[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 81.228491] audit: type=1800 audit(1556718277.270:25): pid=10054 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 81.252707] audit: type=1800 audit(1556718277.300:26): pid=10054 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 81.287682] audit: type=1800 audit(1556718277.320:27): pid=10054 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.33' (ECDSA) to the list of known hosts. 2019/05/01 13:44:51 fuzzer started 2019/05/01 13:44:57 dialing manager at 10.128.0.26:43463 2019/05/01 13:44:57 syscalls: 2284 2019/05/01 13:44:57 code coverage: enabled 2019/05/01 13:44:57 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/05/01 13:44:57 extra coverage: enabled 2019/05/01 13:44:57 setuid sandbox: enabled 2019/05/01 13:44:57 namespace sandbox: enabled 2019/05/01 13:44:57 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/01 13:44:57 fault injection: enabled 2019/05/01 13:44:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/01 13:44:57 net packet injection: enabled 2019/05/01 13:44:57 net device setup: enabled 13:48:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000780)=""/98, 0x62}, {&(0x7f0000000280)=""/112, 0x70}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4}}], 0x1, 0x0, 0x0) syzkaller login: [ 290.718100] IPVS: ftp: loaded support on port[0] = 21 [ 290.858090] chnl_net:caif_netlink_parms(): no params data found [ 290.921766] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.928468] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.936684] device bridge_slave_0 entered promiscuous mode [ 290.945854] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.952620] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.960889] device bridge_slave_1 entered promiscuous mode [ 290.992694] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 291.004215] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 291.036533] team0: Port device team_slave_0 added [ 291.045692] team0: Port device team_slave_1 added [ 291.226452] device hsr_slave_0 entered promiscuous mode [ 291.352934] device hsr_slave_1 entered promiscuous mode [ 291.411345] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.418018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.425132] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.431722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.510076] 8021q: adding VLAN 0 to HW filter on device bond0 [ 291.528730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 291.539548] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.549371] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.559235] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 291.579823] 8021q: adding VLAN 0 to HW filter on device team0 [ 291.596280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 291.605172] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.611718] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.667247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 291.675693] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.682318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.691993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 291.701252] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 291.710098] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 291.718345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 291.732371] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 291.762996] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 291.828438] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 13:48:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000780)=""/98, 0x62}, {&(0x7f0000000280)=""/112, 0x70}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4}}], 0x1, 0x0, 0x0) 13:48:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000780)=""/98, 0x62}, {&(0x7f0000000280)=""/112, 0x70}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4}}], 0x1, 0x0, 0x0) 13:48:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000780)=""/98, 0x62}, {&(0x7f0000000280)=""/112, 0x70}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4}}], 0x1, 0x0, 0x0) 13:48:08 executing program 0: prctl$PR_SET_PDEATHSIG(0x1, 0x0) 13:48:08 executing program 0: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0xbc, 0x0, &(0x7f0000000280)=[@dead_binder_done, @transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, @increfs_done, @enter_looper, @transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100}}], 0x31, 0x0, &(0x7f00000003c0)="d3f2f5cb7c57f339ffaf76b7d40687b898d01706cad12d962ba4e691ee7eb8fb9d0fdc22107ab8ceec2b595b93ae846a07"}) 13:48:08 executing program 0: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0xbc, 0x0, &(0x7f0000000280)=[@dead_binder_done, @transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, @increfs_done, @enter_looper, @transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100}}], 0x31, 0x0, &(0x7f00000003c0)="d3f2f5cb7c57f339ffaf76b7d40687b898d01706cad12d962ba4e691ee7eb8fb9d0fdc22107ab8ceec2b595b93ae846a07"}) [ 292.334271] binder: 10241:10242 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 292.341893] binder: 10241:10242 got transaction to context manager from process owning it [ 292.350289] binder: 10241:10242 transaction failed 29201/-22, size 0-0 line 2986 [ 292.359453] binder: undelivered TRANSACTION_ERROR: 29201 13:48:08 executing program 0: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0xbc, 0x0, &(0x7f0000000280)=[@dead_binder_done, @transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, @increfs_done, @enter_looper, @transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100}}], 0x31, 0x0, &(0x7f00000003c0)="d3f2f5cb7c57f339ffaf76b7d40687b898d01706cad12d962ba4e691ee7eb8fb9d0fdc22107ab8ceec2b595b93ae846a07"}) [ 