742][ T2946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 857.790979][ T2946] __sys_sendmsg+0x105/0x1d0 [ 857.795718][ T2946] ? __sys_sendmsg_sock+0xd0/0xd0 [ 857.800775][ T2946] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 857.806307][ T2946] ? do_syscall_64+0x26/0x6a0 [ 857.806322][ T2946] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 857.806335][ T2946] ? do_syscall_64+0x26/0x6a0 [ 857.806363][ T2946] __x64_sys_sendmsg+0x78/0xb0 [ 857.826532][ T2946] do_syscall_64+0xfd/0x6a0 [ 857.831055][ T2946] entry_SYSCALL_64_after_hwframe+0x49/0xbe 03:17:35 executing program 0: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x93, 0x10}) 03:17:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000ec0000000000000"], 0x14}}, 0x0) 03:17:35 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da99", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x95, 0x10}) 03:17:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006e03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 857.837403][ T2946] RIP: 0033:0x459819 [ 857.841311][ T2946] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 857.861800][ T2946] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 857.870864][ T2946] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 857.879211][ T2946] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 857.887195][ T2946] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 857.895177][ T2946] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 857.903498][ T2946] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:17:35 executing program 5 (fault-call:2 fault-nth:5): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:17:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000aed000000000000"], 0x14}}, 0x0) [ 858.127111][ T2966] FAULT_INJECTION: forcing a failure. [ 858.127111][ T2966] name failslab, interval 1, probability 0, space 0, times 0 [ 858.156544][ T2966] CPU: 0 PID: 2966 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 858.164143][ T2966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.174221][ T2966] Call Trace: [ 858.177534][ T2966] dump_stack+0x172/0x1f0 [ 858.181887][ T2966] should_fail.cold+0xa/0x15 [ 858.186506][ T2966] ? fault_create_debugfs_attr+0x180/0x180 [ 858.192342][ T2966] ? ___might_sleep+0x163/0x280 [ 858.197231][ T2966] __should_failslab+0x121/0x190 [ 858.202190][ T2966] should_failslab+0x9/0x14 [ 858.206708][ T2966] kmem_cache_alloc_trace+0x2d3/0x790 [ 858.212096][ T2966] ? __genradix_ptr_alloc+0x236/0x3a0 [ 858.217491][ T2966] sctp_auth_shkey_create+0x87/0x1b0 [ 858.222800][ T2966] sctp_auth_asoc_copy_shkeys+0x1fb/0x2c0 [ 858.228623][ T2966] sctp_association_new+0x1605/0x1f80 [ 858.234039][ T2966] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 858.239960][ T2966] sctp_sendmsg_new_asoc+0x397/0xfd0 [ 858.245275][ T2966] ? mark_held_locks+0xa4/0xf0 [ 858.250061][ T2966] ? sctp_autobind+0x1e0/0x1e0 [ 858.254838][ T2966] ? lockdep_hardirqs_on+0x418/0x5d0 [ 858.260137][ T2966] ? lock_sock_nested+0x9a/0x120 [ 858.265085][ T2966] ? trace_hardirqs_on+0x67/0x240 [ 858.270382][ T2966] ? lock_sock_nested+0x9a/0x120 [ 858.275332][ T2966] ? __local_bh_enable_ip+0x15a/0x270 [ 858.280741][ T2966] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 858.287001][ T2966] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 858.292907][ T2966] sctp_sendmsg+0x125a/0x17d0 [ 858.297604][ T2966] ? sctp_id2assoc+0x2c0/0x2c0 [ 858.302376][ T2966] ? release_sock+0x156/0x1c0 [ 858.307068][ T2966] ? release_sock+0x156/0x1c0 [ 858.311757][ T2966] ? __local_bh_enable_ip+0x15a/0x270 [ 858.317154][ T2966] ? inet_autobind+0x144/0x1a0 [ 858.321927][ T2966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 858.328362][ T2966] inet_sendmsg+0x9e/0xe0 [ 858.332710][ T2966] ? inet_send_prepare+0x4f0/0x4f0 [ 858.337836][ T2966] sock_sendmsg+0xd7/0x130 [ 858.342297][ T2966] ___sys_sendmsg+0x803/0x920 [ 858.346994][ T2966] ? copy_msghdr_from_user+0x440/0x440 [ 858.352474][ T2966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 858.358735][ T2966] ? __kasan_check_read+0x11/0x20 [ 858.363792][ T2966] ? __fget+0x384/0x560 [ 858.367981][ T2966] ? __fget_light+0x1a9/0x230 [ 858.372673][ T2966] ? __fdget+0x1b/0x20 [ 858.376770][ T2966] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 858.383039][ T2966] __sys_sendmsg+0x105/0x1d0 [ 858.387648][ T2966] ? __sys_sendmsg_sock+0xd0/0xd0 [ 858.392704][ T2966] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 858.398180][ T2966] ? do_syscall_64+0x26/0x6a0 [ 858.402869][ T2966] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 858.408945][ T2966] ? do_syscall_64+0x26/0x6a0 [ 858.413648][ T2966] __x64_sys_sendmsg+0x78/0xb0 [ 858.418431][ T2966] do_syscall_64+0xfd/0x6a0 [ 858.422956][ T2966] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 858.428861][ T2966] RIP: 0033:0x459819 [ 858.432769][ T2966] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 858.452394][ T2966] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 858.460827][ T2966] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 858.468812][ T2966] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 858.476813][ T2966] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 858.484822][ T2966] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 858.492815][ T2966] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:17:35 executing program 5 (fault-call:2 fault-nth:6): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:17:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000f0000000000000"], 0x14}}, 0x0) [ 858.738631][ T2973] FAULT_INJECTION: forcing a failure. [ 858.738631][ T2973] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 858.760237][ T2973] CPU: 0 PID: 2973 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 858.767835][ T2973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.777900][ T2973] Call Trace: [ 858.781211][ T2973] dump_stack+0x172/0x1f0 [ 858.785564][ T2973] should_fail.cold+0xa/0x15 [ 858.790170][ T2973] ? fault_create_debugfs_attr+0x180/0x180 [ 858.795992][ T2973] ? ___might_sleep+0x163/0x280 [ 858.800869][ T2973] should_fail_alloc_page+0x50/0x60 [ 858.806087][ T2973] __alloc_pages_nodemask+0x1a1/0x8f0 [ 858.811475][ T2973] ? __alloc_pages_slowpath+0x2520/0x2520 [ 858.817201][ T2973] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 858.823012][ T2973] ? __debug_object_init+0x186/0xee0 [ 858.828310][ T2973] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 858.834131][ T2973] ? trace_hardirqs_on+0x67/0x240 [ 858.839170][ T2973] ? __kasan_check_read+0x11/0x20 [ 858.844211][ T2973] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 858.850471][ T2973] alloc_pages_current+0x107/0x210 [ 858.855604][ T2973] __get_free_pages+0xc/0x40 [ 858.860203][ T2973] __genradix_ptr_alloc+0x15c/0x3a0 [ 858.865417][ T2973] __genradix_prealloc+0x5b/0x80 [ 858.870374][ T2973] sctp_stream_alloc_out.part.0+0x57/0xb0 [ 858.876135][ T2973] sctp_stream_init+0x27d/0x3d0 [ 858.881010][ T2973] sctp_association_new+0x11c3/0x1f80 [ 858.886395][ T2973] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 858.892316][ T2973] sctp_sendmsg_new_asoc+0x397/0xfd0 [ 858.897614][ T2973] ? mark_held_locks+0xa4/0xf0 [ 858.902390][ T2973] ? sctp_autobind+0x1e0/0x1e0 [ 858.907169][ T2973] ? lockdep_hardirqs_on+0x418/0x5d0 [ 858.912464][ T2973] ? lock_sock_nested+0x9a/0x120 [ 858.917411][ T2973] ? trace_hardirqs_on+0x67/0x240 [ 858.922446][ T2973] ? lock_sock_nested+0x9a/0x120 [ 858.927396][ T2973] ? __local_bh_enable_ip+0x15a/0x270 [ 858.932784][ T2973] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 858.939121][ T2973] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 858.945030][ T2973] sctp_sendmsg+0x125a/0x17d0 [ 858.949731][ T2973] ? sctp_id2assoc+0x2c0/0x2c0 [ 858.954487][ T2973] ? release_sock+0x156/0x1c0 [ 858.959171][ T2973] ? release_sock+0x156/0x1c0 [ 858.963842][ T2973] ? __local_bh_enable_ip+0x15a/0x270 [ 858.969299][ T2973] ? inet_autobind+0x144/0x1a0 [ 858.974051][ T2973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 858.980289][ T2973] inet_sendmsg+0x9e/0xe0 [ 858.984607][ T2973] ? inet_send_prepare+0x4f0/0x4f0 [ 858.989716][ T2973] sock_sendmsg+0xd7/0x130 [ 858.994126][ T2973] ___sys_sendmsg+0x803/0x920 [ 858.998819][ T2973] ? copy_msghdr_from_user+0x440/0x440 [ 859.004273][ T2973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 859.010499][ T2973] ? __kasan_check_read+0x11/0x20 [ 859.015519][ T2973] ? __fget+0x384/0x560 [ 859.019673][ T2973] ? __fget_light+0x1a9/0x230 [ 859.024357][ T2973] ? __fdget+0x1b/0x20 [ 859.028415][ T2973] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 859.034643][ T2973] __sys_sendmsg+0x105/0x1d0 [ 859.039221][ T2973] ? __sys_sendmsg_sock+0xd0/0xd0 [ 859.044239][ T2973] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 859.049715][ T2973] ? do_syscall_64+0x26/0x6a0 [ 859.054387][ T2973] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 859.060447][ T2973] ? do_syscall_64+0x26/0x6a0 [ 859.065117][ T2973] __x64_sys_sendmsg+0x78/0xb0 [ 859.069864][ T2973] do_syscall_64+0xfd/0x6a0 [ 859.074352][ T2973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 859.080223][ T2973] RIP: 0033:0x459819 [ 859.084102][ T2973] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 859.103697][ T2973] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 859.112105][ T2973] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 859.120078][ T2973] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 859.128063][ T2973] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 859.136027][ T2973] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 859.144006][ T2973] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 [ 859.280780][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 859.291115][ T2960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:44 executing program 3 (fault-call:2 fault-nth:1): r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:17:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000040030000000000"], 0x14}}, 0x0) 03:17:44 executing program 5 (fault-call:2 fault-nth:7): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:17:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000006f03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:44 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da99", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x95, 0x10}) 03:17:44 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000300)={0x28, 0x0, 0x2711, @my}, 0x10, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2711, @reserved}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x14) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={0x0, 0x9}, 0x8) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000480)={{0x2001, 0x5004, 0x19, 0x0, 0x3, 0x0, 0x5, 0xf5, 0x3, 0xffffffffffff8001, 0x0, 0x1}, {0x100002, 0x0, 0xf, 0xfffffffffffffffa, 0x0, 0x1f, 0x0, 0xfff, 0x7}, {0x1000, 0xf000, 0x17, 0x1, 0x0, 0xdb1, 0x0, 0x0, 0x80, 0x0, 0x0, 0xe3}, {0x0, 0xebcfaeaa4491418f}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000005c0)=[@in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e23, 0x101, @rand_addr="f52eb1793a39bd33889c6e09cd8cb70c", 0x18000000000}, @in6={0xa, 0x4e21, 0x538a, @rand_addr="d8d57a8214661c27900d5a4b6ea4ae6d", 0x10000}, @in6={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast1}, 0x3}, @in6={0xa, 0x4e21, 0x7fff, @remote, 0xb405}], 0x80) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 867.255517][ T2987] FAULT_INJECTION: forcing a failure. [ 867.255517][ T2987] name failslab, interval 1, probability 0, space 0, times 0 [ 867.289185][ T2987] CPU: 1 PID: 2987 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 867.296809][ T2987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.306882][ T2987] Call Trace: [ 867.310192][ T2987] dump_stack+0x172/0x1f0 [ 867.314549][ T2987] should_fail.cold+0xa/0x15 [ 867.319163][ T2987] ? fault_create_debugfs_attr+0x180/0x180 [ 867.324991][ T2987] ? ___might_sleep+0x163/0x280 [ 867.329875][ T2987] __should_failslab+0x121/0x190 [ 867.334833][ T2987] should_failslab+0x9/0x14 [ 867.339356][ T2987] kmem_cache_alloc_trace+0x2d3/0x790 [ 867.344824][ T2987] ? __genradix_ptr_alloc+0x236/0x3a0 [ 867.346922][ T2989] FAULT_INJECTION: forcing a failure. [ 867.346922][ T2989] name failslab, interval 1, probability 0, space 0, times 0 [ 867.350209][ T2987] sctp_auth_shkey_create+0x87/0x1b0 [ 867.350238][ T2987] sctp_auth_asoc_copy_shkeys+0x1fb/0x2c0 [ 867.373895][ T2987] sctp_association_new+0x1605/0x1f80 [ 867.379279][ T2987] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 867.386055][ T2987] sctp_sendmsg_new_asoc+0x397/0xfd0 [ 867.391349][ T2987] ? mark_held_locks+0xa4/0xf0 [ 867.396123][ T2987] ? sctp_autobind+0x1e0/0x1e0 [ 867.400896][ T2987] ? lockdep_hardirqs_on+0x418/0x5d0 [ 867.406186][ T2987] ? lock_sock_nested+0x9a/0x120 [ 867.411137][ T2987] ? trace_hardirqs_on+0x67/0x240 [ 867.416172][ T2987] ? lock_sock_nested+0x9a/0x120 [ 867.421120][ T2987] ? __local_bh_enable_ip+0x15a/0x270 [ 867.426506][ T2987] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 867.432763][ T2987] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 867.438679][ T2987] sctp_sendmsg+0x125a/0x17d0 [ 867.443380][ T2987] ? sctp_id2assoc+0x2c0/0x2c0 [ 867.448153][ T2987] ? release_sock+0x156/0x1c0 [ 867.452850][ T2987] ? release_sock+0x156/0x1c0 [ 867.457545][ T2987] ? __local_bh_enable_ip+0x15a/0x270 [ 867.462938][ T2987] ? inet_autobind+0x144/0x1a0 [ 867.467723][ T2987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 867.473983][ T2987] inet_sendmsg+0x9e/0xe0 [ 867.478327][ T2987] ? inet_send_prepare+0x4f0/0x4f0 [ 867.483450][ T2987] sock_sendmsg+0xd7/0x130 [ 867.487880][ T2987] ___sys_sendmsg+0x803/0x920 [ 867.492568][ T2987] ? copy_msghdr_from_user+0x440/0x440 [ 867.498045][ T2987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 867.504302][ T2987] ? __kasan_check_read+0x11/0x20 [ 867.509338][ T2987] ? __fget+0x384/0x560 [ 867.513519][ T2987] ? __fget_light+0x1a9/0x230 [ 867.518204][ T2987] ? __fdget+0x1b/0x20 [ 867.522290][ T2987] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 867.528558][ T2987] __sys_sendmsg+0x105/0x1d0 [ 867.533161][ T2987] ? __sys_sendmsg_sock+0xd0/0xd0 [ 867.538208][ T2987] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 867.543684][ T2987] ? do_syscall_64+0x26/0x6a0 [ 867.548374][ T2987] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 867.554451][ T2987] ? do_syscall_64+0x26/0x6a0 [ 867.559141][ T2987] __x64_sys_sendmsg+0x78/0xb0 [ 867.563917][ T2987] do_syscall_64+0xfd/0x6a0 [ 867.568434][ T2987] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 867.574330][ T2987] RIP: 0033:0x459819 [ 867.578233][ T2987] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 867.601923][ T2987] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 867.610345][ T2987] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 867.618326][ T2987] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 867.626304][ T2987] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 867.634386][ T2987] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 867.642376][ T2987] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:17:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000003400000000000"], 0x14}}, 0x0) 03:17:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007103000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 867.650471][ T2989] CPU: 0 PID: 2989 Comm: syz-executor.3 Not tainted 5.2.0+ #90 [ 867.658040][ T2989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.668100][ T2989] Call Trace: [ 867.671408][ T2989] dump_stack+0x172/0x1f0 [ 867.675935][ T2989] should_fail.cold+0xa/0x15 [ 867.680570][ T2989] ? fault_create_debugfs_attr+0x180/0x180 [ 867.686396][ T2989] ? ___might_sleep+0x163/0x280 [ 867.691504][ T2989] __should_failslab+0x121/0x190 [ 867.696465][ T2989] should_failslab+0x9/0x14 [ 867.700985][ T2989] kmem_cache_alloc_node_trace+0x274/0x750 [ 867.706815][ T2989] __kmalloc_node_track_caller+0x3d/0x70 [ 867.712633][ T2989] __kmalloc_reserve.isra.0+0x40/0xf0 [ 867.718015][ T2989] __alloc_skb+0x10b/0x5e0 [ 867.722438][ T2989] ? netdev_alloc_frag+0x1b0/0x1b0 [ 867.727564][ T2989] vhci_write+0xc4/0x470 [ 867.731818][ T2989] new_sync_write+0x4d3/0x770 [ 867.736502][ T2989] ? new_sync_read+0x800/0x800 [ 867.741274][ T2989] ? common_file_perm+0x238/0x720 [ 867.746308][ T2989] ? __fget+0x384/0x560 [ 867.750484][ T2989] ? apparmor_file_permission+0x25/0x30 03:17:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500fffff00000000000"], 0x14}}, 0x0) [ 867.756045][ T2989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 867.762294][ T2989] ? security_file_permission+0x8f/0x380 [ 867.767942][ T2989] __vfs_write+0xe1/0x110 [ 867.772282][ T2989] vfs_write+0x268/0x5d0 [ 867.776570][ T2989] ksys_write+0x14f/0x290 [ 867.780908][ T2989] ? __ia32_sys_read+0xb0/0xb0 [ 867.785684][ T2989] ? do_syscall_64+0x26/0x6a0 [ 867.790371][ T2989] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 867.796449][ T2989] ? do_syscall_64+0x26/0x6a0 [ 867.801141][ T2989] __x64_sys_write+0x73/0xb0 [ 867.805744][ T2989] do_syscall_64+0xfd/0x6a0 [ 867.810270][ T2989] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 867.816170][ T2989] RIP: 0033:0x459819 [ 867.820069][ T2989] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 867.839688][ T2989] RSP: 002b:00007fcc5e386c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 867.848121][ T2989] RAX: ffffffffffffffda RBX: 00007fcc5e386c90 RCX: 0000000000459819 03:17:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000100000000"], 0x14}}, 0x0) 03:17:45 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x200000) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000040)={0x6, "9b9dda05df74e10f02207e9fd4fadf3d5dc09272babbc7bb2802fcb90a1ab18a", 0x20, 0x0, 0x0, 0x1, 0x3}) listen(r0, 0x8) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000010c0)=@get={0x1, &(0x7f00000000c0)=""/4096, 0x5}) accept4(r0, 0x0, 0x0, 0x0) [ 867.856106][ T2989] RDX: 0000000000000002 RSI: 0000000020000180 RDI: 0000000000000003 [ 867.864286][ T2989] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 867.872266][ T2989] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcc5e3876d4 [ 867.880250][ T2989] R13: 00000000004c9985 R14: 00000000004e0e40 R15: 0000000000000004 03:17:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007203000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 868.134908][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:17:54 executing program 3 (fault-call:2 fault-nth:2): r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:17:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000200000000"], 0x14}}, 0x0) 03:17:54 executing program 5 (fault-call:2 fault-nth:8): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:17:54 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = semget$private(0x0, 0x4, 0x4) semctl$IPC_RMID(r1, 0x0, 0x0) listen(r0, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x8905, 0x0) 03:17:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007303000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:54 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x96, 0x10}) [ 877.492397][ T3016] FAULT_INJECTION: forcing a failure. [ 877.492397][ T3016] name failslab, interval 1, probability 0, space 0, times 0 03:17:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007403000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:17:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_default\x00', &(0x7f0000000100)=""/229, 0xe5) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x60, &(0x7f0000000040)={0x0, @empty, 0x0, 0x0, 'dh\x00'}, 0x2c) [ 877.572873][ T3016] CPU: 0 PID: 3016 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 877.580501][ T3016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.590572][ T3016] Call Trace: [ 877.593888][ T3016] dump_stack+0x172/0x1f0 [ 877.598242][ T3016] should_fail.cold+0xa/0x15 [ 877.602839][ T3016] ? __kasan_check_read+0x11/0x20 [ 877.607871][ T3016] ? fault_create_debugfs_attr+0x180/0x180 [ 877.613698][ T3016] __should_failslab+0x121/0x190 [ 877.618649][ T3016] should_failslab+0x9/0x14 03:17:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000300000000"], 0x14}}, 0x0) [ 877.623166][ T3016] kmem_cache_alloc_trace+0x4b/0x790 [ 877.628461][ T3016] ? mark_held_locks+0xa4/0xf0 [ 877.633239][ T3016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 877.639597][ T3016] ? __ipv6_addr_type+0x219/0x32d [ 877.644641][ T3016] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 877.650539][ T3016] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 877.656274][ T3016] sctp_add_bind_addr+0x9f/0x3a0 [ 877.661233][ T3016] sctp_copy_local_addr_list+0x385/0x530 [ 877.666876][ T3016] ? sctp_defaults_init+0xbe0/0xbe0 03:17:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000400000000"], 0x14}}, 0x0) [ 877.672084][ T3016] ? _get_random_bytes+0x1b0/0x430 [ 877.677222][ T3016] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 877.683125][ T3016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 877.689381][ T3016] sctp_copy_one_addr+0x5f/0x170 [ 877.694327][ T3016] ? sctp_copy_one_addr+0x5f/0x170 [ 877.699455][ T3016] sctp_bind_addr_copy+0xfc/0x2c8 [ 877.704504][ T3016] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 877.710764][ T3016] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 877.716072][ T3016] ? mark_held_locks+0xa4/0xf0 [ 877.720850][ T3016] ? sctp_autobind+0x1e0/0x1e0 [ 877.725631][ T3016] ? lockdep_hardirqs_on+0x418/0x5d0 [ 877.730923][ T3016] ? lock_sock_nested+0x9a/0x120 [ 877.735876][ T3016] ? trace_hardirqs_on+0x67/0x240 [ 877.740917][ T3016] ? lock_sock_nested+0x9a/0x120 [ 877.745875][ T3016] ? __local_bh_enable_ip+0x15a/0x270 [ 877.751265][ T3016] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 877.757585][ T3016] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 877.763500][ T3016] sctp_sendmsg+0x125a/0x17d0 [ 877.768203][ T3016] ? sctp_id2assoc+0x2c0/0x2c0 [ 877.772973][ T3016] ? release_sock+0x156/0x1c0 [ 877.777659][ T3016] ? release_sock+0x156/0x1c0 [ 877.782353][ T3016] ? __local_bh_enable_ip+0x15a/0x270 [ 877.787740][ T3016] ? inet_autobind+0x144/0x1a0 [ 877.792521][ T3016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 877.798789][ T3016] inet_sendmsg+0x9e/0xe0 [ 877.803134][ T3016] ? inet_send_prepare+0x4f0/0x4f0 [ 877.808256][ T3016] sock_sendmsg+0xd7/0x130 [ 877.812710][ T3016] ___sys_sendmsg+0x803/0x920 [ 877.817401][ T3016] ? copy_msghdr_from_user+0x440/0x440 03:17:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000a00000000"], 0x14}}, 0x0) 03:17:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007503000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 877.822884][ T3016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 877.829137][ T3016] ? __kasan_check_read+0x11/0x20 [ 877.834176][ T3016] ? __fget+0x384/0x560 [ 877.838365][ T3016] ? __fget_light+0x1a9/0x230 [ 877.843057][ T3016] ? __fdget+0x1b/0x20 [ 877.847132][ T3016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 877.853479][ T3016] __sys_sendmsg+0x105/0x1d0 [ 877.858082][ T3016] ? __sys_sendmsg_sock+0xd0/0xd0 [ 877.863133][ T3016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 877.868605][ T3016] ? do_syscall_64+0x26/0x6a0 [ 877.873290][ T3016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 877.879375][ T3016] ? do_syscall_64+0x26/0x6a0 [ 877.884072][ T3016] __x64_sys_sendmsg+0x78/0xb0 [ 877.888853][ T3016] do_syscall_64+0xfd/0x6a0 [ 877.893383][ T3016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 877.899293][ T3016] RIP: 0033:0x459819 [ 877.903207][ T3016] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 877.922827][ T3016] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 877.931263][ T3016] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 877.939255][ T3016] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 877.947253][ T3016] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 877.955248][ T3016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 877.963236][ T3016] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 [ 878.280348][ T3043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:18:04 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:18:04 executing program 5 (fault-call:2 fault-nth:9): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:18:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000e00000000"], 0x14}}, 0x0) 03:18:04 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @reserved}, 0x10) 03:18:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007603000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:18:04 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x96, 0x10}) [ 887.722119][ T3048] FAULT_INJECTION: forcing a failure. [ 887.722119][ T3048] name failslab, interval 1, probability 0, space 0, times 0 [ 887.748431][ T3048] CPU: 1 PID: 3048 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 887.756013][ T3048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.766083][ T3048] Call Trace: [ 887.769390][ T3048] dump_stack+0x172/0x1f0 [ 887.773746][ T3048] should_fail.cold+0xa/0x15 [ 887.778390][ T3048] ? __kasan_check_read+0x11/0x20 [ 887.783428][ T3048] ? fault_create_debugfs_attr+0x180/0x180 [ 887.783455][ T3048] __should_failslab+0x121/0x190 [ 887.783478][ T3048] should_failslab+0x9/0x14 [ 887.794195][ T3048] kmem_cache_alloc_trace+0x4b/0x790 [ 887.794213][ T3048] ? mark_held_locks+0xa4/0xf0 [ 887.794231][ T3048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 887.794254][ T3048] ? __ipv6_addr_type+0x219/0x32d [ 887.820000][ T3048] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 887.820024][ T3048] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 887.831649][ T3048] sctp_add_bind_addr+0x9f/0x3a0 [ 887.836598][ T3048] sctp_copy_local_addr_list+0x385/0x530 [ 887.836621][ T3048] ? sctp_defaults_init+0xbe0/0xbe0 [ 887.836644][ T3048] ? _get_random_bytes+0x1b0/0x430 [ 887.847484][ T3048] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 887.847503][ T3048] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 887.847526][ T3048] sctp_copy_one_addr+0x5f/0x170 [ 887.847547][ T3048] ? sctp_copy_one_addr+0x5f/0x170 [ 887.864777][ T3048] sctp_bind_addr_copy+0xfc/0x2c8 [ 887.864803][ T3048] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 887.864830][ T3048] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 