292.452933] binder: 10244:10246 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 292.460450] binder: 10244:10246 got transaction to context manager from process owning it [ 292.469311] binder: 10244:10246 transaction failed 29201/-22, size 0-0 line 2986 [ 292.479130] binder: undelivered TRANSACTION_ERROR: 29201 13:48:08 executing program 0: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0xbc, 0x0, &(0x7f0000000280)=[@dead_binder_done, @transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, @increfs_done, @enter_looper, @transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100}}], 0x31, 0x0, &(0x7f00000003c0)="d3f2f5cb7c57f339ffaf76b7d40687b898d01706cad12d962ba4e691ee7eb8fb9d0fdc22107ab8ceec2b595b93ae846a07"}) [ 292.567575] binder: 10248:10249 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 292.575224] binder: 10248:10249 got transaction to context manager from process owning it [ 292.583871] binder: 10248:10249 transaction failed 29201/-22, size 0-0 line 2986 [ 292.593186] binder: undelivered TRANSACTION_ERROR: 29201 [ 292.683733] binder: 10251:10252 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 292.691282] binder: 10251:10252 got transaction to context manager from process owning it [ 292.699872] binder: 10251:10252 transaction failed 29201/-22, size 0-0 line 2986 [ 292.709935] binder: undelivered TRANSACTION_ERROR: 29201 13:48:08 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000040)=""/45, 0x2d}], 0x1) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0xffffffffffffffff) read$FUSE(r0, &(0x7f0000001500), 0x20004800) close(r0) 13:48:09 executing program 0: r0 = memfd_create(&(0x7f00000004c0)='sysfs\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000003c0)={0x0, 0x0, 0x0, 'queum1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x02\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x23, 0x0, 0x0, @time={0x0, 0x1c9c380}, {}, {}, @connect}], 0x30) 13:48:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000080)=0x400005, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) 13:48:09 executing program 0: getresuid(&(0x7f0000000040), 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x10001, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f00000000c0)={0x4001, 0x1, 0x5, 0x5}) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300090468fe0700000000000700ff3f03000000450001070000001419001a0004000210070000f48aa159ab09000000d400000000", 0x39}], 0x1) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) 13:48:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x20000, 0x0) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0xe204, 0x1) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x200, 0x1) splice(r0, &(0x7f0000000040), r2, &(0x7f00000000c0), 0xfffffffffffffffa, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000200)="1c0db5b598cd80f2a6f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c7e4c753fbc4f1ede1fed4f47d82663ed107c4c2b90a23f216657051c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f002ebb420fc37d10105bc4c3bd688da9ce00008baf35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17930d2e440fc7bf0d00008066660f3a0b0865") 13:48:09 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0xfffffffffffffffd, 0xe, 0x4, {0xb, @pix={0x0, 0x1f}}}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000000)={0x10}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000680)={{0x2, 0x2, 0x1, 0x80, 'syz1\x00', 0x5}, 0x1, [0x1d1, 0x6, 0xfff, 0x9, 0x400, 0x4, 0x6, 0x2, 0x27d, 0x80000001, 0xded, 0x3, 0x2, 0xffffffffffffff09, 0x8, 0x1, 0x145, 0x0, 0x6, 0xffff, 0x10001, 0x1, 0x7, 0x5, 0x30000000000000, 0x2, 0x37b7, 0x8, 0x6, 0x800, 0x100000001, 0xffffffffffff0000, 0x0, 0x3, 0x80, 0x7, 0x0, 0x0, 0x9, 0x1f, 0x80000001, 0x3, 0x86f711, 0x0, 0x3ff, 0xfffffffffffffffd, 0x8, 0xb10c, 0x9137, 0x2, 0xa835, 0x0, 0x5, 0x2, 0x81, 0x4d, 0x1f, 0x4, 0x401, 0x9d, 0x8001, 0x5, 0x6, 0x6, 0x7, 0x6, 0x9, 0x80000001, 0x81, 0x1, 0x5, 0x7, 0x5, 0x9, 0x5, 0x191cb617, 0x100000000, 0x1, 0x7, 0x101, 0xfff, 0x7, 0x9b2d, 0x5, 0xc0b, 0x9, 0x47, 0x1, 0x8c9, 0x1, 0x9, 0x80000001, 0x1, 0x20, 0x9, 0x7, 0x3, 0xb3, 0xffffffff, 0x1, 0x2, 0x4, 0x9, 0xfff, 0x3, 0x10000, 0x7f, 0xffff, 0x401, 0x3, 0x4, 0x6, 0x80000001, 0x401, 0x2, 0x1, 0x4, 0xffffffffffff0001, 0x80000000, 0x72d, 0x8001, 0x3, 0x8, 0xffff, 0x3, 0x100000000, 0x3, 0x19], {0x77359400}}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000600)={0x0, 0xb, 0x4, 0x0, {}, {}, 0x0, 0x0, @userptr=0x100000001, 0x4}) 13:48:09 executing program 0: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000000)=@ethtool_cmd={0x26}}) readv(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1) r1 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000200)={{0xffffffffffffffff, 0x0, 0x6, 0x40000000000001, 0x9}, 0x2, 0x8, 0x7}) 13:48:10 executing program 1: r0 = shmget(0x1, 0x2000, 0x50, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/100) setrlimit(0xa, &(0x7f0000000080)={0x9, 0x200000000000}) shmget(0x1, 0x3000, 0x100, &(0x7f0000ffd000/0x3000)=nil) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x121080, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) write$FUSE_LK(r1, &(0x7f0000000140)={0x28, 0xffffffffffffffff, 0x8, {{0x0, 0x6, 0x1, r2}}}, 0x28) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x200000, 0x0) bind$isdn(r3, &(0x7f00000001c0)={0x22, 0xff, 0x401, 0x4}, 0x6) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000200)={0xffffffff, 0x6, 0x6, 'queue1\x00', 0x2f}) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f00000002c0)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000300)={0x3, "4d824dc3c99e6c6d0f0cb74ef1688f42d50a42723b2dca400754adb0e076c5da", 0x1, 0x1, 0xfffffffffffffffd, 0x80008, 0x2}) r4 = semget(0x1, 0x5, 0x0) semctl$IPC_STAT(r4, 0x0, 0x2, &(0x7f0000000380)=""/178) fsetxattr$security_ima(r1, &(0x7f0000000440)='security.ima\x00', &(0x7f0000000480)=@v1={0x2, "c9790840"}, 0x5, 0x3) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f00000004c0), &(0x7f0000000500)=0x4) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000540)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r5 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000580)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fremovexattr(r5, &(0x7f00000005c0)=@known='system.posix_acl_default\x00') ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0xfffffffffffffffb) setxattr(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)=@random={'user.', '$\x00'}, &(0x7f00000006c0)='proc\x00', 0x5, 0x2) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000700)) close(r3) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000780)={@remote, 0x7f, r6}) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f00000007c0)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}, 0x1}) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000800)={0x5, 0xffffffffffffffc0, 0x7, 0x1}, 0x10) bind(r3, &(0x7f0000000840)=@ethernet={0x7, @random="a301007f9e32"}, 0x80) mknodat(r3, &(0x7f00000008c0)='./file0\x00', 0x204, 0x7) 13:48:10 executing program 0: r0 = creat(&(0x7f00006e9ff8)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f00000000c0)='security.capability\x00', 0x14, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x5) [ 294.739436] IPVS: ftp: loaded support on port[0] = 21 13:48:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x60) mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x3080, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="c1a1db5d97b6c011c2f697dc6ddb7b7476130dc4bdfddbfb192551761dcf6bab7bc445d31ad44f6fe74980e20bd35309e27c13214744a6ed8222742ebcc95c4e9872fdf1bccfc802901742d150e8af2c43866400bd7cabd30e3a1be7a614d484cf118c3689069a5d5b21c7ae607fd700a4032d0132ce40777513b6000000000000000803f3ad177118862dae183dad3ee52240d8feef8621c551d6bdd52453aaa4fa167a89b7c0d4f3a731386822d9d854a5c6a01c24091e5f4b570000"], &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="a7fd0d7333552eecb0a58637d7facbb5351ff1d36a182ab90a35c21fbaeb89ae9dab942ae294a683fe2900df86fc7f3ac4a23233cb3b1d0412ab4cae2ae59c56bd51684ef8a2d41b8315f09939a2611ad09da29a8da734bfda2690f003129fda6502a224b13597fed84080acbd4c063d3e9df08dcd2b819b03d8d2676110e32c71dc065db767dcfe2804cbc1dbeae155afde89abf648f03a308e870ffa2065047308c756c556c4f59d6979ac352c9eb28fef924518866c4818894a0e09ca"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) ioctl(r0, 0x2, &(0x7f0000000580)="cae32bdc49849f05ffa5e88c5e1a68f68ecbaffa1dbee2457a956b233171fa969581146550059ce5fe72d2da02d8aee1ca101b07ffea9b942e51858d7f90429663cdd576c36d71bd018d36631a812fb5f29b9da7795346a1b14a97a489fd15e526b12f883db56d325ea9d7e02a0059c6a49073aa404f6d2427fbaf8863eca559b1fe80bf112902ca9b529ed81fc4a2f2cf8d29bb52f80b7caf4be39aa80db555efba63f93f7306df13a2") umount2(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2f29e941300000"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = dup2(r0, r0) uselib(&(0x7f0000000140)='./file0\x00') ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000280)) umount2(&(0x7f0000000340)='./file0\x00', 0x2) [ 294.966770] chnl_net:caif_netlink_parms(): no params data found 13:48:11 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x2000, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f0000000080)) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="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") [ 295.081119] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.087826] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.096072] device bridge_slave_0 entered promiscuous mode 13:48:11 executing program 0: socket(0x1d, 0x800, 0x1000) [ 295.130119] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.137069] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.145513] device bridge_slave_1 entered promiscuous mode [ 295.194949] bond0: Enslaving bond_slave_0 as an active interface with an up link 13:48:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x6, 0x22100) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000a40)={0x0, @in6={{0xa, 0x4e24, 0x200, @loopback, 0x80000001}}, [0x9f, 0x7fff, 0x6, 0x4, 0x20, 0x11, 0x6, 0x0, 0x9, 0x7, 0xa815, 0x76, 0x9, 0xfffffffffffffffc, 0x8001]}, &(0x7f0000000b40)=0x100) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000b80)={0x0, @in={{0x2, 0x4e23, @multicast1}}}, &(0x7f0000000c40)=0x84) sendmmsg$inet_sctp(r1, &(0x7f0000000d80)=[{&(0x7f0000000080)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x1c, &(0x7f00000004c0)=[{&(0x7f0000000280)="524ba7893047746b6fa8ce344d50ae1b1a130a775a6c59c2db210fc2c2b335c8106bb6bff283d3f23d65d5e8b86caa70404667ba37a10432a517042cd498d341321df3fa839687866308996e69b1d891943d7ab09878a3927897175cc55be95c17e9349699790920c14085678c53f34c489d6d9113951f6e0b37807694218647a87522b38e9802e27aea7ac795243d1f811e9ea39c64d73a9e2050341af527de97bcf04d1584c0eed486b7144604f7dd7a2dbd1866a9a48eed1307fc7125c83606581a4a96249013b4017c1f9aae748843c0d89cefffd0dace", 0xd9}, {&(0x7f0000000380)="8511444315e4a40ce57c812340d6bf3752f8f68509225c9e5f7cb7d3462dc94ddc59a4d5319fabffb44e6ccf758fdd4f47e1f123a59d6ff5b0e120862ec137ec03b8178de06a8ac7f4081ca33ea5a500d33ce33a10de39027193e408d0be72abddb6b92b2b7b87ab34a67fe32eaeeba36dcc5ca5ecfc011fd7cd1b278b63ad82fac7cb4187230829abb53786d8f32d837ff7cce4f2ad6b48fce97ea505bf", 0x9e}, {&(0x7f00000001c0)="8e2ba12d12ae88991280ba033a88060414b1c8dd0c42f729520574a07b78b02bb0a56cd474ba3b4b15b71ddb506ae8d8a3f33cc3be6e1fd653392d21322f8ef47104", 0x42}, {&(0x7f0000000100)="bd30c3a7f812b3150fb685d5116e8fb7569b0aa74e92dd50531bf7b97216", 0x1e}, {&(0x7f0000000440)="025842f7db577e3982392d1efa98059e070525f087035379bf012e3f5401ab14f2f2cdc45d786866e70d0e6c4fd70a1d496218eb319e56456983f826c27520c71defcddbead221a34e1acd4443", 