887.874867][ T3048] ? mark_held_locks+0xa4/0xf0 [ 887.874887][ T3048] ? sctp_autobind+0x1e0/0x1e0 [ 887.874902][ T3048] ? lockdep_hardirqs_on+0x418/0x5d0 [ 887.874917][ T3048] ? lock_sock_nested+0x9a/0x120 [ 887.874934][ T3048] ? trace_hardirqs_on+0x67/0x240 [ 887.874953][ T3048] ? lock_sock_nested+0x9a/0x120 [ 887.896205][ T3048] ? __local_bh_enable_ip+0x15a/0x270 [ 887.906230][ T3048] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 887.906248][ T3048] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 887.906283][ T3048] sctp_sendmsg+0x125a/0x17d0 [ 887.916222][ T3048] ? sctp_id2assoc+0x2c0/0x2c0 [ 887.916246][ T3048] ? release_sock+0x156/0x1c0 [ 887.926526][ T3048] ? release_sock+0x156/0x1c0 [ 887.926546][ T3048] ? __local_bh_enable_ip+0x15a/0x270 [ 887.926570][ T3048] ? inet_autobind+0x144/0x1a0 [ 887.926592][ T3048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 887.939114][ T3048] inet_sendmsg+0x9e/0xe0 [ 887.939129][ T3048] ? inet_send_prepare+0x4f0/0x4f0 [ 887.939145][ T3048] sock_sendmsg+0xd7/0x130 [ 887.939167][ T3048] ___sys_sendmsg+0x803/0x920 [ 887.948591][ T3048] ? copy_msghdr_from_user+0x440/0x440 [ 887.948615][ T3048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 887.948638][ T3048] ? __kasan_check_read+0x11/0x20 [ 887.948657][ T3048] ? __fget+0x384/0x560 [ 887.958225][ T3048] ? __fget_light+0x1a9/0x230 [ 887.958245][ T3048] ? __fdget+0x1b/0x20 [ 887.968347][ T3048] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 887.968371][ T3048] __sys_sendmsg+0x105/0x1d0 [ 887.968391][ T3048] ? __sys_sendmsg_sock+0xd0/0xd0 [ 887.984054][ T3048] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 887.984078][ T3048] ? do_syscall_64+0x26/0x6a0 [ 887.984100][ T3048] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 887.993171][ T3048] ? do_syscall_64+0x26/0x6a0 [ 887.993197][ T3048] __x64_sys_sendmsg+0x78/0xb0 [ 887.993216][ T3048] do_syscall_64+0xfd/0x6a0 [ 887.993237][ T3048] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 888.004909][ T3048] RIP: 0033:0x459819 [ 888.004925][ T3048] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 888.004932][ T3048] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 888.004946][ T3048] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 888.004962][ T3048] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 03:18:05 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$sndseq(r0, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffc0, 0x0, @tick, {}, {}, @quote}], 0xff33) 03:18:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000003f00000000"], 0x14}}, 0x0) 03:18:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:18:05 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x2, 'b'}, 0x2) [ 888.122300][ T3048] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 888.130253][ T3048] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 888.138206][ T3048] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:18:05 executing program 5 (fault-call:2 fault-nth:10): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:18:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000004000000000"], 0x14}}, 0x0) [ 888.409981][ T3076] FAULT_INJECTION: forcing a failure. [ 888.409981][ T3076] name failslab, interval 1, probability 0, space 0, times 0 [ 888.424435][ T3076] CPU: 0 PID: 3076 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 888.432001][ T3076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.442075][ T3076] Call Trace: [ 888.445392][ T3076] dump_stack+0x172/0x1f0 [ 888.449747][ T3076] should_fail.cold+0xa/0x15 [ 888.454354][ T3076] ? __kasan_check_read+0x11/0x20 [ 888.459396][ T3076] ? fault_create_debugfs_attr+0x180/0x180 [ 888.465230][ T3076] __should_failslab+0x121/0x190 [ 888.470179][ T3076] should_failslab+0x9/0x14 [ 888.474695][ T3076] kmem_cache_alloc_trace+0x4b/0x790 [ 888.479987][ T3076] ? mark_held_locks+0xa4/0xf0 [ 888.484759][ T3076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 888.491020][ T3076] ? __ipv6_addr_type+0x219/0x32d [ 888.496057][ T3076] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 888.501955][ T3076] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 888.507691][ T3076] sctp_add_bind_addr+0x9f/0x3a0 [ 888.512734][ T3076] sctp_copy_local_addr_list+0x385/0x530 [ 888.518388][ T3076] ? sctp_defaults_init+0xbe0/0xbe0 [ 888.523612][ T3076] ? _get_random_bytes+0x1b0/0x430 [ 888.530214][ T3076] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 888.536113][ T3076] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 888.542369][ T3076] sctp_copy_one_addr+0x5f/0x170 [ 888.547317][ T3076] ? sctp_copy_one_addr+0x5f/0x170 [ 888.552438][ T3076] sctp_bind_addr_copy+0xfc/0x2c8 [ 888.557484][ T3076] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 888.563738][ T3076] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 888.569045][ T3076] ? mark_held_locks+0xa4/0xf0 [ 888.573825][ T3076] ? sctp_autobind+0x1e0/0x1e0 [ 888.578595][ T3076] ? lockdep_hardirqs_on+0x418/0x5d0 [ 888.583892][ T3076] ? lock_sock_nested+0x9a/0x120 [ 888.588839][ T3076] ? trace_hardirqs_on+0x67/0x240 [ 888.593871][ T3076] ? lock_sock_nested+0x9a/0x120 [ 888.598816][ T3076] ? __local_bh_enable_ip+0x15a/0x270 [ 888.604221][ T3076] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 888.610468][ T3076] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 888.616373][ T3076] sctp_sendmsg+0x125a/0x17d0 [ 888.621238][ T3076] ? sctp_id2assoc+0x2c0/0x2c0 [ 888.626010][ T3076] ? release_sock+0x156/0x1c0 [ 888.630689][ T3076] ? release_sock+0x156/0x1c0 [ 888.635971][ T3076] ? __local_bh_enable_ip+0x15a/0x270 [ 888.641357][ T3076] ? inet_autobind+0x144/0x1a0 [ 888.646140][ T3076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 888.652389][ T3076] inet_sendmsg+0x9e/0xe0 [ 888.656731][ T3076] ? inet_send_prepare+0x4f0/0x4f0 [ 888.661849][ T3076] sock_sendmsg+0xd7/0x130 [ 888.666277][ T3076] ___sys_sendmsg+0x803/0x920 [ 888.670965][ T3076] ? copy_msghdr_from_user+0x440/0x440 [ 888.676441][ T3076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 888.682696][ T3076] ? __kasan_check_read+0x11/0x20 [ 888.687737][ T3076] ? __fget+0x384/0x560 [ 888.691923][ T3076] ? __fget_light+0x1a9/0x230 [ 888.696609][ T3076] ? __fdget+0x1b/0x20 [ 888.700690][ T3076] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 888.706953][ T3076] __sys_sendmsg+0x105/0x1d0 [ 888.711561][ T3076] ? __sys_sendmsg_sock+0xd0/0xd0 [ 888.716642][ T3076] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 888.722106][ T3076] ? do_syscall_64+0x26/0x6a0 [ 888.726800][ T3076] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 888.732872][ T3076] ? do_syscall_64+0x26/0x6a0 [ 888.737567][ T3076] __x64_sys_sendmsg+0x78/0xb0 [ 888.742343][ T3076] do_syscall_64+0xfd/0x6a0 [ 888.746854][ T3076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 888.752749][ T3076] RIP: 0033:0x459819 [ 888.756654][ T3076] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 888.776272][ T3076] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 888.784690][ T3076] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 888.792691][ T3076] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 888.800666][ T3076] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 888.808636][ T3076] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 888.816614][ T3076] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 [ 888.826476][ T3062] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:18:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007903000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:18:06 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37ce", 0x96, 0x10}) 03:18:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000006000000000"], 0x14}}, 0x0) 03:18:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f00000000c0)={0x2, 0x0, [{0x7}, {0x7}]}) 03:18:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007a03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:18:06 executing program 5 (fault-call:2 fault-nth:11): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:18:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500ffffff9e00000000"], 0x14}}, 0x0) 03:18:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f00000000c0)={0x2, 0x0, [{0x7}, {0x7}]}) [ 889.315636][ T3104] FAULT_INJECTION: forcing a failure. [ 889.315636][ T3104] name failslab, interval 1, probability 0, space 0, times 0 [ 889.343130][ T3104] CPU: 1 PID: 3104 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 889.350718][ T3104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.360784][ T3104] Call Trace: [ 889.364100][ T3104] dump_stack+0x172/0x1f0 [ 889.368453][ T3104] should_fail.cold+0xa/0x15 [ 889.373054][ T3104] ? __kasan_check_read+0x11/0x20 [ 889.378088][ T3104] ? fault_create_debugfs_attr+0x180/0x180 [ 889.383917][ T3104] __should_failslab+0x121/0x190 [ 889.388867][ T3104] should_failslab+0x9/0x14 [ 889.393374][ T3104] kmem_cache_alloc_trace+0x4b/0x790 [ 889.398666][ T3104] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 889.404917][ T3104] ? __sctp_v6_cmp_addr+0x1dc/0x560 [ 889.410130][ T3104] sctp_add_bind_addr+0x9f/0x3a0 [ 889.415094][ T3104] sctp_copy_local_addr_list+0x385/0x530 [ 889.420747][ T3104] ? sctp_defaults_init+0xbe0/0xbe0 [ 889.425964][ T3104] ? _get_random_bytes+0x1b0/0x430 [ 889.431090][ T3104] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 889.437000][ T3104] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 889.443261][ T3104] sctp_copy_one_addr+0x5f/0x170 [ 889.448219][ T3104] ? sctp_copy_one_addr+0x5f/0x170 [ 889.453347][ T3104] sctp_bind_addr_copy+0xfc/0x2c8 [ 889.458397][ T3104] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 889.464676][ T3104] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 889.470072][ T3104] ? mark_held_locks+0xa4/0xf0 [ 889.474862][ T3104] ? sctp_autobind+0x1e0/0x1e0 [ 889.479777][ T3104] ? lockdep_hardirqs_on+0x418/0x5d0 [ 889.485083][ T3104] ? lock_sock_nested+0x9a/0x120 [ 889.490047][ T3104] ? trace_hardirqs_on+0x67/0x240 [ 889.495099][ T3104] ? lock_sock_nested+0x9a/0x120 [ 889.500060][ T3104] ? __local_bh_enable_ip+0x15a/0x270 [ 889.505451][ T3104] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 889.511731][ T3104] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 889.517657][ T3104] sctp_sendmsg+0x125a/0x17d0 [ 889.522364][ T3104] ? sctp_id2assoc+0x2c0/0x2c0 [ 889.527144][ T3104] ? release_sock+0x156/0x1c0 [ 889.531837][ T3104] ? release_sock+0x156/0x1c0 [ 889.536531][ T3104] ? __local_bh_enable_ip+0x15a/0x270 [ 889.549499][ T3104] ? inet_autobind+0x144/0x1a0 [ 889.554289][ T3104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.560553][ T3104] inet_sendmsg+0x9e/0xe0 [ 889.564906][ T3104] ? inet_send_prepare+0x4f0/0x4f0 [ 889.570029][ T3104] sock_sendmsg+0xd7/0x130 [ 889.574467][ T3104] ___sys_sendmsg+0x803/0x920 [ 889.579173][ T3104] ? copy_msghdr_from_user+0x440/0x440 [ 889.584650][ T3104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.590909][ T3104] ? __kasan_check_read+0x11/0x20 [ 889.595953][ T3104] ? __fget+0x384/0x560 [ 889.600146][ T3104] ? __fget_light+0x1a9/0x230 [ 889.604844][ T3104] ? __fdget+0x1b/0x20 [ 889.608931][ T3104] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 889.615192][ T3104] __sys_sendmsg+0x105/0x1d0 [ 889.619800][ T3104] ? __sys_sendmsg_sock+0xd0/0xd0 [ 889.624987][ T3104] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 889.630459][ T3104] ? do_syscall_64+0x26/0x6a0 [ 889.635658][ T3104] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 889.641743][ T3104] ? do_syscall_64+0x26/0x6a0 [ 889.646442][ T3104] __x64_sys_sendmsg+0x78/0xb0 [ 889.651231][ T3104] do_syscall_64+0xfd/0x6a0 [ 889.655758][ T3104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 889.661664][ T3104] RIP: 0033:0x459819 [ 889.665572][ T3104] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 889.685201][ T3104] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 889.693896][ T3104] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 889.701884][ T3104] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 889.709874][ T3104] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 889.717865][ T3104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 889.725854][ T3104] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:18:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) futimesat(r0, 0x0, 0x0) [ 889.967186][ T3097] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:18:15 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x20000182) 03:18:15 executing program 5 (fault-call:2 fault-nth:12): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:18:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000000ec000000000"], 0x14}}, 0x0) 03:18:15 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", 0x0, 0x97}) 03:18:15 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012000200020000010000000000003000320003020000ff3f567b0000000000000000000000000000000000000001ac1405bb000000000000000000000000030005000000000002000000e00000010010000000000000"], 0x80}}, 0x0) 03:18:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007b03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 898.650160][ T3127] FAULT_INJECTION: forcing a failure. [ 898.650160][ T3127] name failslab, interval 1, probability 0, space 0, times 0 [ 898.668944][ T3127] CPU: 1 PID: 3127 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 898.677034][ T3127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 898.687094][ T3127] Call Trace: [ 898.687124][ T3127] dump_stack+0x172/0x1f0 [ 898.687151][ T3127] should_fail.cold+0xa/0x15 [ 898.687178][ T3127] ? __kasan_check_read+0x11/0x20 [ 898.695262][ T3127] ? fault_create_debugfs_attr+0x180/0x180 [ 898.695299][ T3127] __should_failslab+0x121/0x190 [ 898.695317][ T3127] should_failslab+0x9/0x14 [ 898.695331][ T3127] kmem_cache_alloc_trace+0x4b/0x790 [ 898.695349][ T3127] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 898.695372][ T3127] ? __sctp_v6_cmp_addr+0x1dc/0x560 [ 898.715711][ T3127] sctp_add_bind_addr+0x9f/0x3a0 [ 898.715735][ T3127] sctp_copy_local_addr_list+0x385/0x530 03:18:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000000aed00000000"], 0x14}}, 0x0) [ 898.715755][ T3127] ? sctp_defaults_init+0xbe0/0xbe0 [ 898.715774][ T3127] ? _get_random_bytes+0x1b0/0x430 [ 898.715793][ T3127] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 898.715815][ T3127] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 898.725610][ T3127] sctp_copy_one_addr+0x5f/0x170 [ 898.747596][ T3127] ? sctp_copy_one_addr+0x5f/0x170 [ 898.747619][ T3127] sctp_bind_addr_copy+0xfc/0x2c8 [ 898.747645][ T3127] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 898.747667][ T3127] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 898.757976][ T3127] ? mark_held_locks+0xa4/0xf0 [ 898.757999][ T3127] ? sctp_autobind+0x1e0/0x1e0 [ 898.758015][ T3127] ? lockdep_hardirqs_on+0x418/0x5d0 [ 898.758036][ T3127] ? lock_sock_nested+0x9a/0x120 [ 898.780180][ T3127] ? trace_hardirqs_on+0x67/0x240 [ 898.780198][ T3127] ? lock_sock_nested+0x9a/0x120 [ 898.780217][ T3127] ? __local_bh_enable_ip+0x15a/0x270 [ 898.780236][ T3127] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 898.780260][ T3127] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 898.843948][ T3127] sctp_sendmsg+0x125a/0x17d0 03:18:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500fffffff000000000"], 0x14}}, 0x0) [ 898.848654][ T3127] ? sctp_id2assoc+0x2c0/0x2c0 [ 898.853424][ T3127] ? release_sock+0x156/0x1c0 [ 898.858111][ T3127] ? release_sock+0x156/0x1c0 [ 898.862799][ T3127] ? __local_bh_enable_ip+0x15a/0x270 [ 898.868195][ T3127] ? inet_autobind+0x144/0x1a0 [ 898.872975][ T3127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.879237][ T3127] inet_sendmsg+0x9e/0xe0 [ 898.883595][ T3127] ? inet_send_prepare+0x4f0/0x4f0 [ 898.888720][ T3127] sock_sendmsg+0xd7/0x130 [ 898.893158][ T3127] ___sys_sendmsg+0x803/0x920 [ 898.898092][ T3127] ? copy_msghdr_from_user+0x440/0x440 [ 898.903567][ T3127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.909856][ T3127] ? __kasan_check_read+0x11/0x20 [ 898.914894][ T3127] ? __fget+0x384/0x560 [ 898.919082][ T3127] ? __fget_light+0x1a9/0x230 [ 898.923772][ T3127] ? __fdget+0x1b/0x20 [ 898.927850][ T3127] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 898.934103][ T3127] __sys_sendmsg+0x105/0x1d0 [ 898.938706][ T3127] ? __sys_sendmsg_sock+0xd0/0xd0 [ 898.943757][ T3127] ? trace_hardirqs_on_thunk+0x1a/0x1c 03:18:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000f0ffff00000000"], 0x14}}, 0x0) [ 898.949228][ T3127] ? do_syscall_64+0x26/0x6a0 [ 898.953908][ T3127] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 898.959985][ T3127] ? do_syscall_64+0x26/0x6a0 [ 898.964675][ T3127] __x64_sys_sendmsg+0x78/0xb0 [ 898.969454][ T3127] do_syscall_64+0xfd/0x6a0 [ 898.973987][ T3127] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 898.979889][ T3127] RIP: 0033:0x459819 03:18:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215007fffffff00000000"], 0x14}}, 0x0) 03:18:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007c03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 898.983791][ T3127] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 899.003411][ T3127] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 899.011840][ T3127] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 899.019824][ T3127] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 899.027828][ T3127] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 899.035816][ T3127] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 899.043834][ T3127] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:18:16 executing program 5 (fault-call:2 fault-nth:13): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 899.292502][ T3153] FAULT_INJECTION: forcing a failure. [ 899.292502][ T3153] name failslab, interval 1, probability 0, space 0, times 0 [ 899.313664][ T3153] CPU: 1 PID: 3153 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 899.321246][ T3153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 899.331319][ T3153] Call Trace: [ 899.334634][ T3153] dump_stack+0x172/0x1f0 [ 899.338991][ T3153] should_fail.cold+0xa/0x15 [ 899.343595][ T3153] ? __kasan_check_read+0x11/0x20 [ 899.348647][ T3153] ? fault_create_debugfs_attr+0x180/0x180 [ 899.354490][ T3153] __should_failslab+0x121/0x190 [ 899.359449][ T3153] should_failslab+0x9/0x14 [ 899.363965][ T3153] kmem_cache_alloc_trace+0x4b/0x790 [ 899.369264][ T3153] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 899.375526][ T3153] ? __sctp_v6_cmp_addr+0x1dc/0x560 [ 899.380748][ T3153] sctp_add_bind_addr+0x9f/0x3a0 [ 899.385709][ T3153] sctp_copy_local_addr_list+0x385/0x530 [ 899.391388][ T3153] ? sctp_defaults_init+0xbe0/0xbe0 [ 899.396606][ T3153] ? _get_random_bytes+0x1b0/0x430 [ 899.401740][ T3153] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 899.407662][ T3153] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 899.413929][ T3153] sctp_copy_one_addr+0x5f/0x170 [ 899.418886][ T3153] ? sctp_copy_one_addr+0x5f/0x170 [ 899.424018][ T3153] sctp_bind_addr_copy+0xfc/0x2c8 [ 899.429082][ T3153] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 899.435356][ T3153] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 899.440664][ T3153] ? mark_held_locks+0xa4/0xf0 [ 899.445449][ T3153] ? sctp_autobind+0x1e0/0x1e0 [ 899.450232][ T3153] ? lockdep_hardirqs_on+0x418/0x5d0 [ 899.455543][ T3153] ? lock_sock_nested+0x9a/0x120 [ 899.460498][ T3153] ? trace_hardirqs_on+0x67/0x240 [ 899.465541][ T3153] ? lock_sock_nested+0x9a/0x120 [ 899.470508][ T3153] ? __local_bh_enable_ip+0x15a/0x270 [ 899.475893][ T3153] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 899.482144][ T3153] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 899.488056][ T3153] sctp_sendmsg+0x125a/0x17d0 [ 899.492767][ T3153] ? sctp_id2assoc+0x2c0/0x2c0 [ 899.497556][ T3153] ? release_sock+0x156/0x1c0 [ 899.502251][ T3153] ? release_sock+0x156/0x1c0 [ 899.506955][ T3153] ? __local_bh_enable_ip+0x15a/0x270 [ 899.512353][ T3153] ? inet_autobind+0x144/0x1a0 [ 899.517142][ T3153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.523418][ T3153] inet_sendmsg+0x9e/0xe0 [ 899.527766][ T3153] ? inet_send_prepare+0x4f0/0x4f0 [ 899.532894][ T3153] sock_sendmsg+0xd7/0x130 [ 899.537335][ T3153] ___sys_sendmsg+0x803/0x920 [ 899.542032][ T3153] ? copy_msghdr_from_user+0x440/0x440 [ 899.547512][ T3153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.553771][ T3153] ? __kasan_check_read+0x11/0x20 [ 899.558811][ T3153] ? __fget+0x384/0x560 [ 899.562996][ T3153] ? __fget_light+0x1a9/0x230 [ 899.567678][ T3153] ? __fdget+0x1b/0x20 [ 899.571757][ T3153] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 899.578012][ T3153] __sys_sendmsg+0x105/0x1d0 [ 899.582616][ T3153] ? __sys_sendmsg_sock+0xd0/0xd0 [ 899.587670][ T3153] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 899.593141][ T3153] ? do_syscall_64+0x26/0x6a0 [ 899.597838][ T3153] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 899.603929][ T3153] ? do_syscall_64+0x26/0x6a0 [ 899.608629][ T3153] __x64_sys_sendmsg+0x78/0xb0 [ 899.613411][ T3153] do_syscall_64+0xfd/0x6a0 [ 899.617935][ T3153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 899.623834][ T3153] RIP: 0033:0x459819 [ 899.627738][ T3153] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 899.647801][ T3153] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 899.656230][ T3153] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 899.664311][ T3153] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 899.672382][ T3153] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 899.680363][ T3153] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 899.688352][ T3153] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 [ 899.794569][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:18:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x4a8, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000100012000c0001006272696467650000200002000a0001000300000000000000"], 0x40}}, 0x0) 03:18:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215009effffff00000000"], 0x14}}, 0x0) 03:18:26 executing program 5 (fault-call:2 fault-nth:14): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:18:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007d03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:18:26 executing program 3: prctl$PR_SET_FPEMU(0xa, 0x2) r0 = accept(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000100)=0x80) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f0000000240)=0x10) close(r1) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r3 = fcntl$dupfd(r0, 0x406, r2) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, &(0x7f0000000280)={[0xf006, 0x5000, 0x4, 0xd002], 0x0, 0x5, 0x40}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000200)) write$vhci(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="940300000000000062"], 0x2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="6f00000025f9d52589835ec99a744c0a7e94c46845c98c2ea4988851ab2313473e7964f628c789eb5ba006363b60080c3d685ebfe7e76abd26f1886a92be26e736b091e1eaec8a124d6ca9cc5a9ff309f2584281cdf0194a1f8be8d5a9ee29b0f7108c4f1e5b44352f51927703981f6dd4fbb7"], &(0x7f0000000380)=0x77) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000003c0)={r4, 0x3c}, &(0x7f0000000400)=0x8) 03:18:26 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", 0x0, 0x97}) 03:18:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000007e03000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:18:26 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000080)) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) [ 908.899464][ T3167] FAULT_INJECTION: forcing a failure. [ 908.899464][ T3167] name failslab, interval 1, probability 0, space 0, times 0 [ 908.947348][ T3167] CPU: 1 PID: 3167 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 908.954995][ T3167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 908.965066][ T3167] Call Trace: [ 908.968379][ T3167] dump_stack+0x172/0x1f0 [ 908.972744][ T3167] should_fail.cold+0xa/0x15 [ 908.977347][ T3167] ? __kasan_check_read+0x11/0x20 [ 908.977370][ T3167] ? fault_create_debugfs_attr+0x180/0x180 [ 908.977399][ T3167] __should_failslab+0x121/0x190 [ 908.977417][ T3167] should_failslab+0x9/0x14 [ 908.977439][ T3167] kmem_cache_alloc_trace+0x4b/0x790 [ 908.988276][ T3167] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 908.988292][ T3167] ? __sctp_v6_cmp_addr+0x1dc/0x560 [ 908.988313][ T3167] sctp_add_bind_addr+0x9f/0x3a0 [ 908.988336][ T3167] sctp_copy_local_addr_list+0x385/0x530 [ 908.988358][ T3167] ? sctp_defaults_init+0xbe0/0xbe0 [ 908.988378][ T3167] ? _get_random_bytes+0x1b0/0x430 [ 908.988394][ T3167] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 908.988416][ T3167] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 908.997839][ T3167] sctp_copy_one_addr+0x5f/0x170 [ 908.997856][ T3167] ? sctp_copy_one_addr+0x5f/0x170 [ 908.997878][ T3167] sctp_bind_addr_copy+0xfc/0x2c8 [ 908.997903][ T3167] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 908.997925][ T3167] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 908.997948][ T3167] ? mark_held_locks+0xa4/0xf0 [ 909.014643][ T3167] ? sctp_autobind+0x1e0/0x1e0 [ 909.014663][ T3167] ? lockdep_hardirqs_on+0x418/0x5d0 [ 909.014679][ T3167] ? lock_sock_nested+0x9a/0x120 03:18:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500f0ffffff00000000"], 0x14}}, 0x0) [ 909.014697][ T3167] ? trace_hardirqs_on+0x67/0x240 [ 909.014710][ T3167] ? lock_sock_nested+0x9a/0x120 [ 909.014727][ T3167] ? __local_bh_enable_ip+0x15a/0x270 [ 909.014744][ T3167] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 909.014769][ T3167] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 909.025344][ T3167] sctp_sendmsg+0x125a/0x17d0 [ 909.025372][ T3167] ? sctp_id2assoc+0x2c0/0x2c0 [ 909.025389][ T3167] ? release_sock+0x156/0x1c0 [ 909.025405][ T3167] ? release_sock+0x156/0x1c0 [ 909.025425][ T3167] ? __local_bh_enable_ip+0x15a/0x270 [ 909.025447][ T3167] ? inet_autobind+0x144/0x1a0 [ 909.025464][ T3167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 909.025487][ T3167] inet_sendmsg+0x9e/0xe0 [ 909.035789][ T3167] ? inet_send_prepare+0x4f0/0x4f0 [ 909.035806][ T3167] sock_sendmsg+0xd7/0x130 [ 909.035825][ T3167] ___sys_sendmsg+0x803/0x920 [ 909.035846][ T3167] ? copy_msghdr_from_user+0x440/0x440 [ 909.035871][ T3167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 909.035889][ T3167] ? __kasan_check_read+0x11/0x20 [ 909.035907][ T3167] ? __fget+0x384/0x560 03:18:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000010000"], 0x14}}, 0x0) [ 909.035939][ T3167] ? __fget_light+0x1a9/0x230 [ 909.048070][ T3167] ? __fdget+0x1b/0x20 [ 909.048086][ T3167] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 909.048106][ T3167] __sys_sendmsg+0x105/0x1d0 [ 909.048123][ T3167] ? __sys_sendmsg_sock+0xd0/0xd0 [ 909.048153][ T3167] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 909.048169][ T3167] ? do_syscall_64+0x26/0x6a0 [ 909.048185][ T3167] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 909.048200][ T3167] ? do_syscall_64+0x26/0x6a0 [ 909.048220][ T3167] __x64_sys_sendmsg+0x78/0xb0 [ 909.048242][ T3167] do_syscall_64+0xfd/0x6a0 [ 909.251254][ T3167] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 909.257156][ T3167] RIP: 0033:0x459819 [ 909.261052][ T3167] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 909.280661][ T3167] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 909.289086][ T3167] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 03:18:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000034000"], 0x14}}, 0x0) 03:18:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa3000000000000c003000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 909.297063][ T3167] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 909.305130][ T3167] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 909.313108][ T3167] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 909.321093][ T3167] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:18:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500fffffffffffff000"], 0x14}}, 0x0) 03:18:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012000200020000010000000000003000320003030000ff3f00000000000000000000000000000000000000000001ac1405bb000000000000000000000000030005000000000002000000e00000010010000000000000"], 0x80}}, 0x0) 03:18:26 executing program 5 (fault-call:2 fault-nth:15): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 909.673559][ T3169] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 909.699479][ T3179] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 909.765214][ T3205] FAULT_INJECTION: forcing a failure. [ 909.765214][ T3205] name failslab, interval 1, probability 0, space 0, times 0 [ 909.811719][ T3205] CPU: 0 PID: 3205 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 909.819321][ T3205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 909.829392][ T3205] Call Trace: [ 909.832703][ T3205] dump_stack+0x172/0x1f0 [ 909.837060][ T3205] should_fail.cold+0xa/0x15 [ 909.841670][ T3205] ? __kasan_check_read+0x11/0x20 [ 909.846707][ T3205] ? fault_create_debugfs_attr+0x180/0x180 [ 909.852534][ T3205] __should_failslab+0x121/0x190 [ 909.857487][ T3205] should_failslab+0x9/0x14 [ 909.862010][ T3205] kmem_cache_alloc_trace+0x4b/0x790 [ 909.867315][ T3205] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 909.873576][ T3205] ? __sctp_v6_cmp_addr+0x1dc/0x560 [ 909.878799][ T3205] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 909.884711][ T3205] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 909.890453][ T3205] sctp_add_bind_addr+0x9f/0x3a0 [ 909.895429][ T3205] sctp_copy_local_addr_list+0x385/0x530 [ 909.901083][ T3205] ? sctp_defaults_init+0xbe0/0xbe0 [ 909.906297][ T3205] ? _get_random_bytes+0x1b0/0x430 03:18:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000705000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:18:27 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", 0x0, 0x97}) 03:18:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000706000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 909.911422][ T3205] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 909.917331][ T3205] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 909.923593][ T3205] sctp_copy_one_addr+0x5f/0x170 [ 909.928537][ T3205] ? sctp_copy_one_addr+0x5f/0x170 [ 909.933659][ T3205] sctp_bind_addr_copy+0xfc/0x2c8 [ 909.938703][ T3205] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 909.944960][ T3205] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 909.950255][ T3205] ? mark_held_locks+0xa4/0xf0 [ 909.955031][ T3205] ? sctp_autobind+0x1e0/0x1e0 03:18:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000001"], 0x14}}, 0x0) [ 909.959812][ T3205] ? lockdep_hardirqs_on+0x418/0x5d0 [ 909.965105][ T3205] ? lock_sock_nested+0x9a/0x120 [ 909.970057][ T3205] ? trace_hardirqs_on+0x67/0x240 [ 909.975095][ T3205] ? lock_sock_nested+0x9a/0x120 [ 909.980044][ T3205] ? __local_bh_enable_ip+0x15a/0x270 [ 909.985435][ T3205] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 909.991690][ T3205] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 909.997600][ T3205] sctp_sendmsg+0x125a/0x17d0 [ 910.002303][ T3205] ? sctp_id2assoc+0x2c0/0x2c0 [ 910.007085][ T3205] ? release_sock+0x156/0x1c0 [ 910.011781][ T3205] ? release_sock+0x156/0x1c0 [ 910.016472][ T3205] ? __local_bh_enable_ip+0x15a/0x270 [ 910.021868][ T3205] ? inet_autobind+0x144/0x1a0 [ 910.026647][ T3205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 910.032919][ T3205] inet_sendmsg+0x9e/0xe0 [ 910.037263][ T3205] ? inet_send_prepare+0x4f0/0x4f0 [ 910.042391][ T3205] sock_sendmsg+0xd7/0x130 [ 910.046820][ T3205] ___sys_sendmsg+0x803/0x920 [ 910.051520][ T3205] ? copy_msghdr_from_user+0x440/0x440 [ 910.056993][ T3205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 910.063250][ T3205] ? __kasan_check_read+0x11/0x20 [ 910.068296][ T3205] ? __fget+0x384/0x560 [ 910.072486][ T3205] ? __fget_light+0x1a9/0x230 [ 910.077182][ T3205] ? __fdget+0x1b/0x20 [ 910.081264][ T3205] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 910.087523][ T3205] __sys_sendmsg+0x105/0x1d0 [ 910.092135][ T3205] ? __sys_sendmsg_sock+0xd0/0xd0 [ 910.097185][ T3205] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 910.102654][ T3205] ? do_syscall_64+0x26/0x6a0 [ 910.107338][ T3205] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 910.113409][ T3205] ? do_syscall_64+0x26/0x6a0 [ 910.118097][ T3205] __x64_sys_sendmsg+0x78/0xb0 [ 910.122871][ T3205] do_syscall_64+0xfd/0x6a0 [ 910.127388][ T3205] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 910.133275][ T3205] RIP: 0033:0x459819 [ 910.133290][ T3205] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 910.133299][ T3205] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 910.133312][ T3205] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 910.133321][ T3205] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 910.133329][ T3205] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 910.133338][ T3205] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 910.133347][ T3205] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 [ 910.586351][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:18:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000002"], 0x14}}, 0x0) 03:18:36 executing program 5 (fault-call:2 fault-nth:16): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:18:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000001c0)={0x0, 0xfffffffffffffffe, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) 03:18:36 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) time(&(0x7f0000000080)) r1 = dup3(r0, r0, 0x80000) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f00000000c0)=0xfffffffffffffffb) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:18:36 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500), 0x97}) 03:18:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000709000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 919.090728][ T3240] FAULT_INJECTION: forcing a failure. [ 919.090728][ T3240] name failslab, interval 1, probability 0, space 0, times 0 [ 919.130111][ T3240] CPU: 0 PID: 3240 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 919.137707][ T3240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.147778][ T3240] Call Trace: [ 919.151088][ T3240] dump_stack+0x172/0x1f0 [ 919.155444][ T3240] should_fail.cold+0xa/0x15 [ 919.160048][ T3240] ? __kasan_check_read+0x11/0x20 [ 919.165089][ T3240] ? fault_create_debugfs_attr+0x180/0x180 [ 919.170914][ T3240] __should_failslab+0x121/0x190 [ 919.170935][ T3240] should_failslab+0x9/0x14 [ 919.170960][ T3240] kmem_cache_alloc_trace+0x4b/0x790 [ 919.185675][ T3240] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 919.185693][ T3240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 919.185711][ T3240] ? __ipv6_addr_type+0x219/0x32d [ 919.185734][ T3240] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 919.198200][ T3240] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 919.198224][ T3240] sctp_add_bind_addr+0x9f/0x3a0 [ 919.198248][ T3240] sctp_copy_local_addr_list+0x385/0x530 [ 919.198269][ T3240] ? sctp_defaults_init+0xbe0/0xbe0 [ 919.209175][ T3240] ? _get_random_bytes+0x1b0/0x430 [ 919.209194][ T3240] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 919.209212][ T3240] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 919.209238][ T3240] sctp_copy_one_addr+0x5f/0x170 [ 919.225486][ T3240] ? sctp_copy_one_addr+0x5f/0x170 [ 919.225509][ T3240] sctp_bind_addr_copy+0xfc/0x2c8 [ 919.225541][ T3240] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 919.252861][ T3240] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 919.252883][ T3240] ? mark_held_locks+0xa4/0xf0 [ 919.252902][ T3240] ? sctp_autobind+0x1e0/0x1e0 [ 919.252916][ T3240] ? lockdep_hardirqs_on+0x418/0x5d0 03:18:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000003"], 0x14}}, 0x0) [ 919.252932][ T3240] ? lock_sock_nested+0x9a/0x120 [ 919.252948][ T3240] ? trace_hardirqs_on+0x67/0x240 [ 919.252962][ T3240] ? lock_sock_nested+0x9a/0x120 [ 919.252984][ T3240] ? __local_bh_enable_ip+0x15a/0x270 [ 919.263106][ T3240] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 919.263125][ T3240] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 919.263143][ T3240] sctp_sendmsg+0x125a/0x17d0 [ 919.263167][ T3240] ? sctp_id2assoc+0x2c0/0x2c0 [ 919.263182][ T3240] ? release_sock+0x156/0x1c0 [ 919.263196][ T3240] ? release_sock+0x156/0x1c0 [ 919.263213][ T3240] ? __local_bh_enable_ip+0x15a/0x270 [ 919.263237][ T3240] ? inet_autobind+0x144/0x1a0 [ 919.309711][ T3240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 919.335887][ T3240] inet_sendmsg+0x9e/0xe0 [ 919.335904][ T3240] ? inet_send_prepare+0x4f0/0x4f0 [ 919.335920][ T3240] sock_sendmsg+0xd7/0x130 [ 919.335938][ T3240] ___sys_sendmsg+0x803/0x920 [ 919.335957][ T3240] ? copy_msghdr_from_user+0x440/0x440 [ 919.335981][ T3240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 919.336002][ T3240] ? __kasan_check_read+0x11/0x20 [ 919.392260][ T3240] ? __fget+0x384/0x560 [ 919.396443][ T3240] ? __fget_light+0x1a9/0x230 [ 919.401120][ T3240] ? __fdget+0x1b/0x20 [ 919.405188][ T3240] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 919.411438][ T3240] __sys_sendmsg+0x105/0x1d0 [ 919.416035][ T3240] ? __sys_sendmsg_sock+0xd0/0xd0 [ 919.421107][ T3240] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 919.426593][ T3240] ? do_syscall_64+0x26/0x6a0 [ 919.431274][ T3240] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 919.437355][ T3240] ? do_syscall_64+0x26/0x6a0 [ 919.442053][ T3240] __x64_sys_sendmsg+0x78/0xb0 [ 919.446833][ T3240] do_syscall_64+0xfd/0x6a0 [ 919.451339][ T3240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 919.457225][ T3240] RIP: 0033:0x459819 [ 919.461114][ T3240] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 919.480720][ T3240] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 03:18:36 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) get_mempolicy(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000001000/0x2000)=nil, 0x2) 03:18:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa3000000000000070a000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:18:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000004"], 0x14}}, 0x0) [ 919.489218][ T3240] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 919.497187][ T3240] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 919.505157][ T3240] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 919.513132][ T3240] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 919.521104][ T3240] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:18:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) 03:18:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500000000000000000a"], 0x14}}, 0x0) 03:18:37 executing program 5 (fault-call:2 fault-nth:17): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:18:37 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000100)=""/104) [ 919.867395][ T3272] FAULT_INJECTION: forcing a failure. [ 919.867395][ T3272] name failslab, interval 1, probability 0, space 0, times 0 [ 919.893657][ T3272] CPU: 0 PID: 3272 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 919.901245][ T3272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.911316][ T3272] Call Trace: [ 919.914632][ T3272] dump_stack+0x172/0x1f0 [ 919.918983][ T3272] should_fail.cold+0xa/0x15 [ 919.923586][ T3272] ? __kasan_check_read+0x11/0x20 [ 919.928641][ T3272] ? fault_create_debugfs_attr+0x180/0x180 [ 919.934477][ T3272] __should_failslab+0x121/0x190 [ 919.939615][ T3272] should_failslab+0x9/0x14 [ 919.944143][ T3272] kmem_cache_alloc_trace+0x4b/0x790 [ 919.949452][ T3272] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 919.955714][ T3272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 919.961969][ T3272] ? __ipv6_addr_type+0x219/0x32d [ 919.967006][ T3272] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 919.972902][ T3272] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 919.978644][ T3272] sctp_add_bind_addr+0x9f/0x3a0 [ 919.983604][ T3272] sctp_copy_local_addr_list+0x385/0x530 [ 919.989251][ T3272] ? sctp_defaults_init+0xbe0/0xbe0 [ 919.994464][ T3272] ? _get_random_bytes+0x1b0/0x430 [ 919.999586][ T3272] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 920.005494][ T3272] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 920.011756][ T3272] sctp_copy_one_addr+0x5f/0x170 [ 920.016710][ T3272] ? sctp_copy_one_addr+0x5f/0x170 [ 920.021865][ T3272] sctp_bind_addr_copy+0xfc/0x2c8 [ 920.026919][ T3272] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 920.030643][ T3252] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 920.033176][ T3272] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 920.033198][ T3272] ? mark_held_locks+0xa4/0xf0 [ 920.033215][ T3272] ? sctp_autobind+0x1e0/0x1e0 [ 920.033228][ T3272] ? lockdep_hardirqs_on+0x418/0x5d0 [ 920.033242][ T3272] ? lock_sock_nested+0x9a/0x120 [ 920.033259][ T3272] ? trace_hardirqs_on+0x67/0x240 [ 920.033272][ T3272] ? lock_sock_nested+0x9a/0x120 [ 920.033290][ T3272] ? __local_bh_enable_ip+0x15a/0x270 [ 920.033308][ T3272] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 920.033325][ T3272] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 920.033354][ T3272] sctp_sendmsg+0x125a/0x17d0 [ 920.097571][ T3272] ? sctp_id2assoc+0x2c0/0x2c0 [ 920.102352][ T3272] ? release_sock+0x156/0x1c0 [ 920.107041][ T3272] ? release_sock+0x156/0x1c0 [ 920.111730][ T3272] ? __local_bh_enable_ip+0x15a/0x270 [ 920.117118][ T3272] ? inet_autobind+0x144/0x1a0 [ 920.121895][ T3272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 920.128161][ T3272] inet_sendmsg+0x9e/0xe0 [ 920.132500][ T3272] ? inet_send_prepare+0x4f0/0x4f0 [ 920.137624][ T3272] sock_sendmsg+0xd7/0x130 [ 920.142053][ T3272] ___sys_sendmsg+0x803/0x920 [ 920.146742][ T3272] ? copy_msghdr_from_user+0x440/0x440 [ 920.152220][ T3272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 920.158477][ T3272] ? __kasan_check_read+0x11/0x20 [ 920.163514][ T3272] ? __fget+0x384/0x560 [ 920.167700][ T3272] ? __fget_light+0x1a9/0x230 [ 920.172395][ T3272] ? __fdget+0x1b/0x20 [ 920.176478][ T3272] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 920.182741][ T3272] __sys_sendmsg+0x105/0x1d0 [ 920.187351][ T3272] ? __sys_sendmsg_sock+0xd0/0xd0 [ 920.192404][ T3272] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 920.197874][ T3272] ? do_syscall_64+0x26/0x6a0 [ 920.202558][ T3272] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 920.208645][ T3272] ? do_syscall_64+0x26/0x6a0 [ 920.213349][ T3272] __x64_sys_sendmsg+0x78/0xb0 03:18:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500000000000000000e"], 0x14}}, 0x0) [ 920.218135][ T3272] do_syscall_64+0xfd/0x6a0 [ 920.222658][ T3272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 920.228555][ T3272] RIP: 0033:0x459819 [ 920.232454][ T3272] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 920.252069][ T3272] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 920.260496][ T3272] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 920.268487][ T3272] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 920.276511][ T3272] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 920.284500][ T3272] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 920.292482][ T3272] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:18:37 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500), 0x97}) [ 920.729930][ T3285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:18:47 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x280000) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x3ff, 0x1, 0x3}) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f00000001c0)=@HCI_SCODATA_PKT={0x3, "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"}, 0x1001) 03:18:47 executing program 5 (fault-call:2 fault-nth:18): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:18:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa3000000000000070b000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:18:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000480)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0xfffffffffffffe95) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) dup(r3) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) getpid() setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) fsetxattr$security_capability(r3, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0x5, 0xb1}, {0x0, 0x5}]}, 0x14, 0x3) keyctl$describe(0x6, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f00000001c0)=""/44) perf_event_open$cgroup(&(0x7f00000024c0)={0x0, 0x70, 0x5, 0x0, 0x8000, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1c00000000000000, 0x100, 0x8, 0x3, 0x0, 0x0, 0x401, 0x9, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x9422, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xc}, 0x800, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5}, 0xffffffffffffffff, 0x7, 0xffffffffffffff9c, 0x1) 03:18:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500000000000000003f"], 0x14}}, 0x0) 03:18:47 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500), 0x97}) [ 929.974018][ T3298] FAULT_INJECTION: forcing a failure. [ 929.974018][ T3298] name failslab, interval 1, probability 0, space 0, times 0 03:18:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa3000000000000070d000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 930.017001][ T3298] CPU: 0 PID: 3298 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 930.024600][ T3298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.034669][ T3298] Call Trace: [ 930.038069][ T3298] dump_stack+0x172/0x1f0 [ 930.042422][ T3298] should_fail.cold+0xa/0x15 [ 930.047036][ T3298] ? __kasan_check_read+0x11/0x20 [ 930.052073][ T3298] ? fault_create_debugfs_attr+0x180/0x180 [ 930.057903][ T3298] __should_failslab+0x121/0x190 [ 930.062851][ T3298] should_failslab+0x9/0x14 03:18:47 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f00000000c0)=@HCI_EVENT_PKT={0x4, "8cdf9b5f4189916d6b1205e0571b9ffbec500692af4946f5e8bd439b57dee537264d347a1c499242cf678149f4b9fbee3e415fceb1afa340827f2aac84dab8e63127f8f2f24837e1f29c3426af214c6e8af612eac51b01f29b81fbe2aa3bccfd98c9659eb2ed256e7d4fe682d0404a5002abbc707e57ff2cd642675efd49ccc1ae"}, 0x82) write$vhci(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="046287d04c39025aecbd715d335252ba8d1fb6ede147c3c492042fea44"], 0x2) [ 930.067359][ T3298] kmem_cache_alloc_trace+0x4b/0x790 [ 930.072657][ T3298] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 930.078908][ T3298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 930.085157][ T3298] ? __ipv6_addr_type+0x219/0x32d [ 930.090187][ T3298] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 930.096089][ T3298] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 930.101827][ T3298] sctp_add_bind_addr+0x9f/0x3a0 [ 930.106790][ T3298] sctp_copy_local_addr_list+0x385/0x530 [ 930.112439][ T3298] ? sctp_defaults_init+0xbe0/0xbe0 03:18:47 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0xe01d59be6168dc5e) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4400) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7cda"], 0x2) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f00000000c0)={0xb, 0x6, 0x800}) [ 930.117652][ T3298] ? _get_random_bytes+0x1b0/0x430 [ 930.122781][ T3298] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 930.128686][ T3298] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 930.134947][ T3298] sctp_copy_one_addr+0x5f/0x170 [ 930.139897][ T3298] ? sctp_copy_one_addr+0x5f/0x170 [ 930.145028][ T3298] sctp_bind_addr_copy+0xfc/0x2c8 [ 930.150077][ T3298] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 930.156339][ T3298] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 930.161639][ T3298] ? mark_held_locks+0xa4/0xf0 [ 930.166420][ T3298] ? sctp_autobind+0x1e0/0x1e0 [ 930.171197][ T3298] ? lockdep_hardirqs_on+0x418/0x5d0 [ 930.176493][ T3298] ? lock_sock_nested+0x9a/0x120 [ 930.181447][ T3298] ? trace_hardirqs_on+0x67/0x240 [ 930.186481][ T3298] ? lock_sock_nested+0x9a/0x120 [ 930.191437][ T3298] ? __local_bh_enable_ip+0x15a/0x270 [ 930.196822][ T3298] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 930.203080][ T3298] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 930.208982][ T3298] sctp_sendmsg+0x125a/0x17d0 03:18:47 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x6ca9, 0x40400) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xfc, r2, 0x8, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xff, @empty, 0x6}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8f90}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd9e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'rose0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'veth0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1f}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40000}, 0x0) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40900, 0x0) write$P9_RRENAMEAT(r3, &(0x7f00000000c0)={0x7, 0x4b, 0x1}, 0x7) [ 930.213673][ T3298] ? sctp_id2assoc+0x2c0/0x2c0 [ 930.218440][ T3298] ? release_sock+0x156/0x1c0 [ 930.223117][ T3298] ? release_sock+0x156/0x1c0 [ 930.227812][ T3298] ? __local_bh_enable_ip+0x15a/0x270 [ 930.233207][ T3298] ? inet_autobind+0x144/0x1a0 [ 930.237979][ T3298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 930.244236][ T3298] inet_sendmsg+0x9e/0xe0 [ 930.248593][ T3298] ? inet_send_prepare+0x4f0/0x4f0 [ 930.248613][ T3298] sock_sendmsg+0xd7/0x130 [ 930.248632][ T3298] ___sys_sendmsg+0x803/0x920 [ 930.248653][ T3298] ? copy_msghdr_from_user+0x440/0x440 [ 930.248676][ T3298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 930.248699][ T3298] ? __kasan_check_read+0x11/0x20 [ 930.258221][ T3298] ? __fget+0x384/0x560 [ 930.258258][ T3298] ? __fget_light+0x1a9/0x230 [ 930.258274][ T3298] ? __fdget+0x1b/0x20 [ 930.258291][ T3298] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 930.258321][ T3298] __sys_sendmsg+0x105/0x1d0 [ 930.268433][ T3298] ? __sys_sendmsg_sock+0xd0/0xd0 [ 930.268468][ T3298] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 930.268485][ T3298] ? do_syscall_64+0x26/0x6a0 [ 930.268500][ T3298] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 930.268520][ T3298] ? do_syscall_64+0x26/0x6a0 [ 930.279780][ T3298] __x64_sys_sendmsg+0x78/0xb0 [ 930.279802][ T3298] do_syscall_64+0xfd/0x6a0 [ 930.279823][ T3298] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 930.279835][ T3298] RIP: 0033:0x459819 [ 930.279856][ T3298] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:18:47 executing program 5 (fault-call:2 fault-nth:19): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:18:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000040"], 0x14}}, 0x0) 03:18:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") io_uring_setup(0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="2400000033001901000000000000000002000000ffd38d9b0c00010006000600894f0000fafbb35d679da823481cd39ccc67feb2591da834656c61e33066c82d41db363f9ee1e203b4fe498a6a0ac5f48684af1a9a22cf20daa1d8a0e12060"], 0x24}}, 0x0) [ 930.292843][ T3298] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 930.292860][ T3298] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 930.292869][ T3298] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 930.292878][ T3298] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 930.292888][ T3298] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 930.292897][ T3298] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 [ 930.508732][ T3333] openvswitch: netlink: Missing key (keys=40, expected=10000000) [ 930.519330][ T3331] FAULT_INJECTION: forcing a failure. [ 930.519330][ T3331] name failslab, interval 1, probability 0, space 0, times 0 [ 930.557371][ T3331] CPU: 0 PID: 3331 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 930.564967][ T3331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.575036][ T3331] Call Trace: [ 930.578351][ T3331] dump_stack+0x172/0x1f0 [ 930.582704][ T3331] should_fail.cold+0xa/0x15 [ 930.587301][ T3331] ? __kasan_check_read+0x11/0x20 [ 930.592339][ T3331] ? fault_create_debugfs_attr+0x180/0x180 [ 930.598174][ T3331] __should_failslab+0x121/0x190 [ 930.603131][ T3331] should_failslab+0x9/0x14 [ 930.607646][ T3331] kmem_cache_alloc_trace+0x4b/0x790 [ 930.612939][ T3331] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 930.619192][ T3331] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 930.625444][ T3331] ? __ipv6_addr_type+0x219/0x32d [ 930.630479][ T3331] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 930.636923][ T3331] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 930.642654][ T3331] sctp_add_bind_addr+0x9f/0x3a0 [ 930.647613][ T3331] sctp_copy_local_addr_list+0x385/0x530 [ 930.653256][ T3331] ? sctp_defaults_init+0xbe0/0xbe0 [ 930.658467][ T3331] ? _get_random_bytes+0x1b0/0x430 [ 930.663587][ T3331] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 930.669491][ T3331] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 930.675748][ T3331] sctp_copy_one_addr+0x5f/0x170 [ 930.680701][ T3331] ? sctp_copy_one_addr+0x5f/0x170 [ 930.685827][ T3331] sctp_bind_addr_copy+0xfc/0x2c8 [ 930.690876][ T3331] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 930.697129][ T3331] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 930.702425][ T3331] ? mark_held_locks+0xa4/0xf0 [ 930.707202][ T3331] ? sctp_autobind+0x1e0/0x1e0 [ 930.711972][ T3331] ? lockdep_hardirqs_on+0x418/0x5d0 [ 930.717265][ T3331] ? lock_sock_nested+0x9a/0x120 [ 930.722216][ T3331] ? trace_hardirqs_on+0x67/0x240 [ 930.727254][ T3331] ? lock_sock_nested+0x9a/0x120 [ 930.732205][ T3331] ? __local_bh_enable_ip+0x15a/0x270 [ 930.737587][ T3331] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 930.743838][ T3331] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 930.749749][ T3331] sctp_sendmsg+0x125a/0x17d0 [ 930.754453][ T3331] ? sctp_id2assoc+0x2c0/0x2c0 [ 930.759226][ T3331] ? release_sock+0x156/0x1c0 [ 930.763942][ T3331] ? release_sock+0x156/0x1c0 [ 930.768632][ T3331] ? __local_bh_enable_ip+0x15a/0x270 [ 930.774019][ T3331] ? inet_autobind+0x144/0x1a0 [ 930.778803][ T3331] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 930.785060][ T3331] inet_sendmsg+0x9e/0xe0 [ 930.789397][ T3331] ? inet_send_prepare+0x4f0/0x4f0 [ 930.794606][ T3331] sock_sendmsg+0xd7/0x130 [ 930.799037][ T3331] ___sys_sendmsg+0x803/0x920 [ 930.803737][ T3331] ? copy_msghdr_from_user+0x440/0x440 [ 930.809227][ T3331] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 930.815479][ T3331] ? __kasan_check_read+0x11/0x20 [ 930.820517][ T3331] ? __fget+0x384/0x560 [ 930.824701][ T3331] ? __fget_light+0x1a9/0x230 [ 930.829390][ T3331] ? __fdget+0x1b/0x20 [ 930.833469][ T3331] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 930.839723][ T3331] __sys_sendmsg+0x105/0x1d0 [ 930.844324][ T3331] ? __sys_sendmsg_sock+0xd0/0xd0 [ 930.849375][ T3331] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 930.854847][ T3331] ? do_syscall_64+0x26/0x6a0 [ 930.859534][ T3331] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 930.865618][ T3331] ? do_syscall_64+0x26/0x6a0 [ 930.870314][ T3331] __x64_sys_sendmsg+0x78/0xb0 [ 930.875093][ T3331] do_syscall_64+0xfd/0x6a0 [ 930.879613][ T3331] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 930.885511][ T3331] RIP: 0033:0x459819 [ 930.889416][ T3331] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:18:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000060"], 0x14}}, 0x0) [ 930.909034][ T3331] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 930.917489][ T3331] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 930.925476][ T3331] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 930.933463][ T3331] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 930.941448][ T3331] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 930.949479][ T3331] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:18:48 executing program 5 (fault-call:2 fault-nth:20): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 931.068197][ T3305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 931.095351][ T3326] openvswitch: netlink: Missing key (keys=40, expected=10000000) 03:18:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000000000ffffff9e"], 0x14}}, 0x0) 03:18:48 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c23", 0x97, 0x8}) 03:18:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa3000000000000070e000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:18:48 executing program 0: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500), 0x97}) [ 931.281117][ T3451] FAULT_INJECTION: forcing a failure. [ 931.281117][ T3451] name failslab, interval 1, probability 0, space 0, times 0 [ 931.308325][ T3451] CPU: 0 PID: 3451 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 931.315913][ T3451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 931.325972][ T3451] Call Trace: [ 931.329274][ T3451] dump_stack+0x172/0x1f0 [ 931.333617][ T3451] should_fail.cold+0xa/0x15 [ 931.338212][ T3451] ? __kasan_check_read+0x11/0x20 [ 931.343250][ T3451] ? fault_create_debugfs_attr+0x180/0x180 [ 931.349076][ T3451] __should_failslab+0x121/0x190 [ 931.354024][ T3451] should_failslab+0x9/0x14 [ 931.358538][ T3451] kmem_cache_alloc_trace+0x4b/0x790 [ 931.363831][ T3451] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 931.370079][ T3451] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 931.376329][ T3451] ? __ipv6_addr_type+0x219/0x32d [ 931.381363][ T3451] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 931.387267][ T3451] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 931.393003][ T3451] sctp_add_bind_addr+0x9f/0x3a0 [ 931.397958][ T3451] sctp_copy_local_addr_list+0x385/0x530 [ 931.403604][ T3451] ? sctp_defaults_init+0xbe0/0xbe0 [ 931.408821][ T3451] ? _get_random_bytes+0x1b0/0x430 [ 931.413944][ T3451] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 931.419850][ T3451] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 931.426104][ T3451] sctp_copy_one_addr+0x5f/0x170 03:18:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000ec0"], 0x14}}, 0x0) 03:18:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000711000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 931.431047][ T3451] ? sctp_copy_one_addr+0x5f/0x170 [ 931.436165][ T3451] sctp_bind_addr_copy+0xfc/0x2c8 [ 931.441204][ T3451] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 931.447462][ T3451] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 931.452765][ T3451] ? mark_held_locks+0xa4/0xf0 [ 931.457546][ T3451] ? sctp_autobind+0x1e0/0x1e0 [ 931.462322][ T3451] ? lockdep_hardirqs_on+0x418/0x5d0 [ 931.467620][ T3451] ? lock_sock_nested+0x9a/0x120 [ 931.472571][ T3451] ? trace_hardirqs_on+0x67/0x240 [ 931.477612][ T3451] ? lock_sock_nested+0x9a/0x120 [ 931.482560][ T3451] ? __local_bh_enable_ip+0x15a/0x270 [ 931.487945][ T3451] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 931.494200][ T3451] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 931.500111][ T3451] sctp_sendmsg+0x125a/0x17d0 [ 931.504814][ T3451] ? sctp_id2assoc+0x2c0/0x2c0 [ 931.509593][ T3451] ? release_sock+0x156/0x1c0 [ 931.514287][ T3451] ? release_sock+0x156/0x1c0 [ 931.518981][ T3451] ? __local_bh_enable_ip+0x15a/0x270 [ 931.524636][ T3451] ? inet_autobind+0x144/0x1a0 [ 931.529421][ T3451] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 931.535686][ T3451] inet_sendmsg+0x9e/0xe0 [ 931.540033][ T3451] ? inet_send_prepare+0x4f0/0x4f0 [ 931.545159][ T3451] sock_sendmsg+0xd7/0x130 [ 931.549588][ T3451] ___sys_sendmsg+0x803/0x920 [ 931.554279][ T3451] ? copy_msghdr_from_user+0x440/0x440 [ 931.559761][ T3451] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 931.566021][ T3451] ? __kasan_check_read+0x11/0x20 [ 931.571059][ T3451] ? __fget+0x384/0x560 [ 931.575256][ T3451] ? __fget_light+0x1a9/0x230 [ 931.579942][ T3451] ? __fdget+0x1b/0x20 [ 931.584022][ T3451] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 931.590289][ T3451] __sys_sendmsg+0x105/0x1d0 [ 931.594895][ T3451] ? __sys_sendmsg_sock+0xd0/0xd0 [ 931.599949][ T3451] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 931.605424][ T3451] ? do_syscall_64+0x26/0x6a0 [ 931.610113][ T3451] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 931.616201][ T3451] ? do_syscall_64+0x26/0x6a0 [ 931.620905][ T3451] __x64_sys_sendmsg+0x78/0xb0 [ 931.625686][ T3451] do_syscall_64+0xfd/0x6a0 [ 931.630211][ T3451] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 931.636113][ T3451] RIP: 0033:0x459819 [ 931.640006][ T3451] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 931.659602][ T3451] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 931.668183][ T3451] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 931.676199][ T3451] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 931.684167][ T3451] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 931.692139][ T3451] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 931.700120][ T3451] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 [ 932.353233][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:18:58 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="047b"], 0x2) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x214) ptrace$pokeuser(0x6, r2, 0x3, 0x8) delete_module(&(0x7f00000000c0)='/dev/sequencer\x00', 0x200) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$UI_DEV_DESTROY(r3, 0x5502) 03:18:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000000000aed"], 0x14}}, 0x0) 03:18:58 executing program 5 (fault-call:2 fault-nth:21): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:18:58 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c23", 0x97, 0x8}) 03:18:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000713000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:18:58 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000080)) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:18:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000714000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 940.881062][ T3481] FAULT_INJECTION: forcing a failure. [ 940.881062][ T3481] name failslab, interval 1, probability 0, space 0, times 0 [ 940.917490][ T3481] CPU: 0 PID: 3481 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 940.925086][ T3481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.935153][ T3481] Call Trace: [ 940.938457][ T3481] dump_stack+0x172/0x1f0 [ 940.942814][ T3481] should_fail.cold+0xa/0x15 [ 940.947423][ T3481] ? __kasan_check_read+0x11/0x20 [ 940.952460][ T3481] ? fault_create_debugfs_attr+0x180/0x180 [ 940.958286][ T3481] __should_failslab+0x121/0x190 [ 940.963235][ T3481] should_failslab+0x9/0x14 [ 940.967745][ T3481] kmem_cache_alloc_trace+0x4b/0x790 [ 940.973051][ T3481] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 940.979302][ T3481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 940.982209][ T3474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 940.985550][ T3481] ? __ipv6_addr_type+0x219/0x32d [ 940.985567][ T3481] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 940.985582][ T3481] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 940.985603][ T3481] sctp_add_bind_addr+0x9f/0x3a0 [ 940.985627][ T3481] sctp_copy_local_addr_list+0x385/0x530 [ 940.985649][ T3481] ? sctp_defaults_init+0xbe0/0xbe0 [ 940.985669][ T3481] ? _get_random_bytes+0x1b0/0x430 [ 940.985685][ T3481] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 940.985702][ T3481] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 940.985724][ T3481] sctp_copy_one_addr+0x5f/0x170 [ 940.985739][ T3481] ? sctp_copy_one_addr+0x5f/0x170 [ 940.985760][ T3481] sctp_bind_addr_copy+0xfc/0x2c8 [ 940.985793][ T3481] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 940.985816][ T3481] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 940.985839][ T3481] ? mark_held_locks+0xa4/0xf0 [ 941.073719][ T3481] ? sctp_autobind+0x1e0/0x1e0 [ 941.078503][ T3481] ? lockdep_hardirqs_on+0x418/0x5d0 [ 941.083798][ T3481] ? lock_sock_nested+0x9a/0x120 [ 941.088783][ T3481] ? trace_hardirqs_on+0x67/0x240 [ 941.093824][ T3481] ? lock_sock_nested+0x9a/0x120 [ 941.098776][ T3481] ? __local_bh_enable_ip+0x15a/0x270 [ 941.104157][ T3481] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 941.110406][ T3481] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 941.116312][ T3481] sctp_sendmsg+0x125a/0x17d0 [ 941.121014][ T3481] ? sctp_id2assoc+0x2c0/0x2c0 [ 941.125793][ T3481] ? release_sock+0x156/0x1c0 [ 941.130476][ T3481] ? release_sock+0x156/0x1c0 [ 941.135167][ T3481] ? __local_bh_enable_ip+0x15a/0x270 [ 941.140555][ T3481] ? inet_autobind+0x144/0x1a0 [ 941.145328][ T3481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 941.151583][ T3481] inet_sendmsg+0x9e/0xe0 [ 941.155921][ T3481] ? inet_send_prepare+0x4f0/0x4f0 [ 941.161045][ T3481] sock_sendmsg+0xd7/0x130 [ 941.165564][ T3481] ___sys_sendmsg+0x803/0x920 [ 941.170261][ T3481] ? copy_msghdr_from_user+0x440/0x440 [ 941.175740][ T3481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 941.182006][ T3481] ? __kasan_check_read+0x11/0x20 [ 941.187045][ T3481] ? __fget+0x384/0x560 [ 941.191234][ T3481] ? __fget_light+0x1a9/0x230 [ 941.195913][ T3481] ? __fdget+0x1b/0x20 [ 941.199990][ T3481] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 941.200013][ T3481] __sys_sendmsg+0x105/0x1d0 [ 941.210854][ T3481] ? __sys_sendmsg_sock+0xd0/0xd0 [ 941.215919][ T3481] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 941.221396][ T3481] ? do_syscall_64+0x26/0x6a0 [ 941.226090][ T3481] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.232179][ T3481] ? do_syscall_64+0x26/0x6a0 [ 941.236877][ T3481] __x64_sys_sendmsg+0x78/0xb0 [ 941.241654][ T3481] do_syscall_64+0xfd/0x6a0 [ 941.246171][ T3481] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.252071][ T3481] RIP: 0033:0x459819 [ 941.255970][ T3481] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:18:58 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c23", 0x97, 0x8}) 03:18:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa300000000000007c0000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:18:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000000000fffffff0"], 0x14}}, 0x0) [ 941.275582][ T3481] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 941.284002][ T3481] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 941.291982][ T3481] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 941.299961][ T3481] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 941.307948][ T3481] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 941.315929][ T3481] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:18:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500000000007fffffff"], 0x14}}, 0x0) 03:18:58 executing program 5 (fault-call:2 fault-nth:22): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 941.569158][ T3505] FAULT_INJECTION: forcing a failure. [ 941.569158][ T3505] name failslab, interval 1, probability 0, space 0, times 0 [ 941.582403][ T3505] CPU: 1 PID: 3505 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 941.589969][ T3505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.600037][ T3505] Call Trace: [ 941.603352][ T3505] dump_stack+0x172/0x1f0 [ 941.607757][ T3505] should_fail.cold+0xa/0x15 [ 941.612371][ T3505] ? fault_create_debugfs_attr+0x180/0x180 [ 941.618192][ T3505] ? preempt_schedule_irq+0xf3/0x160 [ 941.623494][ T3505] __should_failslab+0x121/0x190 [ 941.628444][ T3505] should_failslab+0x9/0x14 [ 941.632954][ T3505] kmem_cache_alloc_trace+0x4b/0x790 [ 941.638278][ T3505] ? sctp_v4_cmp_addr+0x16/0x1e0 [ 941.643224][ T3505] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 941.648783][ T3505] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 941.654518][ T3505] sctp_add_bind_addr+0x9f/0x3a0 [ 941.659477][ T3505] sctp_copy_local_addr_list+0x385/0x530 [ 941.665123][ T3505] ? sctp_defaults_init+0xbe0/0xbe0 [ 941.670337][ T3505] ? _get_random_bytes+0x1b0/0x430 [ 941.675463][ T3505] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 941.681370][ T3505] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 941.687634][ T3505] sctp_copy_one_addr+0x5f/0x170 [ 941.692587][ T3505] ? sctp_copy_one_addr+0x5f/0x170 [ 941.697714][ T3505] sctp_bind_addr_copy+0xfc/0x2c8 [ 941.702761][ T3505] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 941.709031][ T3505] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 941.714333][ T3505] ? mark_held_locks+0xa4/0xf0 [ 941.719107][ T3505] ? sctp_autobind+0x1e0/0x1e0 [ 941.723877][ T3505] ? lockdep_hardirqs_on+0x418/0x5d0 [ 941.729175][ T3505] ? lock_sock_nested+0x9a/0x120 [ 941.734123][ T3505] ? trace_hardirqs_on+0x67/0x240 [ 941.739155][ T3505] ? lock_sock_nested+0x9a/0x120 [ 941.744101][ T3505] ? __local_bh_enable_ip+0x15a/0x270 [ 941.749483][ T3505] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 941.755735][ T3505] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 941.761647][ T3505] sctp_sendmsg+0x125a/0x17d0 [ 941.766347][ T3505] ? sctp_id2assoc+0x2c0/0x2c0 [ 941.771120][ T3505] ? release_sock+0x156/0x1c0 [ 941.775805][ T3505] ? release_sock+0x156/0x1c0 [ 941.780493][ T3505] ? __local_bh_enable_ip+0x15a/0x270 [ 941.785880][ T3505] ? inet_autobind+0x144/0x1a0 [ 941.790924][ T3505] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 941.797299][ T3505] inet_sendmsg+0x9e/0xe0 [ 941.801642][ T3505] ? inet_send_prepare+0x4f0/0x4f0 [ 941.806764][ T3505] sock_sendmsg+0xd7/0x130 [ 941.811193][ T3505] ___sys_sendmsg+0x803/0x920 [ 941.815881][ T3505] ? copy_msghdr_from_user+0x440/0x440 [ 941.821359][ T3505] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 941.827609][ T3505] ? __kasan_check_read+0x11/0x20 [ 941.832645][ T3505] ? __fget+0x384/0x560 [ 941.836830][ T3505] ? __fget_light+0x1a9/0x230 [ 941.841518][ T3505] ? __fdget+0x1b/0x20 [ 941.845598][ T3505] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 941.851852][ T3505] __sys_sendmsg+0x105/0x1d0 [ 941.856456][ T3505] ? __sys_sendmsg_sock+0xd0/0xd0 [ 941.861506][ T3505] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 941.866979][ T3505] ? do_syscall_64+0x26/0x6a0 [ 941.871664][ T3505] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.877745][ T3505] ? do_syscall_64+0x26/0x6a0 [ 941.882444][ T3505] __x64_sys_sendmsg+0x78/0xb0 [ 941.887223][ T3505] do_syscall_64+0xfd/0x6a0 [ 941.891743][ T3505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.897638][ T3505] RIP: 0033:0x459819 [ 941.901546][ T3505] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 941.921157][ T3505] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 941.929581][ T3505] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 941.937562][ T3505] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 941.945543][ T3505] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 941.953519][ T3505] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 941.961496][ T3505] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 [ 942.154742][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:19:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x40000, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f00000000c0)={0x3, 0x1ff, 0x2, 0x500000000, 0x7fffffff}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="0630eb42"], 0x2) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000400)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000540)={'vcan0\x00', 0x0}) getpeername$packet(r0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000680)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000006c0)={@ipv4={[], [], @loopback}, 0x0}, &(0x7f0000000700)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000740)={0x0, @multicast1, @remote}, &(0x7f0000000780)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f00000008c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001e40)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001f40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001f80)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000002080)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000020c0)={@mcast1, 0x0}, &(0x7f0000002100)=0x14) getpeername$packet(r0, &(0x7f0000002140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002180)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000021c0)={@empty, @rand_addr, 0x0}, &(0x7f0000002200)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000023c0)={@dev, 0x0}, &(0x7f0000002400)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004640)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000004740)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004780)={'veth0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000047c0)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f00000048c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000004900)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000004a00)=0xe8) accept$packet(r0, &(0x7f0000004b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004b40)=0x14) accept4$packet(r0, &(0x7f0000004c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004c40)=0x14, 0x80800) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000055c0)={0x0, @multicast2, @remote}, &(0x7f0000005600)=0xc) getpeername(r0, &(0x7f0000005640)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000056c0)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005700)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) getpeername$packet(r0, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005940)=0x14) recvmsg(r0, &(0x7f0000006bc0)={&(0x7f0000005a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000006b80)=[{&(0x7f0000005ac0)=""/4096, 0x1000}, {&(0x7f0000006ac0)=""/162, 0xa2}], 0x2}, 0x40) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000006c00)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000006d00)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000006e00)={0x0, @initdev}, &(0x7f0000006e40)=0xc) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000007940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1100410}, 0xc, &(0x7f0000007900)={&(0x7f0000006e80)={0xa70, r2, 0x24, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x74, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r5}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7e3}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x1f8, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x95}}, {0x8, 0x6, r12}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0xffffffff, 0x80000000, 0x7fff, 0xe218}, {0x4e, 0x56, 0x80, 0xff}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xe5eb}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r15}, {0x50, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r16}, {0x1a0, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xec63}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r19}, {0x1dc, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x10000}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xc00000000}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r22}, {0x288, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r23}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r24}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r25}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfd09}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r28}, {0xd0, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x8, 0x3, 0x20, 0x7fff}, {0x0, 0x200, 0xfffffffffffffffc, 0x3f}, {0x9, 0x1, 0xdae, 0x10000}, {0x82, 0x32eb, 0xffffffff, 0x6}]}}}]}}]}, 0xa70}, 0x1, 0x0, 0x0, 0x40}, 0x20000081) 03:19:08 executing program 5 (fault-call:2 fault-nth:23): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:19:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000000000ffffffff"], 0x14}}, 0x0) 03:19:08 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080", 0x97, 0xc}) 03:19:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703020028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:19:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) recvfrom$inet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x10000, 0x0, 0xfffffd1c) [ 951.098221][ T3514] Unknown ioctl 22018 [ 951.144426][ T3514] Unknown ioctl 35123 [ 951.157602][ T3520] FAULT_INJECTION: forcing a failure. [ 951.157602][ T3520] name failslab, interval 1, probability 0, space 0, times 0 [ 951.177476][ T3514] Unknown ioctl 35123 [ 951.188073][ T3514] Unknown ioctl 35123 03:19:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703040028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 951.196679][ T3514] Unknown ioctl 35123 [ 951.201739][ T3514] Unknown ioctl 35123 [ 951.211704][ T3520] CPU: 1 PID: 3520 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 951.219292][ T3520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.229352][ T3520] Call Trace: [ 951.232655][ T3520] dump_stack+0x172/0x1f0 [ 951.237013][ T3520] should_fail.cold+0xa/0x15 [ 951.241603][ T3520] ? __kasan_check_read+0x11/0x20 [ 951.246628][ T3520] ? fault_create_debugfs_attr+0x180/0x180 [ 951.252439][ T3520] __should_failslab+0x121/0x190 [ 951.257374][ T3520] should_failslab+0x9/0x14 [ 951.261869][ T3520] kmem_cache_alloc_trace+0x4b/0x790 [ 951.267154][ T3520] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 951.273394][ T3520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.279638][ T3520] ? __ipv6_addr_type+0x219/0x32d [ 951.284659][ T3520] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 951.290548][ T3520] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 951.296268][ T3520] sctp_add_bind_addr+0x9f/0x3a0 [ 951.301216][ T3520] sctp_copy_local_addr_list+0x385/0x530 [ 951.306856][ T3520] ? sctp_defaults_init+0xbe0/0xbe0 [ 951.312053][ T3520] ? _get_random_bytes+0x1b0/0x430 [ 951.317165][ T3520] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 951.323056][ T3520] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 951.329301][ T3520] sctp_copy_one_addr+0x5f/0x170 [ 951.334238][ T3520] ? sctp_copy_one_addr+0x5f/0x170 [ 951.339355][ T3520] sctp_bind_addr_copy+0xfc/0x2c8 [ 951.344392][ T3520] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 951.350640][ T3520] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 951.355927][ T3520] ? mark_held_locks+0xa4/0xf0 [ 951.360690][ T3520] ? sctp_autobind+0x1e0/0x1e0 [ 951.365448][ T3520] ? lockdep_hardirqs_on+0x418/0x5d0 [ 951.370729][ T3520] ? lock_sock_nested+0x9a/0x120 [ 951.375670][ T3520] ? trace_hardirqs_on+0x67/0x240 [ 951.380691][ T3520] ? lock_sock_nested+0x9a/0x120 [ 951.385627][ T3520] ? __local_bh_enable_ip+0x15a/0x270 [ 951.391004][ T3520] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 951.397242][ T3520] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 951.403141][ T3520] sctp_sendmsg+0x125a/0x17d0 [ 951.407828][ T3520] ? sctp_id2assoc+0x2c0/0x2c0 [ 951.412586][ T3520] ? release_sock+0x156/0x1c0 [ 951.417260][ T3520] ? release_sock+0x156/0x1c0 [ 951.421945][ T3520] ? __local_bh_enable_ip+0x15a/0x270 [ 951.427322][ T3520] ? inet_autobind+0x144/0x1a0 [ 951.432086][ T3520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.438324][ T3520] inet_sendmsg+0x9e/0xe0 [ 951.442649][ T3520] ? inet_send_prepare+0x4f0/0x4f0 [ 951.447761][ T3520] sock_sendmsg+0xd7/0x130 [ 951.452181][ T3520] ___sys_sendmsg+0x803/0x920 [ 951.456860][ T3520] ? copy_msghdr_from_user+0x440/0x440 [ 951.462324][ T3520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.468569][ T3520] ? __kasan_check_read+0x11/0x20 [ 951.473602][ T3520] ? __fget+0x384/0x560 [ 951.477776][ T3520] ? __fget_light+0x1a9/0x230 [ 951.482460][ T3520] ? __fdget+0x1b/0x20 [ 951.486530][ T3520] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 951.492782][ T3520] __sys_sendmsg+0x105/0x1d0 [ 951.497382][ T3520] ? __sys_sendmsg_sock+0xd0/0xd0 [ 951.502436][ T3520] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 951.507899][ T3520] ? do_syscall_64+0x26/0x6a0 [ 951.512578][ T3520] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.518648][ T3520] ? do_syscall_64+0x26/0x6a0 [ 951.523331][ T3520] __x64_sys_sendmsg+0x78/0xb0 [ 951.528106][ T3520] do_syscall_64+0xfd/0x6a0 [ 951.532618][ T3520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.538516][ T3520] RIP: 0033:0x459819 [ 951.542409][ T3520] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 951.562017][ T3520] RSP: 002b:00007f16c2978c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 951.570439][ T3520] RAX: ffffffffffffffda RBX: 00007f16c2978c90 RCX: 0000000000459819 [ 951.578424][ T3520] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 951.586401][ T3520] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 03:19:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000f0ffffffffffff"], 0x14}}, 0x0) [ 951.594380][ T3520] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c29796d4 [ 951.602364][ T3520] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:19:08 executing program 5 (fault-call:2 fault-nth:24): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 951.794078][ T3533] FAULT_INJECTION: forcing a failure. [ 951.794078][ T3533] name failslab, interval 1, probability 0, space 0, times 0 [ 951.860023][ T3533] CPU: 0 PID: 3533 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 951.867637][ T3533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.877705][ T3533] Call Trace: [ 951.881017][ T3533] dump_stack+0x172/0x1f0 [ 951.885376][ T3533] should_fail.cold+0xa/0x15 [ 951.889983][ T3533] ? __kasan_check_read+0x11/0x20 [ 951.895024][ T3533] ? fault_create_debugfs_attr+0x180/0x180 [ 951.900858][ T3533] __should_failslab+0x121/0x190 [ 951.905820][ T3533] should_failslab+0x9/0x14 [ 951.910332][ T3533] kmem_cache_alloc_trace+0x4b/0x790 [ 951.915628][ T3533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 951.921895][ T3533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.928155][ T3533] ? __ipv6_addr_type+0x219/0x32d [ 951.933191][ T3533] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 951.939084][ T3533] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 951.944822][ T3533] sctp_add_bind_addr+0x9f/0x3a0 [ 951.949785][ T3533] sctp_copy_local_addr_list+0x385/0x530 [ 951.955428][ T3533] ? sctp_defaults_init+0xbe0/0xbe0 [ 951.960640][ T3533] ? _get_random_bytes+0x1b0/0x430 [ 951.965758][ T3533] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 951.971671][ T3533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 951.977929][ T3533] sctp_copy_one_addr+0x5f/0x170 [ 951.982875][ T3533] ? sctp_copy_one_addr+0x5f/0x170 [ 951.987999][ T3533] sctp_bind_addr_copy+0xfc/0x2c8 [ 951.993040][ T3533] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 951.999295][ T3533] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 952.004599][ T3533] ? mark_held_locks+0xa4/0xf0 [ 952.009729][ T3533] ? sctp_autobind+0x1e0/0x1e0 [ 952.014512][ T3533] ? lockdep_hardirqs_on+0x418/0x5d0 [ 952.019812][ T3533] ? lock_sock_nested+0x9a/0x120 [ 952.024763][ T3533] ? trace_hardirqs_on+0x67/0x240 [ 952.029801][ T3533] ? lock_sock_nested+0x9a/0x120 [ 952.034748][ T3533] ? __local_bh_enable_ip+0x15a/0x270 [ 952.040163][ T3533] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 952.046415][ T3533] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 952.052352][ T3533] sctp_sendmsg+0x125a/0x17d0 [ 952.057052][ T3533] ? sctp_id2assoc+0x2c0/0x2c0 [ 952.061825][ T3533] ? release_sock+0x156/0x1c0 [ 952.066509][ T3533] ? release_sock+0x156/0x1c0 [ 952.071193][ T3533] ? __local_bh_enable_ip+0x15a/0x270 [ 952.076649][ T3533] ? inet_autobind+0x144/0x1a0 [ 952.081433][ T3533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 952.087688][ T3533] inet_sendmsg+0x9e/0xe0 [ 952.092024][ T3533] ? inet_send_prepare+0x4f0/0x4f0 [ 952.097147][ T3533] sock_sendmsg+0xd7/0x130 [ 952.101578][ T3533] ___sys_sendmsg+0x803/0x920 [ 952.106269][ T3533] ? copy_msghdr_from_user+0x440/0x440 [ 952.111746][ T3533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 952.118007][ T3533] ? __kasan_check_read+0x11/0x20 [ 952.123066][ T3533] ? __fget+0x384/0x560 [ 952.127251][ T3533] ? __fget_light+0x1a9/0x230 [ 952.131940][ T3533] ? __fdget+0x1b/0x20 [ 952.136016][ T3533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 952.142267][ T3533] __sys_sendmsg+0x105/0x1d0 [ 952.146954][ T3533] ? __sys_sendmsg_sock+0xd0/0xd0 [ 952.152007][ T3533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 952.157471][ T3533] ? do_syscall_64+0x26/0x6a0 [ 952.162154][ T3533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.168231][ T3533] ? do_syscall_64+0x26/0x6a0 [ 952.172920][ T3533] __x64_sys_sendmsg+0x78/0xb0 [ 952.177698][ T3533] do_syscall_64+0xfd/0x6a0 [ 952.182210][ T3533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.188103][ T3533] RIP: 0033:0x459819 [ 952.192003][ T3533] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:19:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) recvfrom$inet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x10000, 0x0, 0xfffffd1c) 03:19:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000002000000000000"], 0x14}}, 0x0) [ 952.211619][ T3533] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 952.220042][ T3533] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 952.228025][ T3533] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 952.236009][ T3533] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 952.243988][ T3533] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 952.251963][ T3533] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:19:09 executing program 5 (fault-call:2 fault-nth:25): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 952.406393][ T3539] FAULT_INJECTION: forcing a failure. [ 952.406393][ T3539] name failslab, interval 1, probability 0, space 0, times 0 [ 952.420430][ T3523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 952.452431][ T3539] CPU: 0 PID: 3539 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 952.460044][ T3539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.470117][ T3539] Call Trace: [ 952.473448][ T3539] dump_stack+0x172/0x1f0 [ 952.477827][ T3539] should_fail.cold+0xa/0x15 [ 952.482444][ T3539] ? __kasan_check_read+0x11/0x20 [ 952.487494][ T3539] ? fault_create_debugfs_attr+0x180/0x180 [ 952.493329][ T3539] __should_failslab+0x121/0x190 [ 952.498286][ T3539] should_failslab+0x9/0x14 [ 952.502807][ T3539] kmem_cache_alloc_trace+0x4b/0x790 [ 952.508191][ T3539] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 952.514444][ T3539] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 952.520696][ T3539] ? __ipv6_addr_type+0x219/0x32d [ 952.525740][ T3539] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 952.533151][ T3539] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 952.538884][ T3539] sctp_add_bind_addr+0x9f/0x3a0 [ 952.543844][ T3539] sctp_copy_local_addr_list+0x385/0x530 [ 952.549498][ T3539] ? sctp_defaults_init+0xbe0/0xbe0 [ 952.554797][ T3539] ? _get_random_bytes+0x1b0/0x430 [ 952.559928][ T3539] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 952.565839][ T3539] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 952.572099][ T3539] sctp_copy_one_addr+0x5f/0x170 [ 952.577051][ T3539] ? sctp_copy_one_addr+0x5f/0x170 [ 952.582194][ T3539] sctp_bind_addr_copy+0xfc/0x2c8 [ 952.587238][ T3539] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 952.593583][ T3539] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 952.598882][ T3539] ? mark_held_locks+0xa4/0xf0 [ 952.603655][ T3539] ? sctp_autobind+0x1e0/0x1e0 [ 952.608430][ T3539] ? lockdep_hardirqs_on+0x418/0x5d0 [ 952.613725][ T3539] ? lock_sock_nested+0x9a/0x120 [ 952.618670][ T3539] ? trace_hardirqs_on+0x67/0x240 [ 952.623701][ T3539] ? lock_sock_nested+0x9a/0x120 [ 952.628656][ T3539] ? __local_bh_enable_ip+0x15a/0x270 [ 952.634539][ T3539] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 952.640797][ T3539] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 952.646706][ T3539] sctp_sendmsg+0x125a/0x17d0 [ 952.651407][ T3539] ? sctp_id2assoc+0x2c0/0x2c0 [ 952.656179][ T3539] ? release_sock+0x156/0x1c0 [ 952.660866][ T3539] ? release_sock+0x156/0x1c0 [ 952.665556][ T3539] ? __local_bh_enable_ip+0x15a/0x270 [ 952.670942][ T3539] ? inet_autobind+0x144/0x1a0 [ 952.675720][ T3539] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 952.681982][ T3539] inet_sendmsg+0x9e/0xe0 [ 952.686331][ T3539] ? inet_send_prepare+0x4f0/0x4f0 [ 952.691449][ T3539] sock_sendmsg+0xd7/0x130 [ 952.695881][ T3539] ___sys_sendmsg+0x803/0x920 [ 952.700582][ T3539] ? copy_msghdr_from_user+0x440/0x440 [ 952.706063][ T3539] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 952.712321][ T3539] ? __kasan_check_read+0x11/0x20 [ 952.717359][ T3539] ? __fget+0x384/0x560 [ 952.721554][ T3539] ? __fget_light+0x1a9/0x230 [ 952.726249][ T3539] ? __fdget+0x1b/0x20 [ 952.730338][ T3539] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 952.736608][ T3539] __sys_sendmsg+0x105/0x1d0 [ 952.741221][ T3539] ? __sys_sendmsg_sock+0xd0/0xd0 [ 952.746273][ T3539] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 952.751758][ T3539] ? do_syscall_64+0x26/0x6a0 [ 952.756455][ T3539] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.762528][ T3539] ? do_syscall_64+0x26/0x6a0 [ 952.767224][ T3539] __x64_sys_sendmsg+0x78/0xb0 [ 952.772005][ T3539] do_syscall_64+0xfd/0x6a0 [ 952.776529][ T3539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.782428][ T3539] RIP: 0033:0x459819 [ 952.786335][ T3539] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 952.805950][ T3539] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 952.814407][ T3539] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 952.822399][ T3539] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 952.830389][ T3539] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 952.838367][ T3539] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 952.846354][ T3539] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:19:18 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080", 0x97, 0xc}) 03:19:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000003000000000000"], 0x14}}, 0x0) 03:19:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703080028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:19:18 executing program 0: io_setup(0x1, &(0x7f0000000280)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'\x00\x00\x00\x01\x00\x00\x00\x00c\x00\x02\x00', 0x5003}) io_submit(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, 0x0}]) 03:19:18 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000080)=@HCI_SCODATA_PKT={0x3, "802dc90ab381"}, 0x7) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:19:18 executing program 5 (fault-call:2 fault-nth:26): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 961.325735][ T3552] FAULT_INJECTION: forcing a failure. [ 961.325735][ T3552] name failslab, interval 1, probability 0, space 0, times 0 [ 961.371238][ T3552] CPU: 0 PID: 3552 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 961.378841][ T3552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 961.388903][ T3552] Call Trace: [ 961.392223][ T3552] dump_stack+0x172/0x1f0 [ 961.396582][ T3552] should_fail.cold+0xa/0x15 [ 961.401188][ T3552] ? __kasan_check_read+0x11/0x20 [ 961.406235][ T3552] ? fault_create_debugfs_attr+0x180/0x180 [ 961.412059][ T3552] __should_failslab+0x121/0x190 [ 961.417010][ T3552] should_failslab+0x9/0x14 [ 961.421571][ T3552] kmem_cache_alloc_trace+0x4b/0x790 [ 961.426874][ T3552] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 961.433128][ T3552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 961.439384][ T3552] ? __ipv6_addr_type+0x219/0x32d [ 961.444423][ T3552] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 961.450326][ T3552] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 961.456332][ T3552] sctp_add_bind_addr+0x9f/0x3a0 [ 961.461294][ T3552] sctp_copy_local_addr_list+0x385/0x530 03:19:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa300000000000007030a0028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:19:18 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0400a9ddc7ceed890aa40c8f334570f8f085d442664e733df44242834539cba96e9512b19782f3ac0ccef8aaf890306bd766a76e6a9d9049e1c899ed1dc60bc9f44ec3579bf330d3b38506000000000000004e9c0a3cb6407cb79ae9bb41065f21b2f2f97bc7545d0120de66808831ed2939aca82fdb901923c2c5940d41ae5fd870110e92dc069ffd0971b6b68e5f8a15eb3c6300d7fbcc8ae2ca02e783868c69367b399ac28e3fda23a6793520e6c43f00b0da0e23297fdc604e3bfa54019a4b519b275f9b8d9a25a066284e21c572b90f98c8bcc34d89"], 0x2) [ 961.466939][ T3552] ? sctp_defaults_init+0xbe0/0xbe0 [ 961.472154][ T3552] ? _get_random_bytes+0x1b0/0x430 [ 961.477277][ T3552] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 961.483190][ T3552] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 961.489457][ T3552] sctp_copy_one_addr+0x5f/0x170 [ 961.494415][ T3552] ? sctp_copy_one_addr+0x5f/0x170 [ 961.499541][ T3552] sctp_bind_addr_copy+0xfc/0x2c8 [ 961.499569][ T3552] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 961.499591][ T3552] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 961.499615][ T3552] ? mark_held_locks+0xa4/0xf0 [ 961.510869][ T3552] ? sctp_autobind+0x1e0/0x1e0 [ 961.510887][ T3552] ? lockdep_hardirqs_on+0x418/0x5d0 [ 961.510903][ T3552] ? lock_sock_nested+0x9a/0x120 [ 961.510920][ T3552] ? trace_hardirqs_on+0x67/0x240 [ 961.510935][ T3552] ? lock_sock_nested+0x9a/0x120 [ 961.510956][ T3552] ? __local_bh_enable_ip+0x15a/0x270 [ 961.521000][ T3552] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 961.521021][ T3552] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 961.521041][ T3552] sctp_sendmsg+0x125a/0x17d0 [ 961.521073][ T3552] ? sctp_id2assoc+0x2c0/0x2c0 [ 961.531109][ T3552] ? release_sock+0x156/0x1c0 [ 961.531127][ T3552] ? release_sock+0x156/0x1c0 [ 961.531147][ T3552] ? __local_bh_enable_ip+0x15a/0x270 [ 961.531172][ T3552] ? inet_autobind+0x144/0x1a0 [ 961.531190][ T3552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 961.531210][ T3552] inet_sendmsg+0x9e/0xe0 [ 961.541152][ T3552] ? inet_send_prepare+0x4f0/0x4f0 [ 961.541172][ T3552] sock_sendmsg+0xd7/0x130 [ 961.541191][ T3552] ___sys_sendmsg+0x803/0x920 [ 961.541211][ T3552] ? copy_msghdr_from_user+0x440/0x440 [ 961.541235][ T3552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 961.551526][ T3552] ? __kasan_check_read+0x11/0x20 [ 961.551548][ T3552] ? __fget+0x384/0x560 [ 961.551584][ T3552] ? __fget_light+0x1a9/0x230 [ 961.551603][ T3552] ? __fdget+0x1b/0x20 [ 961.563742][ T3552] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 961.563768][ T3552] __sys_sendmsg+0x105/0x1d0 [ 961.563795][ T3552] ? __sys_sendmsg_sock+0xd0/0xd0 [ 961.563826][ T3552] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 961.563841][ T3552] ? do_syscall_64+0x26/0x6a0 [ 961.563854][ T3552] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 961.563868][ T3552] ? do_syscall_64+0x26/0x6a0 [ 961.563887][ T3552] __x64_sys_sendmsg+0x78/0xb0 [ 961.563904][ T3552] do_syscall_64+0xfd/0x6a0 [ 961.563922][ T3552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 961.563941][ T3552] RIP: 0033:0x459819 [ 961.702760][ T3552] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:19:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000004000000000000"], 0x14}}, 0x0) [ 961.722364][ T3552] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 961.730782][ T3552] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 961.738761][ T3552] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 961.746735][ T3552] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 961.754716][ T3552] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 961.762682][ T3552] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:19:19 executing program 5 (fault-call:2 fault-nth:27): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:19:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500000a000000000000"], 0x14}}, 0x0) [ 961.928719][ T3573] FAULT_INJECTION: forcing a failure. [ 961.928719][ T3573] name failslab, interval 1, probability 0, space 0, times 0 [ 962.002148][ T3573] CPU: 0 PID: 3573 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 962.009750][ T3573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 962.019843][ T3573] Call Trace: [ 962.023154][ T3573] dump_stack+0x172/0x1f0 [ 962.027505][ T3573] should_fail.cold+0xa/0x15 [ 962.032110][ T3573] ? fault_create_debugfs_attr+0x180/0x180 [ 962.037934][ T3573] __should_failslab+0x121/0x190 [ 962.042882][ T3573] should_failslab+0x9/0x14 [ 962.047394][ T3573] kmem_cache_alloc_trace+0x4b/0x790 [ 962.052690][ T3573] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 962.058949][ T3573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 962.065216][ T3573] ? __ipv6_addr_type+0x219/0x32d [ 962.070250][ T3573] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 962.076150][ T3573] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 962.081983][ T3573] sctp_add_bind_addr+0x9f/0x3a0 [ 962.086937][ T3573] sctp_copy_local_addr_list+0x385/0x530 [ 962.092621][ T3573] ? sctp_defaults_init+0xbe0/0xbe0 [ 962.097838][ T3573] ? _get_random_bytes+0x1b0/0x430 [ 962.102963][ T3573] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 962.108871][ T3573] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 962.115140][ T3573] sctp_copy_one_addr+0x5f/0x170 [ 962.120175][ T3573] ? sctp_copy_one_addr+0x5f/0x170 [ 962.125298][ T3573] sctp_bind_addr_copy+0xfc/0x2c8 [ 962.130341][ T3573] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 962.136597][ T3573] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 962.141897][ T3573] ? mark_held_locks+0xa4/0xf0 [ 962.146697][ T3573] ? sctp_autobind+0x1e0/0x1e0 [ 962.151469][ T3573] ? lockdep_hardirqs_on+0x418/0x5d0 [ 962.157036][ T3573] ? lock_sock_nested+0x9a/0x120 [ 962.161991][ T3573] ? trace_hardirqs_on+0x67/0x240 [ 962.167019][ T3573] ? lock_sock_nested+0x9a/0x120 [ 962.171971][ T3573] ? __local_bh_enable_ip+0x15a/0x270 [ 962.177356][ T3573] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 962.183611][ T3573] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 962.189532][ T3573] sctp_sendmsg+0x125a/0x17d0 [ 962.194230][ T3573] ? sctp_id2assoc+0x2c0/0x2c0 [ 962.199005][ T3573] ? release_sock+0x156/0x1c0 [ 962.203694][ T3573] ? release_sock+0x156/0x1c0 [ 962.208370][ T3573] ? __local_bh_enable_ip+0x15a/0x270 [ 962.213750][ T3573] ? inet_autobind+0x144/0x1a0 [ 962.218536][ T3573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 962.224792][ T3573] inet_sendmsg+0x9e/0xe0 [ 962.229139][ T3573] ? inet_send_prepare+0x4f0/0x4f0 [ 962.234254][ T3573] sock_sendmsg+0xd7/0x130 [ 962.238685][ T3573] ___sys_sendmsg+0x803/0x920 [ 962.243376][ T3573] ? copy_msghdr_from_user+0x440/0x440 [ 962.248837][ T3573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 962.255079][ T3573] ? __kasan_check_read+0x11/0x20 [ 962.260133][ T3573] ? __fget+0x384/0x560 [ 962.264303][ T3573] ? __fget_light+0x1a9/0x230 [ 962.268970][ T3573] ? __fdget+0x1b/0x20 [ 962.273037][ T3573] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 962.279285][ T3573] __sys_sendmsg+0x105/0x1d0 [ 962.283880][ T3573] ? __sys_sendmsg_sock+0xd0/0xd0 [ 962.288935][ T3573] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 962.294417][ T3573] ? do_syscall_64+0x26/0x6a0 [ 962.299096][ T3573] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 962.305159][ T3573] ? do_syscall_64+0x26/0x6a0 [ 962.309850][ T3573] __x64_sys_sendmsg+0x78/0xb0 [ 962.314618][ T3573] do_syscall_64+0xfd/0x6a0 [ 962.319133][ T3573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 962.325018][ T3573] RIP: 0033:0x459819 [ 962.328897][ T3573] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 962.348491][ T3573] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 962.356896][ T3573] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 962.364900][ T3573] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 962.372879][ T3573] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 962.380849][ T3573] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 962.388802][ T3573] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:19:19 executing program 5 (fault-call:2 fault-nth:28): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 962.413681][ T3554] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 962.468708][ T3579] FAULT_INJECTION: forcing a failure. [ 962.468708][ T3579] name failslab, interval 1, probability 0, space 0, times 0 [ 962.481702][ T3579] CPU: 0 PID: 3579 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 962.489300][ T3579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 962.499365][ T3579] Call Trace: [ 962.502680][ T3579] dump_stack+0x172/0x1f0 [ 962.507033][ T3579] should_fail.cold+0xa/0x15 [ 962.511634][ T3579] ? __kasan_check_read+0x11/0x20 03:19:19 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080", 0x97, 0xc}) 03:19:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500000e000000000000"], 0x14}}, 0x0) 03:19:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa300000000000007030d0028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 962.516672][ T3579] ? fault_create_debugfs_attr+0x180/0x180 [ 962.522507][ T3579] __should_failslab+0x121/0x190 [ 962.527969][ T3579] should_failslab+0x9/0x14 [ 962.532483][ T3579] kmem_cache_alloc_trace+0x4b/0x790 [ 962.537790][ T3579] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 962.544048][ T3579] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 962.550323][ T3579] ? __ipv6_addr_type+0x219/0x32d [ 962.555351][ T3579] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 962.555364][ T3579] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 962.555382][ T3579] sctp_add_bind_addr+0x9f/0x3a0 [ 962.555413][ T3579] sctp_copy_local_addr_list+0x385/0x530 [ 962.555430][ T3579] ? sctp_defaults_init+0xbe0/0xbe0 [ 962.555448][ T3579] ? _get_random_bytes+0x1b0/0x430 [ 962.555474][ T3579] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 962.555490][ T3579] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 962.555511][ T3579] sctp_copy_one_addr+0x5f/0x170 [ 962.605007][ T3579] ? sctp_copy_one_addr+0x5f/0x170 [ 962.610137][ T3579] sctp_bind_addr_copy+0xfc/0x2c8 [ 962.615205][ T3579] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 962.621558][ T3579] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 962.626858][ T3579] ? mark_held_locks+0xa4/0xf0 [ 962.626882][ T3579] ? sctp_autobind+0x1e0/0x1e0 [ 962.626898][ T3579] ? lockdep_hardirqs_on+0x418/0x5d0 [ 962.637348][ T3579] ? lock_sock_nested+0x9a/0x120 [ 962.637364][ T3579] ? trace_hardirqs_on+0x67/0x240 [ 962.637377][ T3579] ? lock_sock_nested+0x9a/0x120 [ 962.637393][ T3579] ? __local_bh_enable_ip+0x15a/0x270 [ 962.637411][ T3579] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 962.637428][ T3579] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 962.637446][ T3579] sctp_sendmsg+0x125a/0x17d0 [ 962.637471][ T3579] ? sctp_id2assoc+0x2c0/0x2c0 [ 962.637484][ T3579] ? release_sock+0x156/0x1c0 [ 962.637499][ T3579] ? release_sock+0x156/0x1c0 [ 962.637515][ T3579] ? __local_bh_enable_ip+0x15a/0x270 [ 962.637537][ T3579] ? inet_autobind+0x144/0x1a0 [ 962.637552][ T3579] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 962.637570][ T3579] inet_sendmsg+0x9e/0xe0 [ 962.637584][ T3579] ? inet_send_prepare+0x4f0/0x4f0 [ 962.637600][ T3579] sock_sendmsg+0xd7/0x130 [ 962.637617][ T3579] ___sys_sendmsg+0x803/0x920 [ 962.637638][ T3579] ? copy_msghdr_from_user+0x440/0x440 [ 962.675253][ T3579] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 962.675274][ T3579] ? __kasan_check_read+0x11/0x20 [ 962.675294][ T3579] ? __fget+0x384/0x560 [ 962.675326][ T3579] ? __fget_light+0x1a9/0x230 [ 962.694086][ T3579] ? __fdget+0x1b/0x20 [ 962.694105][ T3579] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 962.694127][ T3579] __sys_sendmsg+0x105/0x1d0 [ 962.694144][ T3579] ? __sys_sendmsg_sock+0xd0/0xd0 [ 962.694174][ T3579] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 962.694190][ T3579] ? do_syscall_64+0x26/0x6a0 [ 962.694212][ T3579] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 962.694227][ T3579] ? do_syscall_64+0x26/0x6a0 [ 962.704563][ T3579] __x64_sys_sendmsg+0x78/0xb0 [ 962.704583][ T3579] do_syscall_64+0xfd/0x6a0 [ 962.704605][ T3579] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 962.704618][ T3579] RIP: 0033:0x459819 [ 962.704634][ T3579] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 962.704641][ T3579] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 962.704654][ T3579] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 962.704662][ T3579] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 962.704671][ T3579] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 962.704679][ T3579] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 962.704688][ T3579] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 [ 963.224866][ T3587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:19:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000007000/0x3000)=nil}) 03:19:20 executing program 5 (fault-call:2 fault-nth:29): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:19:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000060000000000000"], 0x14}}, 0x0) 