0x4d}], 0x5, 0x0, 0x0, 0x40}, {&(0x7f0000000540)=@in={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f00000009c0)=[{&(0x7f0000000580)="943cbab285c6c8ca90dd7fb7402682a13033635e010b2172a593a5aff0948531664b398acf5a97fbd2a8e3e655929a6296047813a7e7b5ef36b5bfdd50a86d5ecccfdbbb0bdba86bc4ecff6ce895cce52a9d4425d208665d9fd856e3e6d106c58eb1d9697c39eae16204413aaa4e2552b4eea82fb5f3ad2f43c1ff0a26f8540799df73fa6ea69abbe2e8bd4cef11b0d1c6e2150349348ba4d80b", 0x9a}, {&(0x7f0000000640)="b26be5330c8ac87d5717e94034d9f43519b5e966307c96fba8b35378600cb5b68852b48bc514c40eba68c0c3f90cba81bec37b9b965cb2717f64d80cd54472a7f255b36df22ba0321b76df17f88169824ebdb71cbfa8aad871bf295f5e1059281524a7455a594d66a38f2b9b959fedd44e85fc174c0f00e04e13a42334b2b157ec2636f09c02d9eddf5a695496b64b4c6089361387d2674c07469bb3e936c350df598e6bb2a7b6b84ce7892c1af0cfbb8aabdff1b0d8ab7a7e8786227e182ae76f40008ca98073d4bdabd329fb7d43e0e7f0de93a9d864cc2abbe5a92e45c95eb278d0", 0xe3}, {&(0x7f0000000740)="8023e2762d2710a6f2b8914151f0178579ba21fedc4a0e8aeb5f9d9a49e3469d193dd23a8fb98ad4fbc625aa953839802a44f508439ae6a1ad69ef5401ff1d4d58e765908bf76b9cd07324a82907c5f335f63d495c31c84bb0d83fef872294a810c78136e9ad1e43d42afe8d5f5bbc8508f08636", 0x74}, {&(0x7f00000007c0)="0ffc7cd05115f9149aff2912f4f9577d58a95ec71c2acd35e25ca0e062915adbe9a199e94177cadca98868473621b38f838abc7435884edbcda1303248de627a582c6b147e7803ee72a489ef556168f82da7dc12a832c478428b0e92f086a40fcce2b75924401bac635d7143481763a236595069107034f007827ef5305167cfaa6ed76519572acc33a8", 0x8a}, {&(0x7f0000000880)="8e8e8d159a5bf8150ed481ff1b67d8d1ade2e7edf69b25f00d20cbd39055638dc3c8497a72", 0x25}, {&(0x7f00000008c0)="c4e7286c6f22a330d967106dbbcccdeb384711a3fd642ed76a47db204bfc8e4209efa74d034b9495d34df676c3c8c82b41087bc061dc90f92b44ef153ac18910b6693897f14552260ef5cbd9278696e4c16be584025f087076a3737f441532bab74575ab96a7dc666d5964330e32b17ba8efe1f9f01609a0268b66956b5f5d64dd0e", 0x82}, {&(0x7f0000000980)="07cd1f43f6f8022b7c1127a37a797b00bca71260d7e3e4db7b28", 0x1a}], 0x7, &(0x7f0000000c80)=[@sndrcv={0x30, 0x84, 0x1, {0x9, 0x4, 0xe781c100dd5e8592, 0x2, 0x1, 0x9, 0x8771, 0xfffffffffffffc01, r2}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x7}}, @sndrcv={0x30, 0x84, 0x1, {0x7, 0x800, 0x3, 0x7, 0x8000, 0x0, 0x336, 0x1, r3}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x7}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x400}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x9}}], 0xd8, 0x40044}], 0x2, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/ppp\x00', 0x400, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f00000000c0)={0x0, 0x1c7, &(0x7f0000000180)={&(0x7f0000000140)={0x1e, r5, 0x105, 0x0, 0x0, {{}, 0x0, 0xb, 0x0, {0x71, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) [ 295.236177] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 295.306229] team0: Port device team_slave_0 added [ 295.324989] team0: Port device team_slave_1 added 13:48:11 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x1, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0xfffffffffffffffe) write$P9_RATTACH(r2, &(0x7f0000000000)={0x14, 0x69, 0x1, {0x8, 0x1}}, 0x14) sendfile(r1, r2, 0x0, 0x2008000fffffffe) 13:48:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x81}, {0x80000006}]}, 0x10) getsockname(r1, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000140)=0x80) write$apparmor_exec(r1, &(0x7f0000000180)={'stack ', '*eth1,ppp0wlan1posix_acl_access*ppp0\x00'}, 0x2b) [ 295.456354] device hsr_slave_0 entered promiscuous mode [ 295.482711] device hsr_slave_1 entered promiscuous mode [ 295.558585] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.565380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.572475] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.579087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.666414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 295.686510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.696112] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.714183] bridge0: port 2(bridge_slave_1) entered disabled state 13:48:11 executing program 0: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x20000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r3, 0x111, 0x5, 0x5, 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") rt_tgsigqueueinfo(r0, r1, 0x2e, &(0x7f0000000340)={0x0, 0x0, 0x2}) read(r2, &(0x7f0000481000)=""/128, 0x80) [ 295.738332] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 295.785344] 8021q: adding VLAN 0 to HW filter on device team0 [ 295.811655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.820795] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.827509] bridge0: port 1(bridge_slave_0) entered forwarding state 13:48:11 executing program 0: syz_execute_func(&(0x7f00000002c0)="0c1db5b598c6f8001b69e4f56962f5696200d9d9d0c441395bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d822a2a00c4da7676f2168f4808eebce00000802000c4c3dd6d68074851518fe9509b9b9bfc0000c1ea01eff265dc5f00c35b5b45363ef80f9966030faee42c240f5e5bf447000026400f0d18c401fe5ff6e3df646736676670664336660fd2938ccf00000f01c36666450f17720d06111d54111d00") [ 295.864132] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.872998] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.879629] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.889534] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 295.922159] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 295.932005] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 295.949948] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 295.958687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 295.967485] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.976233] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.011405] 8021q: adding VLAN 0 to HW filter on device batadv0 13:48:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x9, 0x8010, r0, 0x10000000) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000008c0)={0x0, 0x60000000, &(0x7f0000000880)={&(0x7f0000000640)={0x6c, r1, 0x201, 0x0, 0x0, {0x3, 0xf6020000}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0xc0}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @loopback}}}}]}]}, 0x6c}}, 0x0) [ 296.036930] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 296.145644] Started in network mode [ 296.149447] Own node identity fec000000000000000000000000000bb, cluster identity 4711 [ 296.158420] Enabling of bearer rejected, failed to enable media 13:48:12 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) r2 = openat$cgroup_procs(r0, &(0x7f0000000300)='cgroup.threads\x00', 0x2, 0x0) connect$bt_rfcomm(r0, &(0x7f0000000140)={0x1f, {0x7, 0x3, 0x2, 0x7, 0x7}, 0xfffffffffffffe3b}, 0xa) write$cgroup_pid(r2, &(0x7f0000000000), 0x12) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f00000000c0)={0x2b, @multicast2, 0x4e22, 0x4, 'nq\x00', 0x4, 0x7fff, 0x9}, 0x2c) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000001c0)={0x28, 0x2, 0x0, {0x6, 0x242, 0x6}}, 0x28) 13:48:12 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0x7e, 0x4) 13:48:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000100)=@dstopts, 0x8) getsockopt$inet6_opts(r0, 0x29, 0x200010000000003b, 0x0, &(0x7f0000000140)) 13:48:12 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000440)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/186, 0xba) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = dup(r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x54, 0x0, &(0x7f0000000380)=[@acquire, @transaction_sg={0x40486311, {{0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000000)={0x100000001, 0x2}) [ 296.474991] binder: 10338:10340 tried to acquire reference to desc 0, got 1 instead [ 296.483164] binder: 10338:10340 got transaction to invalid handle [ 296.489506] binder: 10338:10340 transaction failed 29201/-22, size 0-0 line 2995 13:48:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmmsg(r0, &(0x7f0000005f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000001b235a8200000005000000"], 0x10}}], 0x1, 0x0) [ 296.516270] binder: 10338:10340 ioctl c008ae67 20000000 returned -22 [ 296.524518] binder: undelivered TRANSACTION_ERROR: 29201 13:48:12 executing program 0: socket$packet(0x11, 0x400000000a, 0x300) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x10000, 0x80100) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000000180)={@loopback, @loopback, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$xdp(r0, &(0x7f0000000740)={&(0x7f0000000200)={0x2c, 0x4, r1, 0x32}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000240)="124bb49bb70589bb26e223fc272d3211766bbeac36e408e4f24a0b35e6ac58e0134b3a65036d79c24062a6057f3b6cf34098c96a4df495e306fc4478238c50e7f2d37e957839d52627675f14a2b6ff9544af03ade8dfabb537775b7a6bcc5a27d5335e7b2d27c8c0e0170218221ece6a8d23b8a9a442f04e2f2f4354274f19b74a92a30e10950b506c208bfc8f92d6c0688689937cdbe84ff0a93d7e0e07887a7571f4aac7cdee6bc6789c7ae834cbb0025510de6dfc8ba1e5765fdbae84ef2bc6c879acfa4abf01c6fd40525f5ec51f591608ed668b06205191090d5a2f3c1df0fe7f0d8ef2d5fb", 0xe8}, {&(0x7f0000000340)="6b1d94d875c27b7efcecf9997988d7602b252691ac7e7aebc36289b6e7f5768345c792ed9d98e5f676f8c248f9ee3e04d3190158b934e6e62536c714204bf82fa2c0596278f749fe50f1e61414bd0f02b507fa3a5bcf1c70c392f8ad56e44647ca847166ef0242743b057ea03df7cdd28c8cc59f4b8e47b74af740b5b2c3cb2dca7c0f537ab5f78a470c841b14125851c6e414512f69", 0x96}, {&(0x7f0000000400)="e00261cf77b0836e08e363f002605bd8e35d44ae5f1b488c74a415098c5c0619dd344a8cf4c194c2d3531fc362a3903f88d86c25fa7cb9f91b435386cd6bcb84576156d592ebfaf149e6ed625964b1eea4ca1d52e7438e5ecad5d1e8817cad2214f997bc74a04a077cb84b1f1c1e42718eb67e7fbdaca16f63d9992634cb23fba5af464612c439b4ee34f26d15627dcd375af36f075fa278d82d1671d7f34f4a15bc3be3ce54645934b3827322514678945f7fcfa048697496afaa26bf9d9aba339c0db1a8bb0a1ed63119b5c427f70665cd03", 0xd3}, {&(0x7f0000000500)="620d7a5c5a793bb7de2b418e3ac6201ac9fab9bfd615b64cf4ed2fff25a7fcce011477d4ef67c6f05d8db586465b77b85ed102510792c7326c5cc775e568ccbb28a7fb59ca55c381f5d312b8836b16be30eb4273395ab9900aeef889ea82044f3bff8f2e7bf4f6c01ebe6650984c3cfc94db17e9ade0a985156fc648af8605d5402241629d38f4fc72c283b01b8973723f1df0a095396e0a102afdfc498766b21f590e0533c09111c90a3f7d2245f859268aa32e8a9c7b44a990f830512bbc719fe738de5fb8358e", 0xc8}, {&(0x7f0000000600)="f65bb96c48b201d69d4c6f88e0e1b6d51cdc8c75d861be88", 0x18}, {&(0x7f0000000640)="72a15ed56b6a5b266036b387086f246ca13e9987b3cd15958909e6304567de972fb0eb5a8f1cb5f8b37e0e299f67f9f35e322dd7ee8988280424eee3fb12790bfc9d722ab44320709f2b70c16ed94ce7b0c5404e74c99b036b796e65cc3dadd6ae38f6fe5474cbcaaf1386ac196148cd9837", 0x72}], 0x6}, 0x44000) syz_emit_ethernet(0x7ffff, &(0x7f0000000040)={@random="3fada9fcd703", @local, [], {@ipv4={0x8864, {{0x8, 0x4, 0x0, 0x0, 0x806, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}}}}}}, 0x0) syz_emit_ethernet(0x24, &(0x7f00000000c0)={@local, @local, [{}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 13:48:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000100)={0x10000, "80874299ae4d358e5ae023301a56c63e10328c9920be71ea95d25e1337570242", 0x3, 0x7, 0x0, 0x40000, 0x1040000, 0x8}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r2, 0x0) write$binfmt_misc(r2, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r1, 0x80984120, &(0x7f0000000000)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x30, r3, 0x7ff, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xfffffffffffffffe, 0x91, 0x9, 0x2}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) 13:48:12 