03:19:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa300000000000007030e0028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 963.409689][ T3599] FAULT_INJECTION: forcing a failure. [ 963.409689][ T3599] name failslab, interval 1, probability 0, space 0, times 0 [ 963.434974][ T3599] CPU: 1 PID: 3599 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 963.442597][ T3599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.442605][ T3599] Call Trace: [ 963.442632][ T3599] dump_stack+0x172/0x1f0 [ 963.442664][ T3599] should_fail.cold+0xa/0x15 [ 963.464916][ T3599] ? fault_create_debugfs_attr+0x180/0x180 [ 963.470753][ T3599] __should_failslab+0x121/0x190 [ 963.475699][ T3599] should_failslab+0x9/0x14 [ 963.475715][ T3599] kmem_cache_alloc_trace+0x4b/0x790 [ 963.475735][ T3599] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 963.475751][ T3599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 963.475774][ T3599] ? __ipv6_addr_type+0x219/0x32d [ 963.503285][ T3599] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 963.509200][ T3599] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 963.514948][ T3599] sctp_add_bind_addr+0x9f/0x3a0 [ 963.519912][ T3599] sctp_copy_local_addr_list+0x385/0x530 [ 963.525568][ T3599] ? sctp_defaults_init+0xbe0/0xbe0 [ 963.530787][ T3599] ? _get_random_bytes+0x1b0/0x430 [ 963.535949][ T3599] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 963.541863][ T3599] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 963.548129][ T3599] sctp_copy_one_addr+0x5f/0x170 [ 963.553078][ T3599] ? sctp_copy_one_addr+0x5f/0x170 [ 963.558213][ T3599] sctp_bind_addr_copy+0xfc/0x2c8 [ 963.563261][ T3599] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 963.569528][ T3599] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 963.574841][ T3599] ? mark_held_locks+0xa4/0xf0 [ 963.579621][ T3599] ? sctp_autobind+0x1e0/0x1e0 [ 963.584393][ T3599] ? lockdep_hardirqs_on+0x418/0x5d0 [ 963.589691][ T3599] ? lock_sock_nested+0x9a/0x120 [ 963.594655][ T3599] ? trace_hardirqs_on+0x67/0x240 [ 963.599689][ T3599] ? lock_sock_nested+0x9a/0x120 [ 963.599709][ T3599] ? __local_bh_enable_ip+0x15a/0x270 [ 963.599729][ T3599] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 963.599752][ T3599] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 963.610240][ T3599] sctp_sendmsg+0x125a/0x17d0 [ 963.610267][ T3599] ? sctp_id2assoc+0x2c0/0x2c0 [ 963.610294][ T3599] ? release_sock+0x156/0x1c0 [ 963.636955][ T3599] ? release_sock+0x156/0x1c0 [ 963.641649][ T3599] ? __local_bh_enable_ip+0x15a/0x270 [ 963.647185][ T3599] ? inet_autobind+0x144/0x1a0 [ 963.651965][ T3599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 963.658360][ T3599] inet_sendmsg+0x9e/0xe0 [ 963.658376][ T3599] ? inet_send_prepare+0x4f0/0x4f0 [ 963.658390][ T3599] sock_sendmsg+0xd7/0x130 [ 963.658406][ T3599] ___sys_sendmsg+0x803/0x920 [ 963.658423][ T3599] ? copy_msghdr_from_user+0x440/0x440 [ 963.658446][ T3599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 963.658468][ T3599] ? __kasan_check_read+0x11/0x20 [ 963.694071][ T3599] ? __fget+0x384/0x560 [ 963.698467][ T3599] ? __fget_light+0x1a9/0x230 [ 963.703158][ T3599] ? __fdget+0x1b/0x20 [ 963.707238][ T3599] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 963.707262][ T3599] __sys_sendmsg+0x105/0x1d0 [ 963.707286][ T3599] ? __sys_sendmsg_sock+0xd0/0xd0 [ 963.718116][ T3599] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 963.718133][ T3599] ? do_syscall_64+0x26/0x6a0 [ 963.718155][ T3599] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 963.739360][ T3599] ? do_syscall_64+0x26/0x6a0 [ 963.744072][ T3599] __x64_sys_sendmsg+0x78/0xb0 [ 963.748866][ T3599] do_syscall_64+0xfd/0x6a0 [ 963.753360][ T3599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 963.759315][ T3599] RIP: 0033:0x459819 [ 963.763209][ T3599] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 963.782825][ T3599] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 963.791238][ T3599] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 963.799225][ T3599] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 963.807195][ T3599] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 963.815159][ T3599] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 963.823125][ T3599] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:19:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703100028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:19:30 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="84a1facdfc779243e948e4a6feff"], 0x2) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) 03:19:30 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a", 0x97, 0xe}) 03:19:30 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="14ea0f34"], 0x4}}, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000140)={0x4}, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0xfffffffffffffffe, 0x0, 0x3}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:19:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000f0000000000000"], 0x14}}, 0x0) 03:19:30 executing program 5 (fault-call:2 fault-nth:30): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 973.473981][ T3608] FAULT_INJECTION: forcing a failure. [ 973.473981][ T3608] name failslab, interval 1, probability 0, space 0, times 0 03:19:30 executing program 0: quotactl(0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6fdbbb4705c50a82fec2e821148a730de33a49868c62b2ca654a6613b6aab", 0x4c}], 0x1}, 0x0) sched_setaffinity(0x0, 0x6, &(0x7f00000003c0)=0x9) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001380), 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)="2da85b07f7a224ab77ab8a705cc14edf9dc89f455d2e0e8bfe37702b7d0b240e5b7ded616cbe658b8550de8b2817f3da5e030f100e2e9883893c6e62c4387267cd8d9969", 0x44}], 0x1) [ 973.530328][ T3608] CPU: 0 PID: 3608 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 973.537928][ T3608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 973.548004][ T3608] Call Trace: [ 973.551318][ T3608] dump_stack+0x172/0x1f0 [ 973.555680][ T3608] should_fail.cold+0xa/0x15 [ 973.560285][ T3608] ? fault_create_debugfs_attr+0x180/0x180 [ 973.566115][ T3608] __should_failslab+0x121/0x190 [ 973.571067][ T3608] should_failslab+0x9/0x14 [ 973.575578][ T3608] kmem_cache_alloc_trace+0x4b/0x790 [ 973.580879][ T3608] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 973.585860][ T3621] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 973.587141][ T3608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 973.587160][ T3608] ? __ipv6_addr_type+0x219/0x32d [ 973.587176][ T3608] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 973.587192][ T3608] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 973.587213][ T3608] sctp_add_bind_addr+0x9f/0x3a0 [ 973.587243][ T3608] sctp_copy_local_addr_list+0x385/0x530 [ 973.596199][ T3621] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 973.601646][ T3608] ? sctp_defaults_init+0xbe0/0xbe0 [ 973.601669][ T3608] ? _get_random_bytes+0x1b0/0x430 [ 973.601687][ T3608] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 973.601704][ T3608] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 973.601740][ T3608] sctp_copy_one_addr+0x5f/0x170 [ 973.665430][ T3608] ? sctp_copy_one_addr+0x5f/0x170 [ 973.670575][ T3608] sctp_bind_addr_copy+0xfc/0x2c8 [ 973.675787][ T3608] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 973.682034][ T3608] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 973.687317][ T3608] ? mark_held_locks+0xa4/0xf0 [ 973.692070][ T3608] ? sctp_autobind+0x1e0/0x1e0 [ 973.696833][ T3608] ? lockdep_hardirqs_on+0x418/0x5d0 [ 973.702122][ T3608] ? lock_sock_nested+0x9a/0x120 [ 973.707061][ T3608] ? trace_hardirqs_on+0x67/0x240 [ 973.712091][ T3608] ? lock_sock_nested+0x9a/0x120 [ 973.717039][ T3608] ? __local_bh_enable_ip+0x15a/0x270 [ 973.722415][ T3608] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 973.728671][ T3608] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 973.734589][ T3608] sctp_sendmsg+0x125a/0x17d0 [ 973.739303][ T3608] ? sctp_id2assoc+0x2c0/0x2c0 [ 973.744100][ T3608] ? release_sock+0x156/0x1c0 [ 973.748788][ T3608] ? release_sock+0x156/0x1c0 [ 973.753466][ T3608] ? __local_bh_enable_ip+0x15a/0x270 [ 973.758837][ T3608] ? inet_autobind+0x144/0x1a0 [ 973.763617][ T3608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 973.769859][ T3608] inet_sendmsg+0x9e/0xe0 [ 973.774182][ T3608] ? inet_send_prepare+0x4f0/0x4f0 [ 973.779318][ T3608] sock_sendmsg+0xd7/0x130 [ 973.783736][ T3608] ___sys_sendmsg+0x803/0x920 [ 973.788400][ T3608] ? copy_msghdr_from_user+0x440/0x440 [ 973.794644][ T3608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 973.800889][ T3608] ? __kasan_check_read+0x11/0x20 [ 973.805913][ T3608] ? __fget+0x384/0x560 [ 973.810093][ T3608] ? __fget_light+0x1a9/0x230 [ 973.814775][ T3608] ? __fdget+0x1b/0x20 [ 973.818839][ T3608] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 973.825084][ T3608] __sys_sendmsg+0x105/0x1d0 [ 973.829661][ T3608] ? __sys_sendmsg_sock+0xd0/0xd0 [ 973.834680][ T3608] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 973.840143][ T3608] ? do_syscall_64+0x26/0x6a0 [ 973.844804][ T3608] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 973.850855][ T3608] ? do_syscall_64+0x26/0x6a0 [ 973.855536][ T3608] __x64_sys_sendmsg+0x78/0xb0 [ 973.860321][ T3608] do_syscall_64+0xfd/0x6a0 [ 973.864834][ T3608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 973.870708][ T3608] RIP: 0033:0x459819 [ 973.874587][ T3608] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 973.894189][ T3608] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 973.902608][ T3608] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 973.910612][ T3608] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 973.918609][ T3608] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:19:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000030000000000"], 0x14}}, 0x0) [ 973.926594][ T3608] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 973.934547][ T3608] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:19:31 executing program 5 (fault-call:2 fault-nth:31): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:19:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000000a0000000000"], 0x14}}, 0x0) [ 974.107696][ T3630] FAULT_INJECTION: forcing a failure. [ 974.107696][ T3630] name failslab, interval 1, probability 0, space 0, times 0 [ 974.174696][ T3630] CPU: 0 PID: 3630 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 974.182306][ T3630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 974.192376][ T3630] Call Trace: [ 974.195731][ T3630] dump_stack+0x172/0x1f0 [ 974.200101][ T3630] should_fail.cold+0xa/0x15 [ 974.204720][ T3630] ? fault_create_debugfs_attr+0x180/0x180 [ 974.210549][ T3630] __should_failslab+0x121/0x190 [ 974.215505][ T3630] should_failslab+0x9/0x14 [ 974.220017][ T3630] kmem_cache_alloc_trace+0x4b/0x790 [ 974.225321][ T3630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 974.231576][ T3630] ? __ipv6_addr_type+0x219/0x32d [ 974.236613][ T3630] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 974.242522][ T3630] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 974.248264][ T3630] sctp_add_bind_addr+0x9f/0x3a0 [ 974.253221][ T3630] sctp_copy_local_addr_list+0x385/0x530 [ 974.258867][ T3630] ? sctp_defaults_init+0xbe0/0xbe0 [ 974.264081][ T3630] ? _get_random_bytes+0x1b0/0x430 [ 974.269206][ T3630] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 974.275133][ T3630] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 974.281387][ T3630] sctp_copy_one_addr+0x5f/0x170 [ 974.286331][ T3630] ? sctp_copy_one_addr+0x5f/0x170 [ 974.291457][ T3630] sctp_bind_addr_copy+0xfc/0x2c8 [ 974.296498][ T3630] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 974.302755][ T3630] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 974.308059][ T3630] ? mark_held_locks+0xa4/0xf0 [ 974.312834][ T3630] ? sctp_autobind+0x1e0/0x1e0 [ 974.317604][ T3630] ? lockdep_hardirqs_on+0x418/0x5d0 [ 974.322894][ T3630] ? lock_sock_nested+0x9a/0x120 [ 974.327847][ T3630] ? trace_hardirqs_on+0x67/0x240 [ 974.332872][ T3630] ? lock_sock_nested+0x9a/0x120 [ 974.337817][ T3630] ? __local_bh_enable_ip+0x15a/0x270 [ 974.343198][ T3630] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 974.349449][ T3630] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 974.355354][ T3630] sctp_sendmsg+0x125a/0x17d0 [ 974.360052][ T3630] ? sctp_id2assoc+0x2c0/0x2c0 [ 974.364823][ T3630] ? release_sock+0x156/0x1c0 [ 974.369508][ T3630] ? release_sock+0x156/0x1c0 [ 974.374194][ T3630] ? __local_bh_enable_ip+0x15a/0x270 [ 974.379598][ T3630] ? inet_autobind+0x144/0x1a0 [ 974.384378][ T3630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 974.390640][ T3630] inet_sendmsg+0x9e/0xe0 [ 974.393150][ T3621] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 974.394982][ T3630] ? inet_send_prepare+0x4f0/0x4f0 [ 974.408258][ T3630] sock_sendmsg+0xd7/0x130 [ 974.412700][ T3630] ___sys_sendmsg+0x803/0x920 [ 974.417395][ T3630] ? copy_msghdr_from_user+0x440/0x440 [ 974.422873][ T3630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 974.429147][ T3630] ? __kasan_check_read+0x11/0x20 [ 974.434191][ T3630] ? __fget+0x384/0x560 [ 974.438377][ T3630] ? __fget_light+0x1a9/0x230 [ 974.439047][ T3621] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 974.443343][ T3630] ? __fdget+0x1b/0x20 [ 974.443361][ T3630] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 974.443381][ T3630] __sys_sendmsg+0x105/0x1d0 [ 974.443398][ T3630] ? __sys_sendmsg_sock+0xd0/0xd0 [ 974.443427][ T3630] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 974.443441][ T3630] ? do_syscall_64+0x26/0x6a0 [ 974.443456][ T3630] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 974.443476][ T3630] ? do_syscall_64+0x26/0x6a0 [ 974.474325][ T3619] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 974.477998][ T3630] __x64_sys_sendmsg+0x78/0xb0 [ 974.500091][ T3624] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 974.500504][ T3630] do_syscall_64+0xfd/0x6a0 [ 974.518079][ T3630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 974.523983][ T3630] RIP: 0033:0x459819 [ 974.529419][ T3630] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 974.533073][ T3624] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 974.549038][ T3630] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 974.549055][ T3630] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 03:19:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703180028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:19:31 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a", 0x97, 0xe}) [ 974.549062][ T3630] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 974.549069][ T3630] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 974.549077][ T3630] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 974.549084][ T3630] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:19:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000ed0a0000000000"], 0x14}}, 0x0) 03:19:31 executing program 5 (fault-call:2 fault-nth:32): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 974.647758][ T3623] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 974.719689][ T3623] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 974.768135][ T3644] FAULT_INJECTION: forcing a failure. [ 974.768135][ T3644] name failslab, interval 1, probability 0, space 0, times 0 [ 974.789329][ T3644] CPU: 0 PID: 3644 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 974.796914][ T3644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 974.807142][ T3644] Call Trace: [ 974.810463][ T3644] dump_stack+0x172/0x1f0 [ 974.814847][ T3644] should_fail.cold+0xa/0x15 [ 974.819458][ T3644] ? __kasan_check_read+0x11/0x20 [ 974.824505][ T3644] ? fault_create_debugfs_attr+0x180/0x180 [ 974.830344][ T3644] __should_failslab+0x121/0x190 [ 974.835298][ T3644] should_failslab+0x9/0x14 [ 974.839818][ T3644] kmem_cache_alloc_trace+0x4b/0x790 [ 974.845117][ T3644] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 974.851886][ T3644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 974.858150][ T3644] ? __ipv6_addr_type+0x219/0x32d [ 974.863193][ T3644] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 974.869106][ T3644] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 974.874840][ T3644] sctp_add_bind_addr+0x9f/0x3a0 [ 974.879794][ T3644] sctp_copy_local_addr_list+0x385/0x530 [ 974.885442][ T3644] ? sctp_defaults_init+0xbe0/0xbe0 [ 974.890661][ T3644] ? _get_random_bytes+0x1b0/0x430 [ 974.895790][ T3644] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 974.901706][ T3644] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 974.907973][ T3644] sctp_copy_one_addr+0x5f/0x170 [ 974.912922][ T3644] ? sctp_copy_one_addr+0x5f/0x170 [ 974.918049][ T3644] sctp_bind_addr_copy+0xfc/0x2c8 [ 974.923096][ T3644] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 974.929357][ T3644] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 974.934663][ T3644] ? mark_held_locks+0xa4/0xf0 [ 974.939447][ T3644] ? sctp_autobind+0x1e0/0x1e0 [ 974.944234][ T3644] ? lockdep_hardirqs_on+0x418/0x5d0 [ 974.949530][ T3644] ? lock_sock_nested+0x9a/0x120 [ 974.954480][ T3644] ? trace_hardirqs_on+0x67/0x240 [ 974.959521][ T3644] ? lock_sock_nested+0x9a/0x120 [ 974.964487][ T3644] ? __local_bh_enable_ip+0x15a/0x270 [ 974.969876][ T3644] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 974.976316][ T3644] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 974.982246][ T3644] sctp_sendmsg+0x125a/0x17d0 [ 974.986961][ T3644] ? sctp_id2assoc+0x2c0/0x2c0 [ 974.991738][ T3644] ? release_sock+0x156/0x1c0 [ 974.996430][ T3644] ? release_sock+0x156/0x1c0 [ 975.001142][ T3644] ? __local_bh_enable_ip+0x15a/0x270 [ 975.006535][ T3644] ? inet_autobind+0x144/0x1a0 [ 975.011328][ T3644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 975.017585][ T3644] inet_sendmsg+0x9e/0xe0 [ 975.021927][ T3644] ? inet_send_prepare+0x4f0/0x4f0 [ 975.027055][ T3644] sock_sendmsg+0xd7/0x130 [ 975.031484][ T3644] ___sys_sendmsg+0x803/0x920 [ 975.036177][ T3644] ? copy_msghdr_from_user+0x440/0x440 [ 975.041749][ T3644] ? __fget+0x384/0x560 [ 975.045941][ T3644] ? __fget_light+0x1a9/0x230 [ 975.050660][ T3644] ? __fdget+0x1b/0x20 [ 975.054746][ T3644] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 975.061008][ T3644] __sys_sendmsg+0x105/0x1d0 [ 975.065614][ T3644] ? __sys_sendmsg_sock+0xd0/0xd0 [ 975.070662][ T3644] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 975.076131][ T3644] ? do_syscall_64+0x26/0x6a0 [ 975.080817][ T3644] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 975.086892][ T3644] ? do_syscall_64+0x26/0x6a0 [ 975.091590][ T3644] __x64_sys_sendmsg+0x78/0xb0 [ 975.096370][ T3644] do_syscall_64+0xfd/0x6a0 [ 975.100921][ T3644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 975.106818][ T3644] RIP: 0033:0x459819 [ 975.110723][ T3644] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 975.130434][ T3644] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 975.138869][ T3644] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 975.146856][ T3644] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 975.154841][ T3644] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 975.162845][ T3644] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 975.170848][ T3644] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 [ 975.463917][ T3642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 975.481071][ T3624] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 975.496633][ T3624] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 975.520090][ T3624] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 975.539614][ T3624] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 975.550141][ T3623] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 975.567973][ T3623] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 975.581424][ T3624] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 975.599906][ T3624] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 975.611656][ T3624] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 975.620000][ T3624] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 975.629589][ T3624] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 975.638217][ T3624] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:19:40 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], 0x130f) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20100, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x80, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7, 0x21, 0x1}, 0x7) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000140)=0x81, 0x4) 03:19:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000000e0000000000"], 0x14}}, 0x0) 03:19:40 executing program 5 (fault-call:2 fault-nth:33): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:19:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703300028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:19:40 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a", 0x97, 0xe}) 03:19:40 executing program 0: r0 = getpgrp(0x0) setpriority(0x800000000001, r0, 0x0) [ 983.717421][ T3652] FAULT_INJECTION: forcing a failure. [ 983.717421][ T3652] name failslab, interval 1, probability 0, space 0, times 0 [ 983.755621][ T3652] CPU: 1 PID: 3652 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 983.763216][ T3652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.773288][ T3652] Call Trace: [ 983.776601][ T3652] dump_stack+0x172/0x1f0 [ 983.780954][ T3652] should_fail.cold+0xa/0x15 [ 983.785561][ T3652] ? __kasan_check_read+0x11/0x20 [ 983.790604][ T3652] ? fault_create_debugfs_attr+0x180/0x180 [ 983.796427][ T3652] __should_failslab+0x121/0x190 [ 983.801374][ T3652] should_failslab+0x9/0x14 [ 983.805893][ T3652] kmem_cache_alloc_trace+0x4b/0x790 [ 983.811186][ T3652] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 03:19:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703500028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 983.817442][ T3652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 983.823698][ T3652] ? __ipv6_addr_type+0x219/0x32d [ 983.828732][ T3652] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 983.834637][ T3652] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 983.840391][ T3652] sctp_add_bind_addr+0x9f/0x3a0 [ 983.845342][ T3652] sctp_copy_local_addr_list+0x385/0x530 [ 983.850988][ T3652] ? sctp_defaults_init+0xbe0/0xbe0 [ 983.856224][ T3652] ? _get_random_bytes+0x1b0/0x430 [ 983.861350][ T3652] ? __sanitizer_cov_trace_switch+0x49/0x80 03:19:41 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000080)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) [ 983.867258][ T3652] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 983.873530][ T3652] sctp_copy_one_addr+0x5f/0x170 [ 983.878566][ T3652] ? sctp_copy_one_addr+0x5f/0x170 [ 983.883693][ T3652] sctp_bind_addr_copy+0xfc/0x2c8 [ 983.888740][ T3652] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 983.894995][ T3652] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 983.900306][ T3652] ? mark_held_locks+0xa4/0xf0 [ 983.905083][ T3652] ? sctp_autobind+0x1e0/0x1e0 [ 983.909861][ T3652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 983.915156][ T3652] ? lock_sock_nested+0x9a/0x120 [ 983.915175][ T3652] ? trace_hardirqs_on+0x67/0x240 [ 983.915191][ T3652] ? lock_sock_nested+0x9a/0x120 [ 983.915209][ T3652] ? __local_bh_enable_ip+0x15a/0x270 [ 983.915228][ T3652] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 983.915246][ T3652] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 983.915277][ T3652] sctp_sendmsg+0x125a/0x17d0 [ 983.925229][ T3652] ? sctp_id2assoc+0x2c0/0x2c0 [ 983.925246][ T3652] ? release_sock+0x156/0x1c0 [ 983.925263][ T3652] ? release_sock+0x156/0x1c0 [ 983.925288][ T3652] ? __local_bh_enable_ip+0x15a/0x270 [ 983.925312][ T3652] ? inet_autobind+0x144/0x1a0 [ 983.925329][ T3652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 983.925349][ T3652] inet_sendmsg+0x9e/0xe0 [ 983.935680][ T3652] ? inet_send_prepare+0x4f0/0x4f0 [ 983.935697][ T3652] sock_sendmsg+0xd7/0x130 [ 983.935716][ T3652] ___sys_sendmsg+0x803/0x920 [ 983.935737][ T3652] ? copy_msghdr_from_user+0x440/0x440 [ 983.935760][ T3652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:19:41 executing program 5 (fault-call:2 fault-nth:34): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:19:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) sendto$inet(0xffffffffffffff9c, 0x0, 0x257, 0x4800, 0x0, 0x0) 03:19:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000c00e0000000000"], 0x14}}, 0x0) [ 983.935778][ T3652] ? __kasan_check_read+0x11/0x20 [ 983.935797][ T3652] ? __fget+0x384/0x560 [ 983.947927][ T3652] ? __fget_light+0x1a9/0x230 [ 983.947943][ T3652] ? __fdget+0x1b/0x20 [ 983.947961][ T3652] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 983.947983][ T3652] __sys_sendmsg+0x105/0x1d0 [ 983.948003][ T3652] ? __sys_sendmsg_sock+0xd0/0xd0 [ 983.962106][ T3652] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 983.962123][ T3652] ? do_syscall_64+0x26/0x6a0 [ 983.962144][ T3652] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.972187][ T3652] ? do_syscall_64+0x26/0x6a0 [ 983.972213][ T3652] __x64_sys_sendmsg+0x78/0xb0 [ 983.972232][ T3652] do_syscall_64+0xfd/0x6a0 [ 983.972253][ T3652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.972266][ T3652] RIP: 0033:0x459819 [ 983.972295][ T3652] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 983.983280][ T3652] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 983.983307][ T3652] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 983.983316][ T3652] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 983.983336][ T3652] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 983.983358][ T3652] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 983.983367][ T3652] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 [ 984.209758][ T3676] FAULT_INJECTION: forcing a failure. [ 984.209758][ T3676] name failslab, interval 1, probability 0, space 0, times 0 [ 984.259584][ T3676] CPU: 1 PID: 3676 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 984.267175][ T3676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.277254][ T3676] Call Trace: [ 984.280573][ T3676] dump_stack+0x172/0x1f0 [ 984.284930][ T3676] should_fail.cold+0xa/0x15 [ 984.289545][ T3676] ? fault_create_debugfs_attr+0x180/0x180 [ 984.295381][ T3676] __should_failslab+0x121/0x190 [ 984.300341][ T3676] should_failslab+0x9/0x14 [ 984.305044][ T3676] kmem_cache_alloc_trace+0x4b/0x790 [ 984.310356][ T3676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 984.316616][ T3676] ? __ipv6_addr_type+0x219/0x32d [ 984.321657][ T3676] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 984.327563][ T3676] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 984.333305][ T3676] sctp_add_bind_addr+0x9f/0x3a0 [ 984.338262][ T3676] sctp_copy_local_addr_list+0x385/0x530 [ 984.343923][ T3676] ? sctp_defaults_init+0xbe0/0xbe0 [ 984.349142][ T3676] ? _get_random_bytes+0x1b0/0x430 [ 984.354279][ T3676] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 984.360189][ T3676] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 984.366456][ T3676] sctp_copy_one_addr+0x5f/0x170 [ 984.371409][ T3676] ? sctp_copy_one_addr+0x5f/0x170 [ 984.376545][ T3676] sctp_bind_addr_copy+0xfc/0x2c8 [ 984.381591][ T3676] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 984.387853][ T3676] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 984.393159][ T3676] ? mark_held_locks+0xa4/0xf0 [ 984.397946][ T3676] ? sctp_autobind+0x1e0/0x1e0 [ 984.402725][ T3676] ? lockdep_hardirqs_on+0x418/0x5d0 [ 984.408025][ T3676] ? lock_sock_nested+0x9a/0x120 [ 984.412975][ T3676] ? trace_hardirqs_on+0x67/0x240 [ 984.418013][ T3676] ? lock_sock_nested+0x9a/0x120 [ 984.422964][ T3676] ? __local_bh_enable_ip+0x15a/0x270 [ 984.428353][ T3676] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 984.434610][ T3676] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 984.440517][ T3676] sctp_sendmsg+0x125a/0x17d0 [ 984.445213][ T3676] ? sctp_id2assoc+0x2c0/0x2c0 [ 984.449989][ T3676] ? release_sock+0x156/0x1c0 [ 984.454855][ T3676] ? release_sock+0x156/0x1c0 [ 984.459548][ T3676] ? __local_bh_enable_ip+0x15a/0x270 [ 984.464939][ T3676] ? inet_autobind+0x144/0x1a0 [ 984.469748][ T3676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 984.476001][ T3676] inet_sendmsg+0x9e/0xe0 [ 984.480358][ T3676] ? inet_send_prepare+0x4f0/0x4f0 [ 984.485478][ T3676] sock_sendmsg+0xd7/0x130 [ 984.489906][ T3676] ___sys_sendmsg+0x803/0x920 [ 984.494608][ T3676] ? copy_msghdr_from_user+0x440/0x440 [ 984.500087][ T3676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 984.506343][ T3676] ? __kasan_check_read+0x11/0x20 [ 984.511392][ T3676] ? __fget+0x384/0x560 [ 984.515584][ T3676] ? __fget_light+0x1a9/0x230 [ 984.520287][ T3676] ? __fdget+0x1b/0x20 [ 984.524375][ T3676] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 984.531587][ T3676] __sys_sendmsg+0x105/0x1d0 [ 984.536196][ T3676] ? __sys_sendmsg_sock+0xd0/0xd0 [ 984.541607][ T3676] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 984.551859][ T3676] ? do_syscall_64+0x26/0x6a0 [ 984.556550][ T3676] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 984.562643][ T3676] ? do_syscall_64+0x26/0x6a0 [ 984.567449][ T3676] __x64_sys_sendmsg+0x78/0xb0 [ 984.572231][ T3676] do_syscall_64+0xfd/0x6a0 [ 984.576762][ T3676] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 984.582663][ T3676] RIP: 0033:0x459819 [ 984.586570][ T3676] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 984.606190][ T3676] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 984.614624][ T3676] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 984.614902][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 984.622610][ T3676] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 984.622620][ T3676] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 984.622628][ T3676] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 984.622635][ T3676] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:19:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000003f0000000000"], 0x14}}, 0x0) 03:19:42 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) 03:19:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703550028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:19:42 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37", 0x97, 0xf}) 03:19:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703600028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:19:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000400000000000"], 0x14}}, 0x0) 03:19:42 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) 03:19:42 executing program 5 (fault-call:2 fault-nth:35): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 985.125871][ T3699] FAULT_INJECTION: forcing a failure. [ 985.125871][ T3699] name failslab, interval 1, probability 0, space 0, times 0 [ 985.138904][ T3699] CPU: 0 PID: 3699 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 985.146468][ T3699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 985.156541][ T3699] Call Trace: [ 985.159856][ T3699] dump_stack+0x172/0x1f0 [ 985.164220][ T3699] should_fail.cold+0xa/0x15 [ 985.168833][ T3699] ? fault_create_debugfs_attr+0x180/0x180 [ 985.174665][ T3699] __should_failslab+0x121/0x190 [ 985.179623][ T3699] should_failslab+0x9/0x14 [ 985.184139][ T3699] kmem_cache_alloc_trace+0x4b/0x790 [ 985.189445][ T3699] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 985.195707][ T3699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 985.201975][ T3699] ? __ipv6_addr_type+0x219/0x32d [ 985.207026][ T3699] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 985.212937][ T3699] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 985.218677][ T3699] sctp_add_bind_addr+0x9f/0x3a0 [ 985.223631][ T3699] sctp_copy_local_addr_list+0x385/0x530 [ 985.229302][ T3699] ? sctp_defaults_init+0xbe0/0xbe0 [ 985.234514][ T3699] ? _get_random_bytes+0x1b0/0x430 [ 985.239634][ T3699] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 985.245539][ T3699] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 985.251799][ T3699] sctp_copy_one_addr+0x5f/0x170 [ 985.256748][ T3699] ? sctp_copy_one_addr+0x5f/0x170 [ 985.261878][ T3699] sctp_bind_addr_copy+0xfc/0x2c8 [ 985.266921][ T3699] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 985.273174][ T3699] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 985.278494][ T3699] ? mark_held_locks+0xa4/0xf0 [ 985.283275][ T3699] ? sctp_autobind+0x1e0/0x1e0 [ 985.288049][ T3699] ? lockdep_hardirqs_on+0x418/0x5d0 [ 985.293342][ T3699] ? lock_sock_nested+0x9a/0x120 [ 985.298289][ T3699] ? trace_hardirqs_on+0x67/0x240 [ 985.303323][ T3699] ? lock_sock_nested+0x9a/0x120 [ 985.308271][ T3699] ? __local_bh_enable_ip+0x15a/0x270 [ 985.313659][ T3699] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 985.319906][ T3699] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 985.325821][ T3699] sctp_sendmsg+0x125a/0x17d0 [ 985.330519][ T3699] ? sctp_id2assoc+0x2c0/0x2c0 [ 985.335296][ T3699] ? release_sock+0x156/0x1c0 [ 985.339985][ T3699] ? release_sock+0x156/0x1c0 [ 985.344681][ T3699] ? __local_bh_enable_ip+0x15a/0x270 [ 985.350076][ T3699] ? inet_autobind+0x144/0x1a0 [ 985.354857][ T3699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 985.361117][ T3699] inet_sendmsg+0x9e/0xe0 [ 985.365465][ T3699] ? inet_send_prepare+0x4f0/0x4f0 [ 985.370593][ T3699] sock_sendmsg+0xd7/0x130 [ 985.375029][ T3699] ___sys_sendmsg+0x803/0x920 [ 985.379721][ T3699] ? copy_msghdr_from_user+0x440/0x440 [ 985.385202][ T3699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 985.391461][ T3699] ? __kasan_check_read+0x11/0x20 [ 985.396509][ T3699] ? __fget+0x384/0x560 [ 985.400696][ T3699] ? __fget_light+0x1a9/0x230 [ 985.405389][ T3699] ? __fdget+0x1b/0x20 [ 985.409471][ T3699] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 985.415739][ T3699] __sys_sendmsg+0x105/0x1d0 [ 985.420357][ T3699] ? __sys_sendmsg_sock+0xd0/0xd0 [ 985.425409][ T3699] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 985.430878][ T3699] ? do_syscall_64+0x26/0x6a0 [ 985.435565][ T3699] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 985.441637][ T3699] ? do_syscall_64+0x26/0x6a0 [ 985.446336][ T3699] __x64_sys_sendmsg+0x78/0xb0 [ 985.451118][ T3699] do_syscall_64+0xfd/0x6a0 [ 985.455638][ T3699] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 985.461536][ T3699] RIP: 0033:0x459819 [ 985.465444][ T3699] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 985.485067][ T3699] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 985.494021][ T3699] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 985.502010][ T3699] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 985.509996][ T3699] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 985.517983][ T3699] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 985.525971][ T3699] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 [ 985.733401][ T3690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:19:51 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0462783ad9b81d9473a4f4bb58315514bac5a2c84aa0b93ae5ac145a773ddc9781dece238652a75926a34e52c653ffc6c1ad05b5b7afb9ed835e2faa639c12b5bb044fbe46cd1ee4184e57c490f064d8e4e6c38e04dc2dfbadf14f40ce145264fe4c2427997ba3c54b27777a158bdb27ca7012c3aa57d8dd282188f5c6a53667fa515fc31e4b86a49e18e8894da409ba5a09e0cc0b34fa02b95f3550b9c8b5feeec092"], 0x2) 03:19:51 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) 03:19:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000600000000000"], 0x14}}, 0x0) 03:19:51 executing program 5 (fault-call:2 fault-nth:36): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:19:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703700028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:19:51 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37", 0x97, 0xf}) [ 994.653367][ T3712] FAULT_INJECTION: forcing a failure. [ 994.653367][ T3712] name failslab, interval 1, probability 0, space 0, times 0 [ 994.666881][ T3712] CPU: 0 PID: 3712 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 994.674458][ T3712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.684699][ T3712] Call Trace: [ 994.688006][ T3712] dump_stack+0x172/0x1f0 [ 994.692357][ T3712] should_fail.cold+0xa/0x15 [ 994.697053][ T3712] ? fault_create_debugfs_attr+0x180/0x180 [ 994.702901][ T3712] __should_failslab+0x121/0x190 [ 994.707852][ T3712] should_failslab+0x9/0x14 [ 994.712367][ T3712] kmem_cache_alloc_trace+0x4b/0x790 [ 994.717682][ T3712] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 994.723935][ T3712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.730191][ T3712] ? __ipv6_addr_type+0x219/0x32d [ 994.735238][ T3712] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 994.741152][ T3712] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 994.746898][ T3712] sctp_add_bind_addr+0x9f/0x3a0 [ 994.751863][ T3712] sctp_copy_local_addr_list+0x385/0x530 [ 994.757526][ T3712] ? sctp_defaults_init+0xbe0/0xbe0 [ 994.762757][ T3712] ? _get_random_bytes+0x1b0/0x430 [ 994.767899][ T3712] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 994.773829][ T3712] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 994.780091][ T3712] sctp_copy_one_addr+0x5f/0x170 [ 994.785045][ T3712] ? sctp_copy_one_addr+0x5f/0x170 [ 994.790177][ T3712] sctp_bind_addr_copy+0xfc/0x2c8 [ 994.795226][ T3712] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 994.801485][ T3712] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 994.806801][ T3712] ? mark_held_locks+0xa4/0xf0 [ 994.811598][ T3712] ? sctp_autobind+0x1e0/0x1e0 [ 994.816468][ T3712] ? lockdep_hardirqs_on+0x418/0x5d0 [ 994.821781][ T3712] ? lock_sock_nested+0x9a/0x120 [ 994.826736][ T3712] ? trace_hardirqs_on+0x67/0x240 [ 994.831791][ T3712] ? lock_sock_nested+0x9a/0x120 [ 994.836753][ T3712] ? __local_bh_enable_ip+0x15a/0x270 [ 994.842156][ T3712] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 994.848421][ T3712] ? sctp_endpoint_lookup_assoc+0x17f/0x290 03:19:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500000ec00000000000"], 0x14}}, 0x0) [ 994.854342][ T3712] sctp_sendmsg+0x125a/0x17d0 [ 994.859058][ T3712] ? sctp_id2assoc+0x2c0/0x2c0 [ 994.863849][ T3712] ? release_sock+0x156/0x1c0 [ 994.868635][ T3712] ? release_sock+0x156/0x1c0 [ 994.873336][ T3712] ? __local_bh_enable_ip+0x15a/0x270 [ 994.878735][ T3712] ? inet_autobind+0x144/0x1a0 [ 994.883523][ T3712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.889785][ T3712] inet_sendmsg+0x9e/0xe0 [ 994.894128][ T3712] ? inet_send_prepare+0x4f0/0x4f0 [ 994.899253][ T3712] sock_sendmsg+0xd7/0x130 [ 994.903687][ T3712] ___sys_sendmsg+0x803/0x920 [ 994.908385][ T3712] ? copy_msghdr_from_user+0x440/0x440 [ 994.913868][ T3712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.920148][ T3712] ? __kasan_check_read+0x11/0x20 [ 994.925189][ T3712] ? __fget+0x384/0x560 [ 994.929371][ T3712] ? __fget_light+0x1a9/0x230 [ 994.934061][ T3712] ? __fdget+0x1b/0x20 [ 994.938138][ T3712] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 994.944397][ T3712] __sys_sendmsg+0x105/0x1d0 [ 994.948997][ T3712] ? __sys_sendmsg_sock+0xd0/0xd0 [ 994.954046][ T3712] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 994.959512][ T3712] ? do_syscall_64+0x26/0x6a0 [ 994.964195][ T3712] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 994.970266][ T3712] ? do_syscall_64+0x26/0x6a0 [ 994.974963][ T3712] __x64_sys_sendmsg+0x78/0xb0 [ 994.979741][ T3712] do_syscall_64+0xfd/0x6a0 [ 994.984263][ T3712] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 994.990156][ T3712] RIP: 0033:0x459819 [ 994.994059][ T3712] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 995.013676][ T3712] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 995.022099][ T3712] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 995.030082][ T3712] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 995.038064][ T3712] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 995.046044][ T3712] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 03:19:52 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) 03:19:52 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000100)={0x800, 0x0, 0x2, 0xfc}) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x1000, 0x40000) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f00000001c0)={{0x7, 0x3, 0x0, 0xfffffffffffffffd, '\x00', 0x100000001}, 0x0, [0x100000001, 0x1ff, 0x31176fd4, 0x4, 0xc3, 0x2, 0xb75f, 0x6, 0x200, 0x7, 0x6, 0x6, 0x7f, 0x5, 0x4437, 0x400, 0x8, 0xffffffff, 0x8, 0x2, 0x80, 0x200, 0x4, 0x8, 0x8, 0x5, 0x6, 0x9, 0x1, 0xe42c, 0x0, 0x3, 0x3, 0x7fffffff, 0x4, 0x55076815, 0x9, 0x9, 0x0, 0xfff, 0x1, 0x200000, 0x100, 0x40000, 0x9, 0xfff, 0x2, 0xfffffffffffffff7, 0xffffffffffffffc0, 0x80000001, 0x3c7, 0x5, 0x3, 0x80000001, 0x9529, 0x4, 0x200, 0x1, 0x800, 0x0, 0x80000000, 0x913, 0x2, 0x1, 0x3, 0x7, 0x9, 0x800, 0x80000000, 0x2, 0x80000001, 0x7, 0x1, 0x81, 0x2, 0xa8, 0xff, 0xa428, 0xffffffffffff65d7, 0x2, 0x9c1d, 0x1f42, 0x7f, 0x1f, 0x4, 0x8001, 0x0, 0x8001, 0x6, 0x18000, 0x6, 0x8001, 0x9, 0x4, 0x8000, 0x2, 0x9, 0x401, 0x5, 0x6d83e3bc, 0x9, 0x7ff, 0x3, 0x10000, 0x3f, 0x9, 0x800, 0x80000000, 0x0, 0x5, 0x1, 0x4, 0x5, 0x2, 0x9, 0x8, 0x6, 0x7ff, 0x2, 0x8, 0x40, 0x0, 0x1, 0x8, 0x8000, 0xfffffffffffffe01, 0x70d7a1a7, 0x2]}) write$vhci(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7e0bf7de006fca617ca31280501a5f57410be5b65df9ff"], 0x2) 03:19:52 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) [ 995.054110][ T3712] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:19:52 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) 03:19:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a35101421500000aed0000000000"], 0x14}}, 0x0) 03:19:52 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) 03:19:52 executing program 5 (fault-call:2 fault-nth:37): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:19:52 executing program 0: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) [ 995.417212][ T3743] FAULT_INJECTION: forcing a failure. [ 995.417212][ T3743] name failslab, interval 1, probability 0, space 0, times 0 [ 995.460882][ T3743] CPU: 0 PID: 3743 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 995.468471][ T3743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.478532][ T3743] Call Trace: [ 995.481847][ T3743] dump_stack+0x172/0x1f0 [ 995.486202][ T3743] should_fail.cold+0xa/0x15 [ 995.490810][ T3743] ? __kasan_check_read+0x11/0x20 [ 995.495850][ T3743] ? fault_create_debugfs_attr+0x180/0x180 [ 995.501691][ T3743] __should_failslab+0x121/0x190 [ 995.506658][ T3743] should_failslab+0x9/0x14 [ 995.511270][ T3743] kmem_cache_alloc_trace+0x4b/0x790 [ 995.516582][ T3743] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 995.522860][ T3743] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.529641][ T3743] ? __ipv6_addr_type+0x219/0x32d [ 995.534679][ T3743] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 995.540586][ T3743] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 995.546324][ T3743] sctp_add_bind_addr+0x9f/0x3a0 [ 995.551540][ T3743] sctp_copy_local_addr_list+0x385/0x530 [ 995.557190][ T3743] ? sctp_defaults_init+0xbe0/0xbe0 [ 995.562400][ T3743] ? _get_random_bytes+0x1b0/0x430 [ 995.567523][ T3743] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 995.573433][ T3743] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 995.579688][ T3743] sctp_copy_one_addr+0x5f/0x170 [ 995.584647][ T3743] ? sctp_copy_one_addr+0x5f/0x170 [ 995.589788][ T3743] sctp_bind_addr_copy+0xfc/0x2c8 [ 995.594839][ T3743] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 995.601100][ T3743] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 995.606489][ T3743] ? mark_held_locks+0xa4/0xf0 [ 995.611296][ T3743] ? sctp_autobind+0x1e0/0x1e0 [ 995.616075][ T3743] ? lockdep_hardirqs_on+0x418/0x5d0 [ 995.621375][ T3743] ? lock_sock_nested+0x9a/0x120 [ 995.626325][ T3743] ? trace_hardirqs_on+0x67/0x240 [ 995.631529][ T3743] ? lock_sock_nested+0x9a/0x120 [ 995.636482][ T3743] ? __local_bh_enable_ip+0x15a/0x270 [ 995.641873][ T3743] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 995.648132][ T3743] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 995.654052][ T3743] sctp_sendmsg+0x125a/0x17d0 [ 995.658759][ T3743] ? sctp_id2assoc+0x2c0/0x2c0 [ 995.663539][ T3743] ? release_sock+0x156/0x1c0 [ 995.668224][ T3743] ? release_sock+0x156/0x1c0 [ 995.672910][ T3743] ? __local_bh_enable_ip+0x15a/0x270 [ 995.678300][ T3743] ? inet_autobind+0x144/0x1a0 [ 995.683077][ T3743] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.689078][ T3720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 995.689334][ T3743] inet_sendmsg+0x9e/0xe0 [ 995.700779][ T3743] ? inet_send_prepare+0x4f0/0x4f0 [ 995.705902][ T3743] sock_sendmsg+0xd7/0x130 03:19:52 executing program 0: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) [ 995.710422][ T3743] ___sys_sendmsg+0x803/0x920 [ 995.715136][ T3743] ? copy_msghdr_from_user+0x440/0x440 [ 995.720615][ T3743] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.726866][ T3743] ? __kasan_check_read+0x11/0x20 [ 995.731905][ T3743] ? __fget+0x384/0x560 [ 995.736087][ T3743] ? __fget_light+0x1a9/0x230 [ 995.740784][ T3743] ? __fdget+0x1b/0x20 [ 995.744868][ T3743] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 995.751137][ T3743] __sys_sendmsg+0x105/0x1d0 [ 995.755738][ T3743] ? __sys_sendmsg_sock+0xd0/0xd0 03:19:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703830028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:19:53 executing program 4: r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x2, &(0x7f00000013c0)={0x0, 0xd, 0x0, @thr={&(0x7f00000012c0)="b1ac2712f84499a74d57c7bd98d5bf62cb2bc367f2360d6ce566e5fbbd616becc79ef7", &(0x7f0000001300)="2b0163944def6202eca38de46cfbdd0e2e34d175c61ba01a5b20e8016ecc2a923ce5daaee236c2b4b5eac2071d8e9b9f82c690c4618f8b1d5d6df69936fbb2f2082d07a87e15aba99de4cd5cb99ce6a7779e3206b4cb08430075eaf54925f2a3b2293a83c20ae14a31bcb73d9a8bef89302ac914300d11ea04f299ab01c54e32d6feda6c9687b750484b7ebbc22a68ff6d23184c0a548335bc"}}, &(0x7f0000001400)=0x0) timer_delete(r3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\x00l', 0x1001}) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000002c0)=""/4096) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r4 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x1, 0x0, [], 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001540)={0x400, 0x260, &(0x7f0000001440)="a9b9b6213ede044fa51d1feceea2ca5960560e4c623c526033794eca71f765bdc2a0003b03c69f40e2b937aa54885f96d0a2721f1cf3da83f3039899784296a4f0b8e6bfddd3306a2453972995bc3b6209269d34de204ed5547b24a233277ef9c9cc2e5a2468902a7055b27180b1908c6baa30e89033036aab2757917a12391c4234167c71215ae54ea68194d85c5994ce6d18da9995e4", &(0x7f0000001500)="1ecdeee43bbb1c237c727080d50a37", 0x97, 0xf}) [ 995.760794][ T3743] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 995.766272][ T3743] ? do_syscall_64+0x26/0x6a0 [ 995.770954][ T3743] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.777199][ T3743] ? do_syscall_64+0x26/0x6a0 [ 995.781896][ T3743] __x64_sys_sendmsg+0x78/0xb0 [ 995.786672][ T3743] do_syscall_64+0xfd/0x6a0 [ 995.791190][ T3743] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.797090][ T3743] RIP: 0033:0x459819 03:19:53 executing program 0: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) [ 995.800990][ T3743] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 995.820783][ T3743] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 995.829207][ T3743] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 995.837190][ T3743] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 995.845167][ T3743] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 995.853147][ T3743] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 03:19:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000f00000000000"], 0x14}}, 0x0) [ 995.861124][ T3743] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 [ 996.285256][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:20:02 executing program 0: r0 = syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) 03:20:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703c00028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:20:02 executing program 5 (fault-call:2 fault-nth:38): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:20:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000400300000000"], 0x14}}, 0x0) 03:20:02 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="01b5"], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000002440)='/dev/zero\x00', 0x10000, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x1, 0x0) bind$isdn(r1, &(0x7f0000002480)={0x22, 0x0, 0xf9c, 0x400, 0x1ff}, 0x6) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000100)={r2}) 03:20:02 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = eventfd(0x0) fsetxattr$security_selinux(r0, 0x0, 0x0, 0x0, 0x0) [ 1005.480213][ T3771] FAULT_INJECTION: forcing a failure. [ 1005.480213][ T3771] name failslab, interval 1, probability 0, space 0, times 0 [ 1005.549614][ T3771] CPU: 0 PID: 3771 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 1005.557213][ T3771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1005.567287][ T3771] Call Trace: [ 1005.570600][ T3771] dump_stack+0x172/0x1f0 [ 1005.574956][ T3771] should_fail.cold+0xa/0x15 [ 1005.579595][ T3771] ? __kasan_check_read+0x11/0x20 [ 1005.584650][ T3771] ? fault_create_debugfs_attr+0x180/0x180 [ 1005.590843][ T3771] __should_failslab+0x121/0x190 [ 1005.595807][ T3771] should_failslab+0x9/0x14 [ 1005.600331][ T3771] kmem_cache_alloc_trace+0x4b/0x790 [ 1005.605630][ T3771] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1005.611889][ T3771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1005.618150][ T3771] ? __ipv6_addr_type+0x219/0x32d [ 1005.623192][ T3771] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1005.629101][ T3771] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1005.634937][ T3771] sctp_add_bind_addr+0x9f/0x3a0 [ 1005.639909][ T3771] sctp_copy_local_addr_list+0x385/0x530 [ 1005.645574][ T3771] ? sctp_defaults_init+0xbe0/0xbe0 [ 1005.650806][ T3771] ? _get_random_bytes+0x1b0/0x430 [ 1005.655935][ T3771] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1005.661852][ T3771] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1005.668120][ T3771] sctp_copy_one_addr+0x5f/0x170 [ 1005.673344][ T3771] ? sctp_copy_one_addr+0x5f/0x170 [ 1005.678665][ T3771] sctp_bind_addr_copy+0xfc/0x2c8 [ 1005.683721][ T3771] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 1005.689991][ T3771] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 1005.695296][ T3771] ? mark_held_locks+0xa4/0xf0 [ 1005.700070][ T3771] ? sctp_autobind+0x1e0/0x1e0 [ 1005.704843][ T3771] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1005.710139][ T3771] ? lock_sock_nested+0x9a/0x120 [ 1005.715100][ T3771] ? trace_hardirqs_on+0x67/0x240 [ 1005.720145][ T3771] ? lock_sock_nested+0x9a/0x120 [ 1005.725117][ T3771] ? __local_bh_enable_ip+0x15a/0x270 [ 1005.730525][ T3771] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1005.736793][ T3771] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 1005.742718][ T3771] sctp_sendmsg+0x125a/0x17d0 [ 1005.747438][ T3771] ? sctp_id2assoc+0x2c0/0x2c0 [ 1005.752228][ T3771] ? release_sock+0x156/0x1c0 [ 1005.756937][ T3771] ? release_sock+0x156/0x1c0 [ 1005.761643][ T3771] ? __local_bh_enable_ip+0x15a/0x270 [ 1005.767044][ T3771] ? inet_autobind+0x144/0x1a0 [ 1005.771840][ T3771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1005.778101][ T3771] inet_sendmsg+0x9e/0xe0 [ 1005.782441][ T3771] ? inet_send_prepare+0x4f0/0x4f0 [ 1005.787573][ T3771] sock_sendmsg+0xd7/0x130 [ 1005.792011][ T3771] ___sys_sendmsg+0x803/0x920 [ 1005.796737][ T3771] ? copy_msghdr_from_user+0x440/0x440 [ 1005.802226][ T3771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1005.808492][ T3771] ? __kasan_check_read+0x11/0x20 [ 1005.813551][ T3771] ? __fget+0x384/0x560 [ 1005.817742][ T3771] ? __fget_light+0x1a9/0x230 [ 1005.822454][ T3771] ? __fdget+0x1b/0x20 [ 1005.826551][ T3771] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1005.832823][ T3771] __sys_sendmsg+0x105/0x1d0 [ 1005.837434][ T3771] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1005.842495][ T3771] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1005.847986][ T3771] ? do_syscall_64+0x26/0x6a0 [ 1005.852684][ T3771] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1005.858777][ T3771] ? do_syscall_64+0x26/0x6a0 [ 1005.863483][ T3771] __x64_sys_sendmsg+0x78/0xb0 [ 1005.868275][ T3771] do_syscall_64+0xfd/0x6a0 [ 1005.872811][ T3771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1005.878723][ T3771] RIP: 0033:0x459819 03:20:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa300000000000007034a0128feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:20:03 executing program 0: r0 = syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) 03:20:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000034000000000"], 0x14}}, 0x0) [ 1005.882636][ T3771] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1005.902257][ T3771] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1005.910683][ T3771] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 1005.918670][ T3771] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 1005.926666][ T3771] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1005.934657][ T3771] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 1005.942651][ T3771] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:20:03 executing program 0: r0 = syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) 03:20:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703000a28feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:20:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) 03:20:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a3510142150000fffff000000000"], 0x14}}, 0x0) 03:20:03 executing program 5 (fault-call:2 fault-nth:39): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:20:03 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) [ 1006.191023][ T3799] FAULT_INJECTION: forcing a failure. [ 1006.191023][ T3799] name failslab, interval 1, probability 0, space 0, times 0 [ 1006.237553][ T3799] CPU: 0 PID: 3799 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 1006.245146][ T3799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1006.255215][ T3799] Call Trace: [ 1006.258532][ T3799] dump_stack+0x172/0x1f0 [ 1006.262883][ T3799] should_fail.cold+0xa/0x15 [ 1006.267493][ T3799] ? fault_create_debugfs_attr+0x180/0x180 [ 1006.273336][ T3799] __should_failslab+0x121/0x190 [ 1006.278298][ T3799] should_failslab+0x9/0x14 [ 1006.282813][ T3799] kmem_cache_alloc_trace+0x4b/0x790 [ 1006.288111][ T3799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1006.294897][ T3799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1006.301151][ T3799] ? __ipv6_addr_type+0x219/0x32d [ 1006.306189][ T3799] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1006.312093][ T3799] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1006.317828][ T3799] sctp_add_bind_addr+0x9f/0x3a0 [ 1006.322791][ T3799] sctp_copy_local_addr_list+0x385/0x530 [ 1006.328446][ T3799] ? sctp_defaults_init+0xbe0/0xbe0 [ 1006.333667][ T3799] ? _get_random_bytes+0x1b0/0x430 [ 1006.338801][ T3799] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1006.344706][ T3799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1006.350969][ T3799] sctp_copy_one_addr+0x5f/0x170 [ 1006.355921][ T3799] ? sctp_copy_one_addr+0x5f/0x170 [ 1006.361049][ T3799] sctp_bind_addr_copy+0xfc/0x2c8 [ 1006.366094][ T3799] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 1006.372378][ T3799] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 1006.377935][ T3799] ? mark_held_locks+0xa4/0xf0 [ 1006.382720][ T3799] ? sctp_autobind+0x1e0/0x1e0 03:20:03 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) [ 1006.387502][ T3799] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1006.392812][ T3799] ? lock_sock_nested+0x9a/0x120 [ 1006.397787][ T3799] ? trace_hardirqs_on+0x67/0x240 [ 1006.402833][ T3799] ? lock_sock_nested+0x9a/0x120 [ 1006.407800][ T3799] ? __local_bh_enable_ip+0x15a/0x270 [ 1006.413202][ T3799] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1006.419470][ T3799] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 1006.425393][ T3799] sctp_sendmsg+0x125a/0x17d0 [ 1006.430104][ T3799] ? sctp_id2assoc+0x2c0/0x2c0 [ 1006.434894][ T3799] ? release_sock+0x156/0x1c0 [ 1006.439607][ T3799] ? release_sock+0x156/0x1c0 [ 1006.444318][ T3799] ? __local_bh_enable_ip+0x15a/0x270 [ 1006.449726][ T3799] ? inet_autobind+0x144/0x1a0 [ 1006.454521][ T3799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1006.460797][ T3799] inet_sendmsg+0x9e/0xe0 [ 1006.465149][ T3799] ? inet_send_prepare+0x4f0/0x4f0 [ 1006.470282][ T3799] sock_sendmsg+0xd7/0x130 [ 1006.474723][ T3799] ___sys_sendmsg+0x803/0x920 [ 1006.479424][ T3799] ? copy_msghdr_from_user+0x440/0x440 [ 1006.484920][ T3799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1006.491195][ T3799] ? __kasan_check_read+0x11/0x20 [ 1006.496241][ T3799] ? __fget+0x384/0x560 [ 1006.500433][ T3799] ? __fget_light+0x1a9/0x230 [ 1006.505132][ T3799] ? __fdget+0x1b/0x20 [ 1006.509306][ T3799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1006.515582][ T3799] __sys_sendmsg+0x105/0x1d0 [ 1006.520200][ T3799] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1006.525263][ T3799] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1006.532276][ T3799] ? do_syscall_64+0x26/0x6a0 [ 1006.536963][ T3799] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1006.543043][ T3799] ? do_syscall_64+0x26/0x6a0 [ 1006.547738][ T3799] __x64_sys_sendmsg+0x78/0xb0 [ 1006.552524][ T3799] do_syscall_64+0xfd/0x6a0 [ 1006.557037][ T3799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1006.562937][ T3799] RIP: 0033:0x459819 [ 1006.562953][ T3799] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1006.562960][ T3799] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1006.562975][ T3799] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 1006.562982][ T3799] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 1006.562991][ T3799] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1006.562999][ T3799] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 1006.563007][ T3799] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:20:13 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x10000, 0x0) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000000c0)=""/59) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) write$vhci(r1, &(0x7f0000000180)=@HCI_EVENT_PKT={0x4, 'b'}, 0x2) 03:20:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703000d28feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:20:13 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) 03:20:13 executing program 4: setresuid(0x0, 0xfffe, 0x0) syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') 03:20:13 executing program 5 (fault-call:2 fault-nth:40): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:20:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000001000000"], 0x14}}, 0x0) [ 1015.945572][ T3814] FAULT_INJECTION: forcing a failure. [ 1015.945572][ T3814] name failslab, interval 1, probability 0, space 0, times 0 03:20:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703000e28feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:20:13 executing program 4: r0 = socket$kcm(0x10, 0x2000004000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00014101000000000009000e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) [ 1016.041252][ T3814] CPU: 0 PID: 3814 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 1016.048855][ T3814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1016.058928][ T3814] Call Trace: [ 1016.062243][ T3814] dump_stack+0x172/0x1f0 [ 1016.066589][ T3814] should_fail.cold+0xa/0x15 [ 1016.066612][ T3814] ? fault_create_debugfs_attr+0x180/0x180 [ 1016.066642][ T3814] __should_failslab+0x121/0x190 [ 1016.066663][ T3814] should_failslab+0x9/0x14 [ 1016.066679][ T3814] kmem_cache_alloc_trace+0x4b/0x790 [ 1016.066699][ T3814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1016.066718][ T3814] ? __ipv6_addr_type+0x219/0x32d [ 1016.066736][ T3814] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1016.066751][ T3814] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1016.066780][ T3814] sctp_add_bind_addr+0x9f/0x3a0 [ 1016.066803][ T3814] sctp_copy_local_addr_list+0x385/0x530 [ 1016.066824][ T3814] ? sctp_defaults_init+0xbe0/0xbe0 [ 1016.066847][ T3814] ? _get_random_bytes+0x1b0/0x430 [ 1016.086695][ T3814] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1016.086715][ T3814] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1016.086737][ T3814] sctp_copy_one_addr+0x5f/0x170 [ 1016.086758][ T3814] ? sctp_copy_one_addr+0x5f/0x170 [ 1016.158093][ T3814] sctp_bind_addr_copy+0xfc/0x2c8 [ 1016.163147][ T3814] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 1016.169415][ T3814] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 1016.174750][ T3814] ? mark_held_locks+0xa4/0xf0 [ 1016.179550][ T3814] ? sctp_autobind+0x1e0/0x1e0 [ 1016.184338][ T3814] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1016.189645][ T3814] ? lock_sock_nested+0x9a/0x120 [ 1016.194604][ T3814] ? trace_hardirqs_on+0x67/0x240 [ 1016.199646][ T3814] ? lock_sock_nested+0x9a/0x120 [ 1016.204604][ T3814] ? __local_bh_enable_ip+0x15a/0x270 [ 1016.210026][ T3814] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1016.216284][ T3814] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 1016.222200][ T3814] sctp_sendmsg+0x125a/0x17d0 [ 1016.226910][ T3814] ? sctp_id2assoc+0x2c0/0x2c0 [ 1016.231686][ T3814] ? release_sock+0x156/0x1c0 [ 1016.236376][ T3814] ? release_sock+0x156/0x1c0 [ 1016.241070][ T3814] ? __local_bh_enable_ip+0x15a/0x270 [ 1016.246548][ T3814] ? inet_autobind+0x144/0x1a0 [ 1016.251337][ T3814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1016.257593][ T3814] inet_sendmsg+0x9e/0xe0 [ 1016.257608][ T3814] ? inet_send_prepare+0x4f0/0x4f0 [ 1016.257623][ T3814] sock_sendmsg+0xd7/0x130 [ 1016.257640][ T3814] ___sys_sendmsg+0x803/0x920 [ 1016.257659][ T3814] ? copy_msghdr_from_user+0x440/0x440 [ 1016.257680][ T3814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1016.257698][ T3814] ? __kasan_check_read+0x11/0x20 [ 1016.257720][ T3814] ? __fget+0x384/0x560 [ 1016.271586][ T3814] ? __fget_light+0x1a9/0x230 [ 1016.271605][ T3814] ? __fdget+0x1b/0x20 [ 1016.271623][ T3814] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1016.271646][ T3814] __sys_sendmsg+0x105/0x1d0 [ 1016.316795][ T3814] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1016.321859][ T3814] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1016.327349][ T3814] ? do_syscall_64+0x26/0x6a0 [ 1016.332050][ T3814] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1016.338140][ T3814] ? do_syscall_64+0x26/0x6a0 03:20:13 executing program 4: socketpair$unix(0x1, 0x1000000000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 03:20:13 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00'}, 0x18) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) 03:20:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703001828feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:20:13 executing program 4: r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f00000002c0)="8ffba81213b11d1ce3fe20", 0xb, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 1016.342847][ T3814] __x64_sys_sendmsg+0x78/0xb0 [ 1016.347642][ T3814] do_syscall_64+0xfd/0x6a0 [ 1016.352167][ T3814] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1016.358164][ T3814] RIP: 0033:0x459819 [ 1016.362078][ T3814] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1016.382915][ T3814] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1016.391348][ T3814] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 1016.399342][ T3814] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 1016.407343][ T3814] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1016.415413][ T3814] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 1016.415423][ T3814] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 03:20:23 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00'}, 0x18) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) 03:20:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7000000000000afbfa30000000000000703002028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016e400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b700000000000000950000000000000069514404f40bd0b403390919354087aaf1c3d99bc667f46525a81e15ff55ce6ec710fb5241c08e853b37e87700df46bc5db3b235a187c2e909d1cf1db47191e07c95a4f19b31a6c8ab1b7ffa0957f939bcd5bc56f0daf0cfb0163dab5a8720a58f5ee90b9e7efd81"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 03:20:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000002000000"], 0x14}}, 0x0) 03:20:23 executing program 5 (fault-call:2 fault-nth:41): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 03:20:23 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f00000001c0)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0422"], 0x2) write$vhci(r0, &(0x7f0000000080)=@HCI_SCODATA_PKT={0x3, "041afd6f2107e201365b4c8d877ed67257f6e2c708a8aecf3d51f98a857756cd8bfde7eed098fdea088b94f5d2317aaaca606dade216fa46e5b9a6358d83448c5e5b9105bef333417e611c6aa30e348932d8e43460248909e19197a288d52f73c978f69631445397cf140691bb1384dc3807e18e28ed05cb4a5684f7e1193988cbb4d5f66cfaf1fae929bf24371ed554ccd79d5b980bc9ee7f0c24220f7665a7ab9e095336e455ecc9ea45eeda47c26eab32564d828b72cdb997f6d63493cea90f962f589ba75784c61441bcbbf6c92a7b66173a3912f4331eb20825bd323e58c1a0e278"}, 0xe5) 03:20:23 executing program 4: 03:20:23 executing program 4: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="2e26ff56", 0x4) fcntl$setstatus(r1, 0x4, 0xa1a3f945407a2941) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 03:20:23 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00'}, 0x18) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) [ 1026.673842][ T3845] FAULT_INJECTION: forcing a failure. [ 1026.673842][ T3845] name failslab, interval 1, probability 0, space 0, times 0 [ 1026.695881][ T1514] ================================================================== [ 1026.704541][ T1514] BUG: KASAN: slab-out-of-bounds in hci_event_packet+0x9d26/0xa8fb [ 1026.712444][ T1514] Read of size 1 at addr ffff8880a8eed480 by task kworker/u5:0/1514 [ 1026.720424][ T1514] [ 1026.722772][ T1514] CPU: 1 PID: 1514 Comm: kworker/u5:0 Not tainted 5.2.0+ #90 [ 1026.730166][ T1514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1026.740245][ T1514] Workqueue: hci0 hci_rx_work [ 1026.744927][ T1514] Call Trace: [ 1026.748225][ T1514] dump_stack+0x172/0x1f0 [ 1026.752564][ T1514] ? hci_event_packet+0x9d26/0xa8fb [ 1026.757787][ T1514] print_address_description.cold+0xd4/0x306 [ 1026.763775][ T1514] ? hci_event_packet+0x9d26/0xa8fb [ 1026.769068][ T1514] ? hci_event_packet+0x9d26/0xa8fb [ 1026.774282][ T1514] __kasan_report.cold+0x1b/0x36 [ 1026.779326][ T1514] ? hci_event_packet+0x9d26/0xa8fb [ 1026.784540][ T1514] kasan_report+0x12/0x17 [ 1026.788911][ T1514] __asan_report_load1_noabort+0x14/0x20 [ 1026.794568][ T1514] hci_event_packet+0x9d26/0xa8fb [ 1026.799615][ T1514] ? hci_cmd_complete_evt+0xc390/0xc390 [ 1026.805177][ T1514] ? __kasan_check_read+0x11/0x20 [ 1026.810203][ T1514] ? perf_trace_lock_acquire+0x440/0x530 [ 1026.815848][ T1514] ? skb_dequeue+0x12e/0x180 [ 1026.820446][ T1514] ? __kasan_check_read+0x11/0x20 [ 1026.825500][ T1514] ? mark_lock+0xc0/0x11e0 [ 1026.829931][ T1514] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1026.835737][ T1514] ? skb_dequeue+0x12e/0x180 [ 1026.840327][ T1514] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1026.846139][ T1514] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1026.851430][ T1514] ? trace_hardirqs_on+0x67/0x240 [ 1026.856454][ T1514] ? __kasan_check_read+0x11/0x20 [ 1026.861496][ T1514] hci_rx_work+0x47e/0xae0 [ 1026.865914][ T1514] ? hci_rx_work+0x47e/0xae0 [ 1026.870515][ T1514] process_one_work+0x9af/0x1740 [ 1026.875470][ T1514] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1026.881289][ T1514] ? lock_acquire+0x190/0x410 [ 1026.885985][ T1514] worker_thread+0x98/0xe40 [ 1026.890505][ T1514] kthread+0x361/0x430 [ 1026.894579][ T1514] ? process_one_work+0x1740/0x1740 [ 1026.899797][ T1514] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1026.906063][ T1514] ret_from_fork+0x24/0x30 [ 1026.910506][ T1514] [ 1026.910520][ T3845] CPU: 0 PID: 3845 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 1026.910535][ T3845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1026.912851][ T1514] Allocated by task 3852: [ 1026.920393][ T3845] Call Trace: [ 1026.930548][ T1514] save_stack+0x23/0x90 [ 1026.934966][ T3845] dump_stack+0x172/0x1f0 [ 1026.938244][ T1514] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1026.942411][ T3845] should_fail.cold+0xa/0x15 [ 1026.946718][ T1514] kasan_kmalloc+0x9/0x10 [ 1026.952344][ T3845] ? fault_create_debugfs_attr+0x180/0x180 [ 1026.956914][ T1514] __kmalloc_node_track_caller+0x4e/0x70 [ 1026.956935][ T1514] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1026.961266][ T3845] __should_failslab+0x121/0x190 [ 1026.967056][ T1514] __alloc_skb+0x10b/0x5e0 [ 1026.972675][ T3845] should_failslab+0x9/0x14 [ 1026.978032][ T1514] vhci_write+0xc4/0x470 [ 1026.982959][ T3845] kmem_cache_alloc_trace+0x4b/0x790 [ 1026.987360][ T1514] new_sync_write+0x4d3/0x770 [ 1026.991856][ T3845] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1026.996081][ T1514] __vfs_write+0xe1/0x110 [ 1027.001357][ T3845] ? __ipv6_addr_type+0x219/0x32d [ 1027.006039][ T1514] vfs_write+0x268/0x5d0 [ 1027.012270][ T3845] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1027.016584][ T1514] ksys_write+0x14f/0x290 [ 1027.021597][ T3845] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1027.025823][ T1514] __x64_sys_write+0x73/0xb0 [ 1027.031707][ T3845] sctp_add_bind_addr+0x9f/0x3a0 [ 1027.036016][ T1514] do_syscall_64+0xfd/0x6a0 [ 1027.041725][ T3845] sctp_copy_local_addr_list+0x385/0x530 [ 1027.046290][ T1514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1027.046301][ T1514] [ 1027.051263][ T3845] ? sctp_defaults_init+0xbe0/0xbe0 [ 1027.055750][ T1514] Freed by task 9: [ 1027.061380][ T3845] ? _get_random_bytes+0x1b0/0x430 [ 1027.067264][ T1514] save_stack+0x23/0x90 [ 1027.069586][ T3845] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1027.074769][ T1514] __kasan_slab_free+0x102/0x150 [ 1027.074781][ T1514] kasan_slab_free+0xe/0x10 [ 1027.074798][ T1514] kfree+0x10a/0x2c0 [ 1027.078552][ T3845] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1027.083747][ T1514] skb_free_head+0x93/0xb0 [ 1027.087898][ T3845] sctp_copy_one_addr+0x5f/0x170 [ 1027.093773][ T1514] skb_release_data+0x42d/0x7c0 [ 1027.098697][ T3845] ? sctp_copy_one_addr+0x5f/0x170 [ 1027.103187][ T1514] skb_release_all+0x4d/0x60 [ 1027.103216][ T1514] kfree_skb+0x101/0x3c0 [ 1027.107100][ T3845] sctp_bind_addr_copy+0xfc/0x2c8 [ 1027.113392][ T1514] __netif_receive_skb_core+0x593/0x3060 [ 1027.117730][ T3845] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 1027.122642][ T1514] __netif_receive_skb_one_core+0xa8/0x1a0 [ 1027.122661][ T1514] __netif_receive_skb+0x2c/0x1d0 [ 1027.127508][ T3845] sctp_sendmsg_new_asoc+0x3bd/0xfd0 [ 1027.132622][ T1514] process_backlog+0x206/0x750 [ 1027.137203][ T3845] ? mark_held_locks+0xa4/0xf0 [ 1027.141447][ T1514] net_rx_action+0x4d6/0x1030 [ 1027.146473][ T3845] ? sctp_autobind+0x1e0/0x1e0 [ 1027.152227][ T1514] __do_softirq+0x262/0x98c [ 1027.158464][ T3845] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1027.164244][ T1514] [ 1027.169280][ T3845] ? lock_sock_nested+0x9a/0x120 [ 1027.174551][ T1514] The buggy address belongs to the object at ffff8880a8eed280 [ 1027.174551][ T1514] which belongs to the cache kmalloc-512 of size 512 [ 1027.179395][ T3845] ? trace_hardirqs_on+0x67/0x240 [ 1027.184146][ T1514] The buggy address is located 0 bytes to the right of [ 1027.184146][ T1514] 512-byte region [ffff8880a8eed280, ffff8880a8eed480) [ 1027.188811][ T3845] ? lock_sock_nested+0x9a/0x120 [ 1027.193554][ T1514] The buggy address belongs to the page: [ 1027.198064][ T3845] ? __local_bh_enable_ip+0x15a/0x270 [ 1027.203327][ T1514] page:ffffea0002a3bb40 refcount:1 mapcount:0 mapping:ffff8880aa400a80 index:0x0 [ 1027.205654][ T3845] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1027.210567][ T1514] flags: 0x1fffc0000000200(slab) [ 1027.224636][ T3845] ? sctp_endpoint_lookup_assoc+0x17f/0x290 [ 1027.229736][ T1514] raw: 01fffc0000000200 ffffea000272b5c8 ffffea00021d49c8 ffff8880aa400a80 [ 1027.243389][ T3845] sctp_sendmsg+0x125a/0x17d0 [ 1027.248310][ T1514] raw: 0000000000000000 ffff8880a8eed000 0000000100000006 0000000000000000 [ 1027.253945][ T3845] ? sctp_id2assoc+0x2c0/0x2c0 [ 1027.259290][ T1514] page dumped because: kasan: bad access detected [ 1027.268400][ T3845] ? release_sock+0x156/0x1c0 [ 1027.274624][ T1514] [ 1027.279566][ T3845] ? release_sock+0x156/0x1c0 [ 1027.285434][ T1514] Memory state around the buggy address: [ 1027.294026][ T3845] ? __local_bh_enable_ip+0x15a/0x270 [ 1027.298746][ T1514] ffff8880a8eed380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1027.307358][ T3845] ? inet_autobind+0x144/0x1a0 [ 1027.312105][ T1514] ffff8880a8eed400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1027.318520][ T3845] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1027.323258][ T1514] >ffff8880a8eed480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc 03:20:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xec0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301a351014215000000000003000000"], 0x14}}, 0x0) 03:20:24 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000010000002000000e00000010000000000000000080012000200020000010000000000003000320003030000ff3f567b0000000000000000000000000000000000000001ac1405bb000000000000000000000000030005000000000002000000e00000010010000000000000"], 0x80}}, 0x0) [ 1027.325607][ T3845] inet_sendmsg+0x9e/0xe0 [ 1027.330263][ T1514] ^ [ 1027.335894][ T3845] ? inet_send_prepare+0x4f0/0x4f0 [ 1027.341255][ T1514] ffff8880a8eed500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1027.349351][ T3845] sock_sendmsg+0xd7/0x130 [ 1027.354096][ T1514] ffff8880a8eed580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1027.362160][ T3845] ___sys_sendmsg+0x803/0x920 [ 1027.368401][ T1514] ================================================================== [ 1027.376479][ T3845] ? copy_msghdr_from_user+0x440/0x440 [ 1027.380775][ T1514] Disabling lock debugging due to kernel taint [ 1027.390665][ T1514] Kernel panic - not syncing: panic_on_warn set ... [ 1027.398084][ T3845] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1027.447638][ T3845] ? __kasan_check_read+0x11/0x20 [ 1027.452672][ T3845] ? __fget+0x384/0x560 [ 1027.456842][ T3845] ? __fget_light+0x1a9/0x230 [ 1027.461517][ T3845] ? __fdget+0x1b/0x20 [ 1027.465687][ T3845] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1027.471947][ T3845] __sys_sendmsg+0x105/0x1d0 [ 1027.476632][ T3845] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1027.481667][ T3845] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1027.487135][ T3845] ? do_syscall_64+0x26/0x6a0 [ 1027.491814][ T3845] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1027.497887][ T3845] ? do_syscall_64+0x26/0x6a0 [ 1027.502593][ T3845] __x64_sys_sendmsg+0x78/0xb0 [ 1027.507362][ T3845] do_syscall_64+0xfd/0x6a0 [ 1027.511869][ T3845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1027.517791][ T3845] RIP: 0033:0x459819 [ 1027.521695][ T3845] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1027.541777][ T3845] RSP: 002b:00007f16c2999c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1027.550215][ T3845] RAX: ffffffffffffffda RBX: 00007f16c2999c90 RCX: 0000000000459819 [ 1027.558193][ T3845] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000003 [ 1027.566170][ T3845] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1027.574149][ T3845] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16c299a6d4 [ 1027.582124][ T3845] R13: 00000000004c6f04 R14: 00000000004dc310 R15: 0000000000000004 [ 1027.590123][ T1514] CPU: 1 PID: 1514 Comm: kworker/u5:0 Tainted: G B 5.2.0+ #90 [ 1027.598906][ T1514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1027.608984][ T1514] Workqueue: hci0 hci_rx_work [ 1027.613659][ T1514] Call Trace: [ 1027.616965][ T1514] dump_stack+0x172/0x1f0 [ 1027.621391][ T1514] panic+0x2dc/0x755 [ 1027.625298][ T1514] ? add_taint.cold+0x16/0x16 [ 1027.629982][ T1514] ? hci_event_packet+0x9d26/0xa8fb [ 1027.635185][ T1514] ? preempt_schedule+0x4b/0x60 [ 1027.640043][ T1514] ? ___preempt_schedule+0x16/0x18 [ 1027.645160][ T1514] ? trace_hardirqs_on+0x5e/0x240 [ 1027.650191][ T1514] ? hci_event_packet+0x9d26/0xa8fb [ 1027.655393][ T1514] end_report+0x47/0x4f [ 1027.659639][ T1514] ? hci_event_packet+0x9d26/0xa8fb [ 1027.664839][ T1514] __kasan_report.cold+0xe/0x36 [ 1027.669688][ T1514] ? hci_event_packet+0x9d26/0xa8fb [ 1027.674886][ T1514] kasan_report+0x12/0x17 [ 1027.679222][ T1514] __asan_report_load1_noabort+0x14/0x20 [ 1027.684861][ T1514] hci_event_packet+0x9d26/0xa8fb [ 1027.689920][ T1514] ? hci_cmd_complete_evt+0xc390/0xc390 [ 1027.695468][ T1514] ? __kasan_check_read+0x11/0x20 [ 1027.700521][ T1514] ? perf_trace_lock_acquire+0x440/0x530 [ 1027.706158][ T1514] ? skb_dequeue+0x12e/0x180 [ 1027.710838][ T1514] ? __kasan_check_read+0x11/0x20 [ 1027.715868][ T1514] ? mark_lock+0xc0/0x11e0 [ 1027.720307][ T1514] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1027.726110][ T1514] ? skb_dequeue+0x12e/0x180 [ 1027.730698][ T1514] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1027.736512][ T1514] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1027.741803][ T1514] ? trace_hardirqs_on+0x67/0x240 [ 1027.746830][ T1514] ? __kasan_check_read+0x11/0x20 [ 1027.751862][ T1514] hci_rx_work+0x47e/0xae0 [ 1027.756286][ T1514] ? hci_rx_work+0x47e/0xae0 [ 1027.760887][ T1514] process_one_work+0x9af/0x1740 [ 1027.765837][ T1514] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1027.771206][ T1514] ? lock_acquire+0x190/0x410 [ 1027.774533][ T3902] kobject: 'loop5' (00000000563c03af): kobject_uevent_env [ 1027.775886][ T1514] worker_thread+0x98/0xe40 [ 1027.787477][ T1514] kthread+0x361/0x430 [ 1027.791550][ T1514] ? process_one_work+0x1740/0x1740 [ 1027.794459][ T3902] kobject: 'loop5' (00000000563c03af): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1027.796744][ T1514] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1027.796768][ T1514] ret_from_fork+0x24/0x30 [ 1027.819756][ T1514] Kernel Offset: disabled [ 1027.824084][ T1514] Rebooting in 86400 seconds..