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)=0x0) move_pages(r1, 0x4, &(0x7f0000000200)=[&(0x7f000000a000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f000000b000/0x2000)=nil], &(0x7f0000000240)=[0x5, 0xffffffff, 0x4e5a99e2, 0xfffffffffffffffd, 0xd7c0, 0x5], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x6) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x495458c8a155572d, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000005000/0x1000)=nil) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000180)={0x7f, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x0, 'sh\x00', 0x8, 0x3, 0x3a}, 0x2c) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffb000/0x4000)=nil) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x4, 0x6, 0x1ff}) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000140)) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000080)={0x3, 0xfffffffffffffffa}) 13:48:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000100)={0x10000, "80874299ae4d358e5ae023301a56c63e10328c9920be71ea95d25e1337570242", 0x3, 0x7, 0x0, 0x40000, 0x1040000, 0x8}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r2, 0x0) write$binfmt_misc(r2, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r1, 0x80984120, &(0x7f0000000000)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x30, r3, 0x7ff, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xfffffffffffffffe, 0x91, 0x9, 0x2}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) 13:48:12 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3f, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x7, 0x1, 0x0, "0f348062d210669f0e613600fa33fac1d718583a70ea62b24d0a0e2e4065af66"}) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x8, 0x10000) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0xffffffff, 0x4}, 0x2) 13:48:13 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0xfc5f) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000340)="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") setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000100)={0x77359400}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) getpeername$tipc(r0, &(0x7f0000000000), &(0x7f0000000080)=0x10) r1 = memfd_create(&(0x7f0000000280)='system\x00', 0xfffffffffffffffd) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x12, r1, 0x0) ioctl$int_in(r0, 0x28008108010500c, &(0x7f0000000040)) 13:48:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000100)={0x10000, "80874299ae4d358e5ae023301a56c63e10328c9920be71ea95d25e1337570242", 0x3, 0x7, 0x0, 0x40000, 0x1040000, 0x8}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r2, 0x0) write$binfmt_misc(r2, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r1, 0x80984120, &(0x7f0000000000)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x30, r3, 0x7ff, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xfffffffffffffffe, 0x91, 0x9, 0x2}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) 13:48:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000100)={0x10000, "80874299ae4d358e5ae023301a56c63e10328c9920be71ea95d25e1337570242", 0x3, 0x7, 0x0, 0x40000, 0x1040000, 0x8}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r2, 0x0) write$binfmt_misc(r2, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r1, 0x80984120, &(0x7f0000000000)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x30, r3, 0x7ff, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xfffffffffffffffe, 0x91, 0x9, 0x2}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) 13:48:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000100)={0x10000, "80874299ae4d358e5ae023301a56c63e10328c9920be71ea95d25e1337570242", 0x3, 0x7, 0x0, 0x40000, 0x1040000, 0x8}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r2, 0x0) write$binfmt_misc(r2, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r1, 0x80984120, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') 13:48:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000100)={0x10000, "80874299ae4d358e5ae023301a56c63e10328c9920be71ea95d25e1337570242", 0x3, 0x7, 0x0, 0x40000, 0x1040000, 0x8}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r2, 0x0) write$binfmt_misc(r2, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r1, 0x80984120, &(0x7f0000000000)) 13:48:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000100)={0x10000, "80874299ae4d358e5ae023301a56c63e10328c9920be71ea95d25e1337570242", 0x3, 0x7, 0x0, 0x40000, 0x1040000, 0x8}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r2, 0x0) ioctl(r1, 0x80984120, &(0x7f0000000000)) 13:48:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000100)={0x10000, "80874299ae4d358e5ae023301a56c63e10328c9920be71ea95d25e1337570242", 0x3, 0x7, 0x0, 0x40000, 0x1040000, 0x8}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r2, 0x0) ioctl(r1, 0x80984120, &(0x7f0000000000)) 13:48:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000100)={0x10000, "80874299ae4d358e5ae023301a56c63e10328c9920be71ea95d25e1337570242", 0x3, 0x7, 0x0, 0x40000, 0x1040000, 0x8}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r2, 0x0) ioctl(r1, 0x80984120, &(0x7f0000000000)) 13:48:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000100)={0x10000, "80874299ae4d358e5ae023301a56c63e10328c9920be71ea95d25e1337570242", 0x3, 0x7, 0x0, 0x40000, 0x1040000, 0x8}) write$binfmt_misc(r2, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r1, 0x80984120, &(0x7f0000000000)) 13:48:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000100)={0x10000, "80874299ae4d358e5ae023301a56c63e10328c9920be71ea95d25e1337570242", 0x3, 0x7, 0x0, 0x40000, 0x1040000, 0x8}) write$binfmt_misc(r2, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r1, 0x80984120, &(0x7f0000000000)) 13:48:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000100)={0x10000, "80874299ae4d358e5ae023301a56c63e10328c9920be71ea95d25e1337570242", 0x3, 0x7, 0x0, 0x40000, 0x1040000, 0x8}) write$binfmt_misc(r2, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r1, 0x80984120, &(0x7f0000000000)) 13:48:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r2, 0x0) write$binfmt_misc(r2, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r1, 0x80984120, &(0x7f0000000000)) 13:48:16 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0xfc5f) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000340)="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") setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000100)={0x77359400}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) getpeername$tipc(r0, &(0x7f0000000000), &(0x7f0000000080)=0x10) r1 = memfd_create(&(0x7f0000000280)='system\x00', 0xfffffffffffffffd) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x12, r1, 0x0) ioctl$int_in(r0, 0x28008108010500c, &(0x7f0000000040)) 13:48:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r1, 0x80984120, &(0x7f0000000000)) 13:48:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000100)={0x10000, "80874299ae4d358e5ae023301a56c63e10328c9920be71ea95d25e1337570242", 0x3, 0x7, 0x0, 0x40000, 0x1040000, 0x8}) write$binfmt_misc(r2, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r1, 0x80984120, &(0x7f0000000000)) 13:48:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r1, 0x80984120, &(0x7f0000000000)) 13:48:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x402400, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r1, 0x80984120, &(0x7f0000000000)) 13:48:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r2, 0x0) write$binfmt_misc(r2, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r1, 0x80984120, &(0x7f0000000000)) 13:48:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(0xffffffffffffffff, 0x80984120, &(0x7f0000000000)) [ 300.687145] IPVS: ftp: loaded support on port[0] = 21 13:48:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(0xffffffffffffffff, 0x80984120, &(0x7f0000000000)) [ 300.988982] chnl_net:caif_netlink_parms(): no params data found 13:48:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(0xffffffffffffffff, 0x80984120, &(0x7f0000000000)) [ 301.124164] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.130754] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.139665] device bridge_slave_0 entered promiscuous mode 13:48:17 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r0, 0x80984120, &(0x7f0000000000)) [ 301.198693] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.205637] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.213877] device bridge_slave_1 entered promiscuous mode [ 301.311418] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 301.336594] bond0: Enslaving bond_slave_1 as an active interface with an up link 13:48:17 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r0, 0x80984120, &(0x7f0000000000)) [ 301.406070] team0: Port device team_slave_0 added [ 301.415579] team0: Port device team_slave_1 added [ 301.546694] device hsr_slave_0 entered promiscuous mode 13:48:17 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r0, 0x80984120, &(0x7f0000000000)) [ 301.594029] device hsr_slave_1 entered promiscuous mode [ 301.655622] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.662307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.669303] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.675997] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.841533] 8021q: adding VLAN 0 to HW filter on device bond0 [ 301.860495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.884789] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.931153] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.977644] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 302.033690] 8021q: adding VLAN 0 to HW filter on device team0 [ 302.051322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 302.060555] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 302.068916] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.075523] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.092738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 302.101345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.109757] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.116461] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.161122] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 302.171641] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 302.186263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 302.195459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 302.204494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 302.213344] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 302.222031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 302.230871] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 302.239542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 302.247869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 302.256476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 302.264667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 302.278385] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 302.286419] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 302.318601] 8021q: adding VLAN 0 to HW filter on device batadv0 13:48:19 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0xfc5f) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000340)="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") setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000100)={0x77359400}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) getpeername$tipc(r0, &(0x7f0000000000), &(0x7f0000000080)=0x10) r1 = memfd_create(&(0x7f0000000280)='system\x00', 0xfffffffffffffffd) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x12, r1, 0x0) ioctl$int_in(r0, 0x28008108010500c, &(0x7f0000000040)) 13:48:19 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r0, 0x80984120, &(0x7f0000000000)) 13:48:19 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r0, 0x80984120, &(0x7f0000000000)) 13:48:19 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r0, 0x80984120, &(0x7f0000000000)) 13:48:19 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000300)={'syz1', "66502eaa450d1a5cba1116b5664d0febda233e951382446300ec10211a37ebe824068c597fc02f16a854e97369bb97dc519706da5a9b254a21cceefa1e07405b42486544e6ade815298c7a752970f5"}, 0x53) ioctl(r0, 0x80984120, &(0x7f0000000000)) [ 303.435653] ================================================================== [ 303.443549] BUG: KMSAN: kernel-infoleak in copyout+0x16b/0x1f0 [ 303.449544] CPU: 1 PID: 10468 Comm: blkid Not tainted 5.1.0-rc7+ #5 [ 303.455955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.465816] Call Trace: [ 303.468514] dump_stack+0x191/0x1f0 [ 303.472182] kmsan_report+0x130/0x2a0 [ 303.476027] kmsan_internal_check_memory+0x974/0xa80 [ 303.481257] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 303.486665] kmsan_copy_to_user+0xa9/0xb0 [ 303.490851] copyout+0x16b/0x1f0 [ 303.494262] copy_page_to_iter+0x654/0x1910 [ 303.498647] generic_file_read_iter+0x2979/0x3e70 [ 303.503580] ? kmsan_get_shadow_origin_ptr+0x71/0x470 [ 303.508803] blkdev_read_iter+0x20d/0x270 [ 303.512991] ? blkdev_write_iter+0x650/0x650 [ 303.517439] __vfs_read+0x9af/0xbe0 [ 303.521214] vfs_read+0x359/0x6f0 [ 303.524700] ? kmsan_get_shadow_origin_ptr+0x71/0x470 [ 303.529919] ksys_read+0x1c5/0x440 [ 303.533499] __se_sys_read+0x92/0xb0 [ 303.537245] __x64_sys_read+0x4a/0x70 [ 303.541072] do_syscall_64+0xbc/0xf0 [ 303.544950] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 303.550167] RIP: 0033:0x7effb29fe310 [ 303.553896] Code: 73 01 c3 48 8b 0d 28 4b 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d e5 a2 2b 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e 8a 01 00 48 89 04 24 [ 303.572815] RSP: 002b:00007ffdb49cdd08 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 303.580789] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007effb29fe310 [ 303.588075] RDX: 0000000000000561 RSI: 0000000001a13128 RDI: 0000000000000003 [ 303.595361] RBP: 0000000001a13100 R08: 0000000000000018 R09: 0000000001680000 [ 303.603083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001a0c030 [ 303.610566] R13: 0000000000000561 R14: 0000000001a0c080 R15: 0000000001a13118 [ 303.617882] [ 303.619524] Uninit was created at: [ 303.623090] kmsan_save_stack_with_flags+0x7a/0x130 [ 303.628133] kmsan_internal_alloc_meta_for_pages+0x10f/0x500 [ 303.633956] kmsan_alloc_page+0x7a/0xf0 [ 303.637951] __alloc_pages_nodemask+0x143d/0x5e90 [ 303.642820] alloc_pages_current+0x6a0/0x9b0 [ 303.647268] __page_cache_alloc+0x95/0x320 [ 303.651522] pagecache_get_page+0x443/0x11f0 [ 303.655949] filemap_fault+0x2705/0x2cd0 [ 303.660029] handle_mm_fault+0x49d9/0x9fa0 [ 303.664280] __do_page_fault+0xdf9/0x17f0 [ 303.668456] do_page_fault+0xb1/0x4d0 [ 303.672267] page_fault+0x3d/0x50 [ 303.675767] copy_user_enhanced_fast_string+0xe/0x20 [ 303.680934] snd_pcm_common_ioctl+0x7b1/0xc9b0 [ 303.685542] snd_pcm_ioctl+0x126/0x1a0 [ 303.689448] do_vfs_ioctl+0xea8/0x2c50 [ 303.693345] __se_sys_ioctl+0x1da/0x270 [ 303.697332] __x64_sys_ioctl+0x4a/0x70 [ 303.701321] do_syscall_64+0xbc/0xf0 [ 303.705053] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 303.710242] [ 303.711898] Bytes 0-1376 of 1377 are uninitialized [ 303.716832] Memory access of size 1377 starts at ffff888063493000 [ 303.723079] Data copied to user address 0000000001a13128 [ 303.728530] ================================================================== [ 303.735896] Disabling lock debugging due to kernel taint [ 303.741355] Kernel panic - not syncing: panic_on_warn set ... [ 303.747266] CPU: 1 PID: 10468 Comm: blkid Tainted: G B 5.1.0-rc7+ #5 [ 303.755073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.764439] Call Trace: [ 303.767056] dump_stack+0x191/0x1f0 [ 303.770716] panic+0x3ca/0xafe [ 303.773977] kmsan_report+0x298/0x2a0 [ 303.777817] kmsan_internal_check_memory+0x974/0xa80 [ 303.782962] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 303.788364] kmsan_copy_to_user+0xa9/0xb0 [ 303.792534] copyout+0x16b/0x1f0 [ 303.795938] copy_page_to_iter+0x654/0x1910 [ 303.800320] generic_file_read_iter+0x2979/0x3e70 [ 303.805249] ? kmsan_get_shadow_origin_ptr+0x71/0x470 [ 303.810478] blkdev_read_iter+0x20d/0x270 [ 303.814857] ? blkdev_write_iter+0x650/0x650 [ 303.819286] __vfs_read+0x9af/0xbe0 [ 303.823066] vfs_read+0x359/0x6f0 [ 303.826552] ? kmsan_get_shadow_origin_ptr+0x71/0x470 [ 303.831769] ksys_read+0x1c5/0x440 [ 303.835354] __se_sys_read+0x92/0xb0 [ 303.839191] __x64_sys_read+0x4a/0x70 [ 303.843027] do_syscall_64+0xbc/0xf0 [ 303.846764] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 303.851970] RIP: 0033:0x7effb29fe310 [ 303.855697] Code: 73 01 c3 48 8b 0d 28 4b 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d e5 a2 2b 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e 8a 01 00 48 89 04 24 [ 303.874622] RSP: 002b:00007ffdb49cdd08 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 303.882374] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007effb29fe310 [ 303.889666] RDX: 0000000000000561 RSI: 0000000001a13128 RDI: 0000000000000003 [ 303.896954] RBP: 0000000001a13100 R08: 0000000000000018 R09: 0000000001680000 [ 303.904331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001a0c030 [ 303.911710] R13: 0000000000000561 R14: 0000000001a0c080 R15: 0000000001a13118 [ 303.920184] Kernel Offset: disabled [ 303.923829] Rebooting in 86400 seconds..